I'm using both encrypted talk groups and non-encrypted talk groups on an 800MHz NexEdge trunking system. NX-900 mobiles and NX-410 portables. Zero difference in coverage. The encryption just rearranges the 0's and 1's of the digital signal.
My question has to do with nxdn 15 bit scrambling and the issue I discovered only pertains to basic privacy schemes.
If you have a system with a few TG's and you enable them all with 15 bit scramble, but you want one of the TG s to have a unique scramble key to prevent users on the other groups from hearing the conversation, is there any chance the keys would be similar and allow partial decoding?
I'll have to test this myself, because i ran into this setting up a Hytera system with Hytera basic privacy.
If the key doesn't have at least 4-5 different digits than another key, you will get a partial decode.
I see NXDN loads registers with the key data and generates a PN sequence for scrambling.
Do each of the 32,000+ keys differ enough to prevent partial decoding?