1、 TIA-102.AACA-A September 2014Project 25 Digital Radio Over-The-Air-Rekeying (OTAR) Messages and Procedures ANSI/TIA-102.AACA-A-2014 APPROVED: SEPTEMBER 10, 2014 NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstandings between
2、manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect preclude any me
3、mber or non-member of TIA from manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publications are a
4、dopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purport to addres
5、s all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. Any use of trademarks in th
6、is document are for information purposes and do not constitute an endorsement by TIA or this committee of the products or services of the company. (From Project No. ANSI/TIA-PN-102.AACA-A, formulated under the cognizance of the TIA TR-8 Mobile and Personal Private Radio Standards, TR-8.3 Subcommitte
7、e on Encryption). Published by TELECOMMUNICATIONS INDUSTRY ASSOCIATION Technology and Standards Department 1320 N. Courthouse Road, Suite 200 Arlington, VA 22201 U.S.A. PRICE: Please refer to current Catalog of TIA TELECOMMUNICATIONS INDUSTRY ASSOCIATION STANDARDS AND ENGINEERING PUBLICATIONS or cal
8、l IHS, USA and Canada (1-877-413-5187) International (303-397-2896) or search online at http:/www.tiaonline.org/standards/catalog/ All rights reserved Printed in U.S.A. NOTICE OF COPYRIGHT This document is copyrighted by the TIA. Reproduction of these documents either in hard copy or soft copy (incl
9、uding posting on the web) is prohibited without copyright permission. For copyright permission to reproduce portions of this document, please contact the TIA Standards Department or go to the TIA website (www.tiaonline.org) for details on how to request permission. Details are located at: http:/www.
10、tiaonline.org/standards/catalog/info.cfm#copyright or Telecommunications Industry Association Technology (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in th
11、e standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR consi
12、sting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope or
13、 validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or re
14、present that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development o
15、r publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Procedures for American National Standards) then (i) TIA disclaims any duty or obligation to
16、search or investigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see TIA Procedures for American National Standards Annex C.1.2.3) of Essential Patent(s) and published pending paten
17、t applications shall apply; and (iii) Information as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of
18、 the Document. TIA does not certify, inspect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF
19、 THE CONTENTS, ITS FITNESS OR APPROPRIATENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIE
20、S REGARDING THE CONTENTS COMPLIANCE WITH ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR I
21、NDIRECT, ARISING FROM OR RELATING TO ANY USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BR
22、EACH OF WARRANTY, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS.
23、TIA-102.AACA-A Contents i 1 SCOPE. 1 1.1 Introduction 3 2 REVISION HISTORY . 6 2.1 Evolution of this Document 6 3 REFERENCES . 8 3.1 Normative References: 8 3.2 Informative References: 8 4 DEFINITIONS 9 5 ABBREVIATIONS 12 6 KEY MANAGEMENT OVERVIEW . 14 6.1 Keyset Definition and Operation 16 6.2 Key
24、selection and Message Encryption . 23 6.3 Key Management Hierarchy 24 6.4 Initial Key Fill of Subscriber Units 26 6.5 Radio Set Identifiers and Key Management Groups . 26 6.6 Role of the Key Management Facility 27 7 OVERVIEW OF PROTOCOL . 29 7.1 Definition of Response Kinds 29 7.1.1 Response Kind 1
25、(None) 29 7.1.2 Response Kind 2 (Delayed) 29 7.1.3 Response Kind 3 (Immediate) 30 7.1.4 Response Kinds Summary . 31 7.2 Use of Response Kinds . 33 7.2.1 Procedures That Use Response Kind 1 (None) Messages . 33 7.2.2 Procedures That Use Response Kind 2 (Delayed) Messages . 33 7.2.3 Procedures That Us
26、e Response Kind 3 (Immediate) Messages . 34 7.3 System Parameter Summary 34 7.4 KMM Validation and Fragmentation 35 8 PROCEDURE DEFINITIONS . 38 8.1 Capabilities Procedure 39 8.2 Change-RSI Procedure . 39 8.2.1 Out of sync Message Number 43 8.3 Changeover Procedure . 43 8.4 Delete-Key Procedure . 45
27、 8.4.1 Delete Key from a Keyset . 46 8.5 Delete-Keyset Procedure 47 8.6 Deregistration Procedure . 48 8.7 Hello 50 8.7.1 Check Unit 51 8.7.2 Rekey Request . 51 TIA-102.AACA-A Figures ii 8.8 Inventory Procedure 51 8.9 Key-Assignment Procedure . 52 8.10 Modify-Key Procedure . 53 8.10.1 Change UKEK 55
28、8.10.2 Change KMG CKEK . 56 8.10.3 Change TEKs . 56 8.11 Modify-Keyset-Attributes Procedure 56 8.12 Registration Procedure 57 8.13 Rekey Procedure . 58 8.14 Set-Date-Time Procedure 60 8.15 Warm-Start Procedure . 61 8.16 Zeroize Procedure . 64 9 EXTENDED KEY MANAGEMENT PROCEDURES . 66 9.1 New Unit 66
29、 9.2 Change Key Management Group 68 9.3 Change Keyset 69 9.4 Resynchronization of TEKs . 70 9.5 Multiple Algorithm Rekey . 71 9.6 Reverse Warm Start 72 9.7 SU Initiated Rekey Request 73 10 MESSAGE DEFINITIONS 75 10.1 Message Structure 75 10.2 Message Body Definitions . 76 10.2.1 Capabilities-Command
30、 . 78 10.2.2 Capabilities-Response 79 10.2.3 Change-RSI-Command 80 10.2.4 Change-RSI-Response. 81 10.2.5 Changeover-Command 82 10.2.6 Changeover-Response . 83 10.2.7 Delayed-Acknowledgment 84 10.2.8 Delete-Key-Command 85 10.2.9 Delete-Key-Response. 86 10.2.10 Delete-Keyset-Command . 87 10.2.11 Delet
31、e-Keyset-Response 88 10.2.12 Deregistration-Command 89 10.2.13 Deregistration-Response 91 10.2.14 Hello . 92 10.2.15 Inventory-Command . 93 10.2.16 Inventory-Response . 94 10.2.17 Key-Assignment-Command 103 10.2.18 Key-Assignment-Response 106 10.2.19 Modify-Key-Command 110 10.2.20 Modify-Keyset-Attr
32、ibutes-Command . 112 10.2.21 Modify-Keyset-Attributes-Response . 114 10.2.22 Negative-Acknowledgment . 115 TIA-102.AACA-A Contents iii 10.2.23 No-Service 117 10.2.24 Registration-Command . 118 10.2.25 Registration-Response . 120 10.2.26 Rekey-Acknowledgment . 121 10.2.27 Rekey-Command 123 10.2.28 Se
33、t-Date-Time-Command . 126 10.2.29 Unable-to-Decrypt-Response . 127 10.2.30 Warm-Start-Command 130 10.2.31 Zeroize-Command 132 10.2.32 Zeroize-Response 133 10.3 Primitive Field Definitions 134 10.3.1 Algorithm ID 134 10.3.2 Body Message Format 134 10.3.3 Date 134 10.3.4 Decryption Instruction . 135 1
34、0.3.5 Hello Flag . 135 10.3.6 Inventory Type 136 10.3.7 Key . 136 10.3.8 Key Assignment ID . 136 10.3.9 Key Assignment Type . 137 10.3.10 Key ID . 137 10.3.11 Keyset ID 137 10.3.12 Key Format . 138 10.3.13 Key Name . 138 10.3.14 Keyset Format 139 10.3.15 Keyset Name 139 10.3.16 Long Key Assignment I
35、D 139 10.3.17 Long Number 139 10.3.18 Message Format . 140 10.3.19 Message Indicator 140 10.3.20 Message Length . 141 10.3.21 Number . 141 10.3.22 Optional Service ID . 141 10.3.23 RSI . 142 10.3.24 Status . 143 10.3.25 Storage Location Number . 144 10.3.26 Time 145 11 MESSAGE ID ASSIGNMENTS 147 12
36、DATA TRANSPORT MECHANISMS . 149 12.1 Common Air Interface 149 12.1.1 CAI Confirmed Delivery 149 12.1.2 CAI Data Service Access Points . 150 12.2 Data Link Dependent OTAR 150 12.2.1 Encrypted Asymmetrically Addressed DLD OTAR . 150 12.2.2 Unencrypted Asymmetrically Addressed DLD OTAR . 150 TIA-102.AA
37、CA-A Figures iv 12.2.3 Encrypted Symmetrically Addressed DLD OTAR . 150 12.2.4 Unencrypted Symmetrically Addressed DLD OTAR . 150 12.3 Data Link Independent OTAR . 151 12.3.1 KMM . 151 12.3.2 KMM Preamble . 151 12.3.3 Transport Layer 152 12.3.4 Network Layer 153 12.3.5 Data Link Layer 153 12.4 Maxim
38、um Message Length . 153 13 KEY MANAGEMENT SECURITY REQUIREMENTS FOR BLOCK ENCRYPTION ALGORITHMS . 155 13.1 Encryption Modes 157 13.1.1 Electronic Codebook (ECB) Description . 158 13.1.2 The Cipher Block Chaining-Message Authentication Code Mode . 159 13.2 DES Key Encryption (Key Wrapping) Requiremen
39、ts . 160 13.3 Enhanced Key Encryption (Key Wrapping) Requirements 161 13.3.1 Key Wrap Algorithm 163 13.3.2 Key Unwrap Algorithm 164 13.4 Field Primitives 164 13.4.1 Key Field Primitive for DES Key Encryption . 164 13.4.2 Key Field Primitive for Enhanced Key Encryption . 165 13.5 Message Authenticati
40、on 166 13.5.1 DES Message Authentication using CBC-MAC 167 13.5.2 Enhanced Message Authentication using CBC-MAC . 170 13.5.3 KMF MAC Validation 174 13.6 Message Number (MN) . 175 13.6.1 Outbound Message Number Processing 175 13.6.2 Inbound Message Number Processing . 176 13.6.3 Message Number Synchr
41、onization . 177 13.6.4 Message Number Validation . 178 13.6.5 Message Number Primitive Field 180 14 ALGORITHMS . 181 14.1 Data Encryption Standard (DES) also known as Data Encryption Algorithm (DEA). 181 14.1.1 Algorithm ID and Description 181 14.1.2 MAC Requirements 181 14.1.3 Key Encryption Exampl
42、e. 181 14.1.4 MAC Generation Example 182 14.2 Three Key Triple Data Encryption Algorithm (TDEA) also known as Triple Data Encryption Standard (Triple DES) 184 14.2.1 Algorithm ID and Description 184 14.2.2 Enhanced MAC Requirements . 184 14.2.3 Key Encryption Example. 185 14.2.4 MAC Generation Examp
43、le 185 TIA-102.AACA-A Contents v 14.3 Advanced Encryption Standard (AES) . 187 14.3.1 Algorithm ID and Description 187 14.3.2 Enhanced MAC Requirements . 187 14.3.3 Key Encryption Example. 187 14.3.4 MAC Generation Example 188 TIA-102.AACA-A Figures vi Figure 1 - Typical LMR General System Model 3 F
44、igure 2 - Secure Subscriber Unit System Level Diagram 5 Figure 3 - Data Link Dependent OSI Reference Model for SUs 15 Figure 4 - Data Link Independent OSI Reference Model for SUs . 15 Figure 5 - Key Map . 19 Figure 6 - KEK Storage Example 20 Figure 7 - Subscriber Unit Key Management Concept 22 Figur
45、e 8 - Key Selection 23 Figure 9 - Key Storage 23 Figure 10 - KMF Data Hierarchy . 25 Figure 11 - SU Storage Example 26 Figure 12 - Capabilities Procedure 39 Figure 13 - Change-RSI Procedure 40 Figure 14 - Changeover Procedure. 43 Figure 15 - Delete-Key Procedure 46 Figure 16 - Delete-Keyset Procedur
46、e 47 Figure 17 - Deregistration Procedure 49 Figure 18 - KMF Initiated Hello Procedure 50 Figure 19 - SU Initiated Hello Procedure 51 Figure 20 - Inventory Procedure . 52 Figure 21 - Key-Assignment Procedure 53 Figure 22 - Modify-Key Procedure 54 Figure 23 - Modify-Keyset-Attributes Procedure . 57 F
47、igure 24 - Registration Procedure . 58 Figure 25 - Rekey-Command 59 Figure 26 - Set-Date-Time Procedure . 61 Figure 27 - Warm-Start Procedure 62 Figure 28 - Zeroize Procedure 65 Figure 29 - Extended Key Management Procedure: New Unit . 67 Figure 30 - Extended Key Management Procedure: Change KMG 69
48、Figure 31 - Extended Key Management Procedure: Change Keyset 70 Figure 32 - Extended Key Management Procedure: Resynchronization of TEKs 71 Figure 33 Extended Key Management Procedure: Multiple Algorithm Rekey 72 Figure 34 - Extended Key Management Procedure: SU Initiated Rekey Request . 74 Figure 3
49、5 - List Inactive Key IDs Multiple Algorithm Example . 99 Figure 36 - Unable-to-Decrypt Message . 127 Figure 37 - Data Link Independent KMM Datagram 151 Figure 40 - The ECB Mode . 159 Figure 41 - The CBC-MAC Mode 160 Figure 42 - Key Encryption Process 161 Figure 43 - Key Frame Encryption 162 Figure 44 - The Authentication Algorithm 168 Figure 45 - Message Authentication . 171 TIA-102.AACA-A Figures vii Figure 46 - Message Number Validation . 179 TIA-102.AACA-A Tables viii Table 1 - Summary of Response Kind Types . 31 Table 2 OTAR Messages and Valid Response Kinds 32 Table 3