Got it

[GPON Technical Posts 11] Line Encryption Technology

Latest reply: Dec 10, 2020 17:04:17 6275 14 1 0 0

[GPON Technical Posts 11]  Line Encryption Technology-2712003-1

Hello, everyone!


In the GPON system, the OLT broadcasts downstream data to all ONUs. Therefore, downstream data may be received by unauthorized ONUs, causing security risks.


[GPON Technical Posts 11]  Line Encryption Technology-2712003-2


To solve this problem, the GPON system uses the AES-128 encryption algorithm to encrypt plaintext data packets and broadcasts them in the ciphertext. The following figure shows the line encryption process. In short, the AES-128 algorithm uses a key to change 128-bit plaintext data into another 128-bit ciphertext data for broadcasting by using a series of mathematical operations. Then, the receiving end uses a key to decrypt the ciphertext. The AES-128 algorithm uses 128 bits in both plaintext and ciphertext with the following advantages: 


1. No extra overhead on the communication line and no impact on bandwidth efficiency; 

2. No increase in transmission delay. These advantages are very beneficial to the GPON system.


Line encryption process


[GPON Technical Posts 11]  Line Encryption Technology-2712003-3


Key Exchange and Switchover


In addition, the GPON system periodically exchanges and updates the AES keys, which further improves the communication security. 



  1. The OLT initiates a key change request, and an ONU responds to the request and sends the new key to the OLT.

  2. After receiving the new key, the OLT switches the key and uses the new key to encrypt the data.

  3. The OLT notifies the ONU of the frame number of the new key by related commands.

  4. After receiving the frame number of the new key, the ONU switches the check key in the corresponding data frame.




Now, do not hesitate to read through the post and give us your correct answers. If you have any difficulty understanding the content or want to learn more about the GPON technology, please leave a message and reply to the post. We are looking forward to your comments. 

              

Answers for the previous session:  C          

    

Questions for this session:  

Which of the following statements about Line encryption are incorrect?

A. The GPON system uses the Advanced Encryption Standard 128 (AES128) algorithm to encrypt the data packets 

B. The line encryption algorithms used in GPON systems will increase overhead 

C. The line encryption algorithms will prolong transmission delays.

D. the GPON system aperiodically exchanges and updates the AES keys


     


     

[GPON Technical Posts 10] Error Correction Technology: FEC



Click to view the details of the activity.

 

Mainstream OLT, MDU, and ONT products that support GPON features include:

OLT: MA5800, EA5800, MA5680T, MA5600T

MDU: MA5633, MA5818, EA5821, MA5671

ONT: HG8240, HG8010H, HG8040, EG8080P, EG8040P


Thanks.


This article contains more resources

You need to log in to download or view. No account? Register

x

The post is synchronized to: GPON Technology

B, C, D
View more
  • x
  • convention:

B, C , D
View more
  • x
  • convention:

B, C, D
This post was last edited by lucian2003 at 2018-08-01 04:58.
View more
  • x
  • convention:

BCD
View more
  • x
  • convention:

B,C,D
View more
  • x
  • convention:

B. The line encryption algorithms used in GPON systems will increase overhead

C. The line encryption algorithms will prolong transmission delays.

D. the GPON system aperiodically exchanges and updates the AES keys
View more
  • x
  • convention:

Kindly be informed that there is no link in the main page of the activity :)
I know that from a post of Mr. Peterhof in the main page from a while ...
This post was last edited by Jamalb at 2018-08-01 09:47.
View more
  • x
  • convention:

dear admin
there is no post in the main post
i didn't knew that you published

i kept refresh and waiting all the day

by chance i find mr perterhof comment
and i found the link

i think it's not fair


the answer is

B C D
View more
  • x
  • convention:

B C D
View more
  • x
  • convention:

12
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.