Now as to old voice inversion,.. there is a scanner that is on ebay right now that defeats it. That is why anyone that still uses inversion needs to upgrade to a form of encryption.
AZScanner said:Here's the part that we're interested in for this thread:
Now if the IMBE voice is encrypted we are out of luck, sort of... APCO-25 calls for a the DES encryption method with 56bit keys. I guess there are public domain DES rotines out there, anyone what to try and decode a DES encrypted call, might take years. I have a theory, since I have noticed that IMBE voice calls always begin and end with a fixed pattern we have information that makes it tons easier to decrypt. We can try different keys on the data until it matches this fixed pattern at the begining and end of the IMBE voice call... once we have the key its simple to run the DES decoder and get the raw unencrypted IMBE voice data.
Sounds wonderful, doesn't it? Well unfortunately for this guy (and the rest of us) Motorola was smarter than that. I know, I know... total bummer.
:lol: :wink: I'm not sure of costs but you'll need to upgrade the key management server so it can properly load AES keys, replace every encryption module in each subscriber unit, update the DIUs for the consoles, and if there are any, upgrade the handheld key loaders (similarly to how the KMF is).mdfillipp said:I always love it when wayne speaks: it just makes more sense and clears everything up.
I'm glad you brought up my area's system. While we are on the subject, wayne, how much trouble would, or will, it be to convert an existing P25 3600 smartzone system using des-ofb, such as OC's, into one using aes, in terms of time, money and/or effort?
wayne_h said:Huh? Motorola didn't develop the APCO-25 standard, nor DES encryption. He basically states that if one was to attempt to crack the encrypted voice portion that it would be much easier than doing a standard DES crack. Also, OSPs are flagged as encrypted or clear. The scanner doesn't need to examine the data stream for any kind of pattern; that's not realistic due to the amount of analyzing required. There's no frequency threshold since it's all 1s and 0s. My 96 never stops on an encrypted call, it only does if the call goes from clear to encrypted without repeater dekey, which can also be prevented.
You'll also have to code in the algorithm for IMBE so you can turn the bits you somehow managed to decrypt into voice. Running it back into a scanner isn't realistic (waaay too much trouble); it's easiest to write the code to decode the voice. AND, yes, you will need a fast computer to crack DES. If DES was that easy to crack with a slow computer then it would have been done years ago with a 386 (Any 'old computer,' give me a break!!). AZScanner, you really need to read more into it as you're passing way too much amateur judgement. Try some of the common password cracking programs out there and even with a P4 whatever it will still take time. So no, you won't be burning a CD, listening to net music, and cracking DES all at the same time with your home PC. In this application you have several more steps to take care of compared to cracking some encrypted data on a computer.
-Wayne
Heterodyne said:This thread is the funniest thread ever.
AZScanner said:Well bravo for you Wayne, you sure put me in my place. :roll:
-AZ
frootydawg said:When I was in the military I was assigned to one of the alphabet soup agencies. Back then we used Motorola MX350S' ,with D.E.S., and we keyed loaded each radio once a week. Eventually this agency went to Saber radios, with O.T.R. capabilty, and would re-key everyday. Presently, their security ops use full time encryption and re-key over the air once a day.
mr_hankey said:scan your input frequencies....