I tried searching for an answer to this but couldn't find one. If i have a P25 capable scanner and i can get my hands on the proper encryption key can that be programmed into the scanner so that i can hear encrypted traffic?
Nope.I tried searching for an answer to this but couldn't find one. If i have a P25 capable scanner and i can get my hands on the proper encryption key can that be programmed into the scanner so that i can hear encrypted traffic?
I tried searching for an answer to this but couldn't find one. If i have a P25 capable scanner and i can get my hands on the proper encryption key can that be programmed into the scanner so that i can hear encrypted traffic?
They do, however have the processors needed to decrypt an encrypted transmission. It can, and has been implemented in software. There is a thread on RR somewhere about. A aftermarket firmware that will allow encryption keys to be loaded. One of the things that favored AES was the efficiency of implementation, to be able to both encrypt and decrypt data, along with how quickly it can do it.1. Scanners do not come with the necessary encryption electronics board/circuitry module required to decrypt anything encrypted. Modes such as DMR, P25II, FSK, etc. are NOT encryption.
No, there isn't an infinite number of keys. There is a very defined limit, that is easily calculated, and is a function of the key type(ASCII/Base16/Based ect) and the number of bits the key length is2. Keys are varying length and contain randomized characters. There are nearly an infinite number of keys for one encryption method and keys can change from annually to several times daily.
While AES256 is currently, AFIAK, secure, it's greatest weakness is how it is deployed. You don't always need to defeat the cipher, to access the data that is encrypted.3. Unless you are a highly placed member of the NSA / Central Security Service, GCHQ, MSS, Special Communications Service or a similar government service; it is very unlikely you will find the 'backdoor' to the processor chips which would allow decrypted access to the device or the computing power required to do a 'brute force' attack on consumer grade encryption. Trying to crack EAMs? FSK traffic from an E-4B Nightwatch, or secure State Department satellite traffic? You should have a Ph.D. in abstract mathematics and an exceptional understanding of it at the highest levels of academia.
I guess the HP436 and 536 I have running with the CFT firmware that decrypts AES and DES flawlessly with the proper key is all my imagination because the "necessary encryption electronics module" is not in it?1. Scanners do not come with the necessary encryption electronics board/circuitry module required to decrypt anything encrypted. Modes such as DMR, P25II, FSK, etc. are NOT encryption.
For a device to have FIPS certification it must be tamperproof, thus the "module" which has physical security hardware to prevent one from probing it and extracting the key. If an agency wishes to write down the key variable onto a notepad and hand it to someone to enter into a modified scanner, they are opening up a can of worms as far as the overall security of the network. With OTAR and even with KVL's, once entered, the key variable cannot be read out/ There are even provisions to create a randomized key variable without a human typing one in. So the concept of a software device to allow one to manually enter the key variable, while possible, is not a recommended practice. I don't know how Unication accomplishes this with their third party software, but hope it has been scrutinized for leaks.I guess the HP436 and 536 I have running with the CFT firmware that decrypts AES and DES flawlessly with the proper key is all my imagination because the "necessary encryption electronics module" is not in it?
No, it does not pick keys out of the air, but the OP didn't indicate anywhere in the post they were searching for a magic pill. Works just as well as a G series pager.
OP: The x27/CFT project will do exactly what you need if you own a Uniden scanner, and you can choose and pay for only those features you need.
CFT Firmware for Uniden
Makes me wonder how many techs actually have physical or "need to know" access to keys. With keys generated by NSA-affiliated systems and securely transmitted to subscribers' (server) key vaults and then OTAR into subscriber radios, it would seem there isn't much need for a tech to have physical access to a key.However my experience is it will be exceptionally difficult to obtain a key. I'm sure more than one radio tech has said "My toothbrush, maybe. My wife, possibly. My encryption key, NEVER".
Thanks for the reply! and no i'm not looking to pull a encryption key out of thin air. just wondering if someone gave me the the key could i somehow use it? and yes i understand its illegal. Friends in high places lolI guess the HP436 and 536 I have running with the CFT firmware that decrypts AES and DES flawlessly with the proper key is all my imagination because the "necessary encryption electronics module" is not in it?
No, it does not pick keys out of the air, but the OP didn't indicate anywhere in the post they were searching for a magic pill. Works just as well as a G series pager.
OP: The x27/CFT project will do exactly what you need if you own a Uniden scanner, and you can choose and pay for only those features you need.
CFT Firmware for Uniden
I apologize for saying nope. I'm an idiot as I actually have the CFT FW and it works well.Thanks for the reply! and no i'm not looking to pull a encryption key out of thin air. just wondering if someone gave me the the key could i somehow use it? and yes i understand its illegal. Friends in high places lol
I did an audit (Radio System replacement study) of a federal facility and had to go through hoops to document (no pictures) the KMF rack and chassis configuration in a vault at HQ. The vault had lots of other stuff, lots of paper! that had to be put away and/or covered up just for me to enter with a notepad and pencil. You can be sure nobody there was handing out the key variables if they could even observe them at all. If you need them for whatever reason it was OTAR only and only for radios in the inventory. This was a serious place with machine guns in the racks behind the metal detectors at the entrance.Makes me wonder how many techs actually have physical or "need to know" access to keys. With keys generated by NSA-affiliated systems and securely transmitted to subscribers' (server) key vaults and then OTAR into subscriber radios, it would seem there isn't much need for a tech to have physical access to a key.
For contrast, over here public safety radio are handle by generic commercial entity and the tech do have the key.I did an audit (Radio System replacement study) of a federal facility and had to go through hoops to document (no pictures) the KMF rack and chassis configuration in a vault at HQ. The vault had lots of other stuff, lots of paper! that had to be put away and/or covered up just for me to enter with a notepad and pencil. You can be sure nobody there was handing out the key variables if they could even observe them at all. If you need them for whatever reason it was OTAR only and only for radios in the inventory. This was a serious place with machine guns in the racks behind the metal detectors at the entrance.
Potentially a problem as in similar cases the key was distributed to tow truck companies, private security, and biker gangs.For contrast, over here public safety radio are handle by generic commercial entity and the tech do have the key.
FIPS certification is also able to be achieved in software. When I was implementing a MDC system for my city a specific software VPN was requested by DOJ to be used for CLETS and NCIC certification. The VPN portion was FIPS certified and accepted by both CA State and Federal DOJ.For a device to have FIPS certification it must be tamperproof, thus the "module" which has physical security hardware to prevent one from probing it and extracting the key. If an agency wishes to write down the key variable onto a notepad and hand it to someone to enter into a modified scanner, they are opening up a can of worms as far as the overall security of the network. With OTAR and even with KVL's, once entered, the key variable cannot be read out/ There are even provisions to create a randomized key variable without a human typing one in. So the concept of a software device to allow one to manually enter the key variable, while possible, is not a recommended practice. I don't know how Unication accomplishes this with their third party software, but hope it has been scrutinized for leaks.
A tech programming a radio, doesn't need physical access to keys at all. They can be loaded into a KVL, then loaded into the radio with out the tech ever seeing the key.Makes me wonder how many techs actually have physical or "need to know" access to keys... it would seem there isn't much need for a tech to have physical access to a key.
As funny as it sound 50% of it still in the clear.Potentially a problem as in similar cases the key was distributed to tow truck companies, private security, and biker gangs.
not familiar with KVL, is this:A tech programming a radio, doesn't need physical access to keys at all. They can be loaded into a KVL, then loaded into the radio with out the tech ever seeing the key.