background image

–     –

–     –

4

5

Security Overview

The HS Long-Range Handheld transmitter uses the HS Series encoder, 
which is based on Cipherlinx™ technology. CipherLinx™ is a high-security 
encryption algorithm and wireless protocol designed for remote control 
and remote keyless entry applications. It provides a much greater level 
of security and many more features than older technologies on the 
market, such as fixed address or “rolling code” systems. Additionally, the 
CipherLinx™ protocol is much more advanced than the simple PWM 
method employed by many systems. By utilizing an advanced serial 
protocol, CipherLinx™ is able to offer superior noise immunity, greater 
range, and greater link reliability, all of which are key factors in a wireless 
system. 

CipherLinx™ never sends or accepts the same data twice, never loses 
sync, and changes codes with every packet, not just every button press. 
The encryption that is used in CipherLinx™ is based on the Skipjack cipher 
developed by the U.S. National Security Agency (NSA), and is widely 
considered one of the most secure ciphers available. The CipherLinx™ 
algorithm has been evaluated by Independent Security Evaluators (ISE), 
a company that has testified before Congress as experts on electronic 
security. They concluded that “In short, the CipherLinx™ protocol in the HS 
Series is well-designed and is an excellent choice for applications requiring 
a secure unidirectional link.” 

In addition to this high level of security, CipherLinx™ also offers a number 
of features that are unique among remote control products. These include 
a large number of data lines, internal key generation, “button level” control 
permissions, an optional encoder PIN, as well as the ability for the decoder 
to identify the originating encoder.

CipherLinx™ is based on the NSA-designed cipher Skipjack. Skipjack is 
a block cipher that has 80-bit keys and 64-bit data blocks. Since each 
packet is longer than 64 bits, Skipjack must be employed in an encryption 
mode. The particular encryption mode chosen for CipherLinx™ is based 
on the CMC encryption mode, so that the resulting cipher is a special kind 
of function known as a “strong PRP” (sPRP). The encryption mode uses 
several invocations of Skipjack to encrypt the 128 bits in each message. 
The definition of these terms is quite involved, but more details can be 
found in ISE’s evaluation report at www.cipherlinx.com. 

The HS Series uses a 40-bit counter to change the appearance of each 

message. This large counter value and the timing associated with the 
protocol ensure that the same message is never sent twice and prevents 
the encoder from ever losing sync with the decoder.

The user generates the key with the decoder through multiple button 
presses. This ensures that the key is random and chosen from among all 
280 possible keys. Since all of the keys are created by the user and are 
internal to the part, there is no list of numbers anywhere that could be 
accessed to compromise the system.

The user or manufacturer may also set “button level” Control Permissions.
Control Permissions determine how the decoder will respond to the 
reception of a valid command, either allowing the activation of an individual 
data line or not. The decoder is programmed with the permission settings 
during set-up, and those permissions are retained in the decoder’s 
non-volatile memory.

Summary of Contents for HS Long-Range

Page 1: ...HS Long Range Handheld Transmitter Data Guide...

Page 2: ...Life Safety Situations but only with necessary and industry appropriate redundancies and in compliance with applicable safety standards including without limitation ANSI and NFPA standards It is sole...

Page 3: ...eries encoder which uses Cipherlinx technology a high security encryption algorithm and wireless protocol When paired with an HS Series decoder transmitter identity can be determined and button permis...

Page 4: ...sful the decoder s outputs are set to replicate the transmitter s button states These outputs can then be used to activate external circuitry required by the application The transmitter is compatible...

Page 5: ...r of data lines internal key generation button level control permissions an optional encoder PIN as well as the ability for the decoder to identify the originating encoder CipherLinx is based on the N...

Page 6: ...tch In an HS based system the keyfobs could easily be configured GET_KEY Button CREATE_PIN Button MODE_IND Window Figure 5 Button Access Holes to open only certain doors guess which one Son gets to op...

Page 7: ...CR2032 lithium button cell In normal use it provides 1 to 2 years of operation To replace the battery remove the access cover by pressing firmly on the label area and sliding it off Once the unit is o...

Page 8: ...atever function is required by the application The transmitter and decoder must be synchronized before they can work together This is done by creating a new encryption key in the decoder then transfer...

Page 9: ...tion manual or insert card EU does not require a statement INSTRUCTION TO THE USER This device complies with Part 15 of the FCC Rules and Industry Canada license exempt RSS standard s Operation of thi...

Page 10: ...om antennas and design services are available along with simulations of antenna performance to speed development Learn more at www linxtechnologies com VCC R1 100k SW1 1 SW2 2 SW3 3 SW4 4 SW5 5 SW6 6...

Page 11: ...stomer including without limitation breach of contract breach of warranty strict liability or negligence Customer assumes all liability including without limitation liability for injury to person or p...

Reviews: