• To anyone looking to acquire commercial radio programming software:

    Please do not make requests for copies of radio programming software which is sold (or was sold) by the manufacturer for any monetary value. All requests will be deleted and a forum infraction issued. Making a request such as this is attempting to engage in software piracy and this forum cannot be involved or associated with this activity. The same goes for any private transaction via Private Message. Even if you attempt to engage in this activity in PM's we will still enforce the forum rules. Your PM's are not private and the administration has the right to read them if there's a hint to criminal activity.

    If you are having trouble legally obtaining software please state so. We do not want any hurt feelings when your vague post is mistaken for a free request. It is YOUR responsibility to properly word your request.

    To obtain Motorola software see the Sticky in the Motorola forum.

    The various other vendors often permit their dealers to sell the software online (i.e., Kenwood). Please use Google or some other search engine to find a dealer that sells the software. Typically each series or individual radio requires its own software package. Often the Kenwood software is less than $100 so don't be a cheapskate; just purchase it.

    For M/A Com/Harris/GE, etc: there are two software packages that program all current and past radios. One package is for conventional programming and the other for trunked programming. The trunked package is in upwards of $2,500. The conventional package is more reasonable though is still several hundred dollars. The benefit is you do not need multiple versions for each radio (unlike Motorola).

    This is a large and very visible forum. We cannot jeopardize the ability to provide the RadioReference services by allowing this activity to occur. Please respect this.

Russian Military using Motorola Digital👀

Status
Not open for further replies.

KE5ZBG

NMSAR
Premium Subscriber
Joined
Jun 22, 2015
Messages
138
Location
New Mexico
Also reports of DMR flowing over Iridium satellites, unsure from what user.
Apologies for the late reply, Russia's Meridian satellites would be a better fit here. (The uplink coincides with the repeater portion of the 70 cm in some parts of the world, and coincidentally they pick up amateur DMR traffic at times.)
 

ElroyJetson

Getting tired of all the stupidity.
Joined
Sep 8, 2002
Messages
3,881
Location
Somewhere between the Scylla and Charybdis
Motorola is an international company with customers literally worldwide. They'll sell to anybody unless they're formally under economic sanctions that prohibit selling of that product category to a specific nation.

It's be far more surprising if Russians did NOT have some Motorola equipment.
 

prcguy

Member
Premium Subscriber
Joined
Jun 30, 2006
Messages
16,307
Location
So Cal - Richardson, TX - Tewksbury, MA
Apologies for the late reply, Russia's Meridian satellites would be a better fit here. (The uplink coincides with the repeater portion of the 70 cm in some parts of the world, and coincidentally they pick up amateur DMR traffic at times.)
They would not be accessing those satellites with a rubber duckie antenna and I don’t see any external antennas.
 

Bowlieweekender

Encryption is Easy - Key Management is Hard
Premium Subscriber
Joined
Aug 6, 2006
Messages
70
Location
Prineville Oregon
Many videos of Russian soldiers using MotoTrbo. The quick and easy way to ID is by the talk permit tone. I’ve heard both encrypted and clear talk permit tones being used.

Depending on which level of encryption they are using - simple - advanced might make breaking their “encryption” pretty easy. In general they aren’t using repeaters but only simplex.

Their latest and greatest military radio is the Azart - made in China. Don’t be fooled though, the Azart is a pretty respectable radio in its own right. Covers low band, VHF high, and UHF with the ability to pass data and perhaps even photos. They just don’t have them to issue in mass. I’d like to get my hands on one just to have a super fly all band portable. Perhaps after the war they will start appearing on the market.
This is all correct. Ukraine uses a lot of MotoTRBO simplex and through repeaters all with AES. The AZART is super capable AM/FM/WFM/TETRA/Encryption/FastFrequencyHopping, but the company and military contracts were mired with corruption and the 99% Taiwanese sourced components are very hard to procure because of biting sanctions. So they are becoming rarer in the battlefield. Ukraine probably has captured 20% of the deployed Ukrainian AZARTS. Russia is currently heavily DMR, they started with Motorola and Hytera mostly simplex though the radio's are expensive and no radioman in the field any longer believes that AES-256 is actually secure so an alternative solution was sought. Russian armor is often equipped with well known Chinese sourced DMR mobiles that would be very familiar to any radio amateur. They are just introducing the plastic KOMBAT radio using 100% Chinese components. More akin to a Baofeng than an Azart they are programmable with an Android phone (very smart move) using a little dongle and support both AES-256 and the newly minted WAES-512 encryption. The KOMBAT case design bears a striking resemblance to the Motorola XPR 7550.
 

Attachments

  • KOMBAT.jpeg
    KOMBAT.jpeg
    72.7 KB · Views: 48

N4DES

Retired 0598 Czar ÆS Ø
Joined
Dec 19, 2002
Messages
2,457
Location
South FL
Nope, MAES-512. see attached

Which is the "light version" of AES according to the IEEE and they don't classify it as having a 512 bit key size.

MAES is a lightweight version of the Advanced Encryption Standard (AES) that is designed to be used in resource-constrained environments such as the Internet of Things (IoT) devices. The algorithm is optimized for energy consumption and moderate security.

While AES is a symmetric block cipher used to encrypt sensitive data, it is considered to be one of the most secure encryption algorithms available today. The key sizes for AES are 128, 192, or 256 bits, and the block size is 128 bits. AES has been adopted by the U.S. government and is a security standard for users and applications that need easy-to-use encryption.

MAES, on the other hand, uses a new 1-dimensional Substitution Box that is proposed by formulating a novel equation for constructing a square matrix in affine transformation phase of MAES. The efficiency rate of MAES is around 18.35% in terms of packet transmission, which indicates that MAES consumes less energy than AES and is applicable for Resource Constraint Environments. However, MAES is not as secure as AES and is not recommended for use in applications that require high levels of security.


 
Last edited:

Bowlieweekender

Encryption is Easy - Key Management is Hard
Premium Subscriber
Joined
Aug 6, 2006
Messages
70
Location
Prineville Oregon
Russia probably doesn't care what the IEEE classifies it as. Because AES-256 has been compromised on the battlefield, this Modified version probably adds a homegrown spin to further thwart efforts to decode it using existing tools available to government agencies. There's a competition in Russia right now offering many Rubles to the first person who breaks it and demonstrates the methodology.

And I quote:
Modified AES 512

THE COMPETITION CONTINUES!!

WE INCREASE REMUNERATION

1,000,000 rubles

Any person or team that can break the encryption algorithm
Modified AEC 512 bit
 

ElroyJetson

Getting tired of all the stupidity.
Joined
Sep 8, 2002
Messages
3,881
Location
Somewhere between the Scylla and Charybdis
If AES-256 has been compromised I sure want to read some documentation on that.

It's a devilishly tough trick to create an encryption standard that has two keys, one being variable, and the other being a secret pre-determined back door. Especially when the entire standard's algorithm is totally in the public domain.

Frankly I'm quite skeptical that it has been compromised. More likely someone's key got compromised due to his own slackadaisical handling of the keying materials. Probably wrote his key on a business card which a Ukrainian hooker found when she stole his wallet after an evening's romp.
 

DeoVindice

P25 Underground
Joined
Sep 27, 2019
Messages
515
Location
Gadsden Purchase
If AES-256 has been compromised I sure want to read some documentation on that.

It's a devilishly tough trick to create an encryption standard that has two keys, one being variable, and the other being a secret pre-determined back door. Especially when the entire standard's algorithm is totally in the public domain.

Frankly I'm quite skeptical that it has been compromised. More likely someone's key got compromised due to his own slackadaisical handling of the keying materials. Probably wrote his key on a business card which a Ukrainian hooker found when she stole his wallet after an evening's romp.
That, keys extracted from captured radios (no FIPS-certified hardware encryption!) or some kind of TRBO-specific exploitation. I'm aware of some Chinese DMR radios having initialization vector vulnerabilities in their AES-256 implementation.
 

ElroyJetson

Getting tired of all the stupidity.
Joined
Sep 8, 2002
Messages
3,881
Location
Somewhere between the Scylla and Charybdis
As a matter of fact, a patient man with good soldering skills can transport the EEPROM in certain Harris[M-A-Com] radios from one to another and in doing so, transfer all the encryption keys along with it, if infinite key retention is enabled. (P7100) I've done it. Couldn't read it out, but I could transport the key intact.
 

Bowlieweekender

Encryption is Easy - Key Management is Hard
Premium Subscriber
Joined
Aug 6, 2006
Messages
70
Location
Prineville Oregon
You don't have to Google very hard to find answers already in the public domain.

May 19, 2023 — Russian EW is also apparently achieving real time interception and decryption of Ukrainian Motorola 256-bit encrypted tactical communications ...

Attached is the previous Russian radio series able to change parameters and keyfill using an Android phone and regular Chinese programming cable connected to a USB to USB-C adapter
 

Attachments

  • COMBAT_FIELD_PROGRAMMING.jpeg
    COMBAT_FIELD_PROGRAMMING.jpeg
    118.9 KB · Views: 43

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
6,825
Location
Sector 001
You don't have to Google very hard to find answers already in the public domain.

May 19, 2023 — Russian EW is also apparently achieving real time interception and decryption of Ukrainian Motorola 256-bit encrypted tactical communications ...

Attached is the previous Russian radio series able to change parameters and keyfill using an Android phone and regular Chinese programming cable connected to a USB to USB-C adapter
Again, keys are compromised, not a defeated algorithm.

There is a big difference.
 
Status
Not open for further replies.
Top