Note: M = Mandatory, O = Optional Feature | DECT GAP | DECT Security | WHAT DO THESE FEATURES MEAN? |
---|
Registration procedure and time limits for setting of a44 bit | O | M | The base station will not be kept “open for registration” for longer than 120 seconds | "Encryption activation FT initiated" (Base & Handset) Note : all voice calls encrypted | O | M | The base station and handset will support encryption activation, and the base will activate it for all calls (including voice calls, List Access sessions, SUOTA/ Light data services, etc.) | On air key allocation (Base & Handset) | O | M | The base station will create and allocate a (64 bit) authentication key (UAK) when the handset is registered | Authentication of PP (Base & Handset) | O | M | The base can authenticate the handset (utilizing its UAK), to ensure it is the genuine handset, and not an intruder or an attempt to imitate the real handset. | Evaluation of peer sides behavior regarding encryption including timeout values for triggering of call release | O | M | If the peer behaves differently as expected, e.g. it doesn’t initiate encryption in a timely manner, then the device will assume it is an attempt to breach security and the call will be dropped | Early encryption | O | M | Guarantees encryption activation immediately after connection establishment, before any higher layer protocol messages are exchanged (including Caller ID, dialed digits, etc.) | Procedure for re-keying with a new derived cipher key during a call | O | M | The cipher key used by the encryption engine is updated at least once per 60 seconds, to foil any attempt to crack the ciphering by brute-force techniques e.g. like super computing |
|