Do you know what type of encryption is actually used? Is it some variant of the voice inversion or is it actually encrypted with a specific cipher/key? Not looking for anything at the level of AES encryption or even DES, but definitely looking for something better then voice inversion.
Also, is this a form of actual encryption or just a privacy setting just tell other radios to keep the squelch closed, I.e. CTCSS? In other words would someone scanning with a DMR scanner (if exists) be able to hear the conversation?
The Vertex Standard Digital Advantage
The Vertex Standard eVerge digital radio series uses Digital Mobile Radio (DMR) Tier 2 Standard protocol. making it compatible with other makes and models of DMR supported radios, including the popular MOTO TRBO series (compatible using standard encryption). The EVX Series radios are also compatible with any existing analog two-way radio for easy migration to new digital technology and to provide maximum return on investment (ROI).
Vertex eVerge EVX-531 Digital Portable Two Way Radio
The eVerge enhanced display radios operate in both digital and analog modes on the right digital protocol: TDMA (Time Division Multiple Access), for optimum power and spectrum efficiency. TDMA is compliant with the DMR (Digital Mobile Radio) standard so eVerge digital radios are compatible with more than 74 percent of digital radios used worldwide
Vertex Standard eVerge™ New Full-Featured Digital Radios Now Shipping in North America | Business Wire
No AES or DES.....Which is what I prefer for complete communications security. DES is sufficient, in my opinion...... for common communications ( Industry - Security - Fire - EMS - Business ). No one can hear it on a scanner or with a computer program. I don't think the Chinese, Japanese or some common criminal is going to build the equipment and take the time for a brute force attack on your simple DES encryption keys ; inside your communications system.
The EVX Series radios are also compatible with any existing analog two-way radio for easy migration to new digital technology and to provide maximum return on investment
From a security standpoint - Boy.....that sure is nice to know. It is compatible with other existing radios. That just makes AES & DES Encryption that more savory to me from a communications security standpoint.
AES should be used for secret comms ( Government buildings - Businesses / industry where there is better than a fair chance of industrial sabotage - Internal security for protecting computers, plans, maps...areas that could be compromised for industrial espionage - weapons and arms depots that also hold demolitions - a comms systems where names, locations, times, medical information, and schedules is frequently discussed )...as for the covert listener not to be able to "Draw conclusions" or "figure the story out". It does not...at this time...get better than AES. The common person, the general business or Public Safety does not have to worry about a foreign government trying to listen in on their comms, SOOOOO -----> DES is sufficient. If you are a contractor and have plans, maps, drawings, technical - proprietary or secret information, and contract for the U.S Govt, then I believe you should have AES, and again if locations - names - schedules - operations - Medical - sensitive ( Social security numbers - D.O.B's ) and other things are frequently discussed, then you should have AES.
Build and customize your radio system based on the level of security needed, and the use of the radio system. Do not forget, as some businesses - industry - Public Safety..and others do not - TO BUILD a back up system, repeater, and if encrypted.... a backup analog comms system. If you have radio work done / system built = MOST DEFINATELY get a security / non-disclosure agreement for the radio system and encryption keys. You may have the cheapest bid, but is the radio tam that will be installing your radio system the right people for the job - Maturity, listen to the customer, taylor and customize the radio to the agency / customer. Cheapest bid does not always equal the right radio company.
Building a backsup system in the event of weather or some other unforeseen problems saves time - effort - headaches, and most of all........communications problems. Hurricanes, wind , lightening, hail...and other problmes wreck havoc on antennas and antenna bases.
Backup - backup - backup.
Digital ( Mototrbo - Nexedge and others ) are not totally sufficient. ONLY AES & DES are.
-------------------------------------------------------------------------------
Despite the criticisms, DES was approved as a federal standard in November 1976, and published on 15 January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed as the standard in 1983, 1988 (revised as FIPS-46-1), 1993 (FIPS-46-2), and again in 1999 (FIPS-46-3), the latter prescribing "Triple DES".
http://en.wikipedia.org/wiki/Data_Encryption_Standard
AES became effective as a federal government standard on May 26, 2002 after approval by the Secretary of Commerce. AES is included in the ISO/IEC 18033-3 standard. AES is available in many different encryption packages, and is the first publicly accessible and open cipher approved by the National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module.
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
-------------------------------------------------------------------------------------------------------------------------------
AES permits the use of 256-bit keys. Breaking a symmetric 256-bit key by brute force requires 2128 times more computational power than a 128-bit key. 50 supercomputers that could check a billion billion (1018) AES keys per second (if such a device could ever be made) would, in theory, require about 3×1051 years to exhaust the 256-bit key space.
http://en.wikipedia.org/wiki/Brute-force_attack
Strength of DES
The strength of DES is actually due to the fact that it would take a long time to guess the key that you used. Therefore, the greater the number of possible keys that COULD have been used, the longer it will take to "crack" the encryption.
If you are thinking in "ASCII" (or ANSII under Microsoft) there are 256 ASCII characters. Remembering that there are 8 individual characters to a standard DES key, we can calculate out the number of key combinations.
2568 = 256 x 256 x 256 x 256 x 256 x 256 x 256 x 256 = 18,446,744,073,709,551,616 (18.5 billion billion) possible combinations.
http://www.prlsoftware.com/des-encryption.aspx
FF - Medic !!!