N_Jay said:The issue is (As it is with just about every discussion on secure radio systems) that there is always a vocal group with the position that today's systems are not secure enough, and therefor why both securing the system.
N_Jay said:When IN FACT the current technology is plenty secure for the purpose,
N_Jay said:and even the systems from generation or two ago are still secure enough for the purpose.
N_Jay said:No, most are being replaced as part of SYSTEM changes.
SKEYGEN said:In this case, they were being replaced at that time only because of a mandate from the Defence Signals Directorate that says agencies must get rid of DES by 1 January 2005, due to security concerns.
http://www.dsd.gov.au/library/infosec/single_des.html
SKEYGEN said:The "vocal group" in this case includes the people responsible for making such decisions, e.g. NIST in the USA, DSD in Australia.
N_Jay said:I meant the vocal group here (which I doubt work for NIST or DSD).
SKEYGEN said:The vocal group say it with good reason, and expert opinion at agencies such as those mentioned, as well as the wider security community, backs it up.
There is no cryptographic difference between DES applied to CVSD voice, and DES applied to frame relay traffic, or Ethernet, or an e-mail message etc. With that in mind, what would make you think there is somehow a security difference between DES coded traffic transported over RF rather than any other medium?
The answer to that is there is no difference in security between mediums. A cipher is a cipher, and the nature of the data protected by a particular cipher is irrelevant. CVSD voice is so widely used in everything from Bluetooth headsets to radio equipment (not just SECURENET, but a huge assortment of military radio systems) to field telephones etc that a signals intelligence agency or anyone else in the business of breaking secure communications systems isn't going to have much trouble correctly detecting a valid result. For example, near silence in CVSD has a telltale 0101010101 pattern that will essentially never be seen in encrypted data, and syllables are also fairly easy to detect. Basically, if you don't have random hash, there's a good chance you've got the key right.
hotdjdave said:I keep hoping to see the real: "I got it! Here is the answer: ..."
Dave,hotdjdave said:Man, oh, man, this thread/poll has taken a turn south. I cannot figure out why it has become an argument. ...
paulrrulon said:.....Some thought the Enigma would never be broken .
Thanks....
gcgrotz said:Correct me on this but did we break the code or just steal a machine or two?
There's a website somewhere I saw recently that had an Enigma machine simulator on it, I think it was from an article in Pop' Comm.
gcgrotz said:Hi N_Jay!
Yeah I thought so. Did you see the movie "Code Talkers"? Now that was a brilliant idea. Wouldn't you love to have been in on the meetings the Japanese had? "What do you mean you can't translate it?"