Im just curious about how different standards are encrypted . Yes I know I can Google the miscellaneous standards and read dry technical documents . What Im looking for is just simplified explanations of the common standards that you will see today ( EDACS , PRO95).
Also I was wondering how a company decodes standards so they can be a feature included say in a new line of products ( like dual trunking ). I assume newer stuff has digital keys that both radios in a talk group have to share and compare to talk to each other ? if so can you brute force a key with a saved "conversation" and a computer running possible combinations ;even though you would need to detect a "voice" otherwise you would need to listen to each attempt .
If you have physical access to say a radio that is setup on a encrypted setup like whatever the U of A security uses ( I am on campus a-lot.....) can you simply view whatever "key" is programed into the radio and then be able to program it into a scanner and listen?
Thanks for your time . I understand that some of this may be incorrect in thinking .
Also I was wondering how a company decodes standards so they can be a feature included say in a new line of products ( like dual trunking ). I assume newer stuff has digital keys that both radios in a talk group have to share and compare to talk to each other ? if so can you brute force a key with a saved "conversation" and a computer running possible combinations ;even though you would need to detect a "voice" otherwise you would need to listen to each attempt .
If you have physical access to say a radio that is setup on a encrypted setup like whatever the U of A security uses ( I am on campus a-lot.....) can you simply view whatever "key" is programed into the radio and then be able to program it into a scanner and listen?
Thanks for your time . I understand that some of this may be incorrect in thinking .