Viewing Air Encryption State; Deleting User Keys; Verify Key Validity - Motorola MXP600 Feature User Manual

Hide thumbs Also See for MXP600:
Table of Contents

Advertisement

MN006360A01-AE
Chapter 18: Security
Air Encryption enables encryption of entire communication between the radio and infrastructure, which
results in increased security of calls, messages, and data.

Viewing Air Encryption State

Procedure:
1 From the home screen, press the Menu key.
2 Select Security→AirEncrypt.
Your radio displays:
Air Encryption Is Off – The Air Encryption is not activated.
Air Encryption Is On – The Air Encryption is activated.

Deleting User Keys

IMPORTANT: The key deletion takes up to 30 seconds. During this period, the battery must not
be removed. Removing the battery during this period may lead to radio malfunction.
Prerequisites:Ensure that the user key deletion is enabled in the codeplug.
Procedure:
Press *→*→0→0→#→#.
Encryption and/or Authentication keys are deleted. The radio enters Temporary Disable state and the
service provider must manually restore it.
18.4

Verify Key Validity

Key (K) is a secret key the infrastructure uses to authenticate your radio in the system providing
service confidentiality between your radio and the system. Static Cipher Key (SCK) is a secret key
used for the Air Interface Encryption Class 2. It is used to encrypt calls and data in TMO and DMO.
The SCKs used in TMO are called TMSCKs and SCKs used in DMO are called DMSCKs.
When and where to use:To ensure that the authentications in your radio are valid and can be used for
encryption.
Procedure:
1 From the home screen, press the Menu key.
2 Select Security.
3 Select one of the following options:
Option
K Validity
TMSCK Validity
106
Actions
Your radio displays:
K is Valid – The infrastructure can authenticate your
radio.
K is Invalid – The infrastructure is unable to authen-
ticate your radio. Contact your service provider to restore
the key to your radio.
Your radio displays:

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents