eVerge gives you the capabilities of both analog & digital and privacy encryption
EVX-531 (no key), 534 (4 key), & 539 (16 key)
Set PVCY ENCR to 1 (Key On)
Privacy/Encryption; Press (or press and hold) the assigned programmable key to turn the function of Privacy on Digital CH or Encryption on Analog CH ON/OFF.
Privacy Set; Press (or press and hold) the assigned programmable key to enter the Enhanced Privacy Set mode.
Hope this helps
Do you know what type of encryption is actually used? Is it some variant of the voice inversion or is it actually encrypted with a specific cipher/key? Not looking for anything at the level of AES encryption or even DES, but definitely looking for something better then voice inversion.
Also, is this a form of actual encryption or just a privacy setting just tell other radios to keep the squelch closed, I.e. CTCSS? In other words would someone scanning with a DMR scanner (if exists) be able to hear the conversation?
Vertex eVerge EVX-531 Digital Portable Two Way RadioThe Vertex Standard Digital Advantage
The Vertex Standard eVerge digital radio series uses Digital Mobile Radio (DMR) Tier 2 Standard protocol. making it compatible with other makes and models of DMR supported radios, including the popular MOTO TRBO series (compatible using standard encryption). The EVX Series radios are also compatible with any existing analog two-way radio for easy migration to new digital technology and to provide maximum return on investment (ROI).
Vertex Standard eVerge™ New Full-Featured Digital Radios Now Shipping in North America | Business WireThe eVerge enhanced display radios operate in both digital and analog modes on the right digital protocol: TDMA (Time Division Multiple Access), for optimum power and spectrum efficiency. TDMA is compliant with the DMR (Digital Mobile Radio) standard so eVerge digital radios are compatible with more than 74 percent of digital radios used worldwide
From a security standpoint - Boy.....that sure is nice to know. It is compatible with other existing radios. That just makes AES & DES Encryption that more savory to me from a communications security standpoint.The EVX Series radios are also compatible with any existing analog two-way radio for easy migration to new digital technology and to provide maximum return on investment
http://en.wikipedia.org/wiki/Data_Encryption_StandardDespite the criticisms, DES was approved as a federal standard in November 1976, and published on 15 January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed as the standard in 1983, 1988 (revised as FIPS-46-1), 1993 (FIPS-46-2), and again in 1999 (FIPS-46-3), the latter prescribing "Triple DES".
http://en.wikipedia.org/wiki/Advanced_Encryption_StandardAES became effective as a federal government standard on May 26, 2002 after approval by the Secretary of Commerce. AES is included in the ISO/IEC 18033-3 standard. AES is available in many different encryption packages, and is the first publicly accessible and open cipher approved by the National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module.
http://en.wikipedia.org/wiki/Brute-force_attackAES permits the use of 256-bit keys. Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key. 50 supercomputers that could check a billion billion (1018) AES keys per second (if such a device could ever be made) would, in theory, require about 3×1051 years to exhaust the 256-bit key space.
Strength of DES
The strength of DES is actually due to the fact that it would take a long time to guess the key that you used. Therefore, the greater the number of possible keys that COULD have been used, the longer it will take to "crack" the encryption.
If you are thinking in "ASCII" (or ANSII under Microsoft) there are 256 ASCII characters. Remembering that there are 8 individual characters to a standard DES key, we can calculate out the number of key combinations.
2568 = 256 x 256 x 256 x 256 x 256 x 256 x 256 x 256 = 18,446,744,073,709,551,616 (18.5 billion billion) possible combinations.
I was not referring to "Big Brother" , and it is almost common knowledge that before an encryption program, or standard is manufactured and sold - IT MUST first go through the U.S. Government.Anything with RF can be monitored by Big Brother. Even cell phones and internet.