Ah I see a group of traitors to our cause in the midst. My mail is not being broadcast over the air waves.
Well how in the heck is your WiFi working? You must have something else. Laser/optical communications? Sounds very cool.
balibago said:
Computer connections need to be secure to prevent theft which is always happening anyway is it not.
And NCIC/CPIC information -- which is private, should be broadcast in the clear? What about that 4 a.m. next-of-kin notification because your kid was killed overnight? Do you really want the media showing up at your place before the police do?
balibago said:
WalMart and the local plumber need to just accept that radios aren't secure, big deal!
Don't know what that has to do with anything, but OK.
balibago said:
As for the police high risk missions such as swat and drug busts must be secure.
Agreed. But what about when they're responding to a robbery in-progress, an active shooter or any other type of call where tactical advantage is lost, because some moron is streaming police communications'?
balibago said:
But we as citizens have some skin in the game and we should have access to all other comms. Or at least we should have the ability to decrypt if we are willing to put the time and effort into it.
You don't have the right to monitor private communications, but you can certainly try to do whatever you want, in the privacy of your home.
But an app will not be released anytime soon which "cracks" encryption, commonly used by law enforcement/government on P25 radio systems. There are five common algorithms which work on P25. Here they are, along with their key-lengths:
- ADP 40-bit (5-byte keys)
- DES-OFB/DES-XL 56-bit (8-byte keys)
- DVI-XL 64-bit (8-byte keys)
- DVP-XL 96-bit (12-byte keys)
- AES-256 256-bit (32-byte keys)
An algorithm's strength is not necessarily tied directly to its key-length. And for the purpose of the information I'm presenting below, I'm not taking into account how secure the hardware is, in which the algorithm is being implemented. (Side-channel attacks, key-cloning through flash ROM dumping, etc.) I'm assuming the elite radio hax0rs of Radio Reference are attempting to "crack" the key by attacking the RF interface of a system.
ADP has about 1.1 trillion possible key combinations. Yes, it could be brute-forced with a modern computer in a short period of time.
DES has about 72-quadrillion possible key variables. That's about 72,000,000,000,000,000 keys to go through, for people who don't understand numbers. DES is not a secure algorithm, but brute-forcing it still takes a considerable (to the average dude) amount of horse power. If you had an array of GPUs, it could be done in a matter of hours/days/weeks, depending on available GPU resources. Still, if the agency is using Over-the-Air-Rekeying (OTAR), you're not going to be listening for very long.
Not many agencies are using DVP-XL or DVI-XL. I did bring them up as they're still technically capable of being used to encode P25 communications. Both are weakened algorithms, intended for use in the private (business) or export sectors. They should not be used by law enforcement for modern systems.
AES-256 is the one you need to worry about. It cannot be brute-forced by current computing technology. A 256-bit key loaded into a P25 radio, looks like this:
Code:
19DDA161F9AC664D495EB20AE66327B6BFF140B9AD66953961DA2FA2D8B55A9C
To help you understand how strong AES-256 is:
https://blog.agilebits.com/2013/03/09/guess-why-were-moving-to-256-bit-aes-keys/
And for context...
How secure is AES against brute force attacks? | EE Times
...even with a supercomputer, it would take 1 billion billion years to crack the 128-bit AES key using brute force attack. This is more than the age of the universe (13.75 billion years). If one were to assume that a computing system existed that could recover a DES key in a second, it would still take that same machine approximately 149 trillion years to crack a 128-bit AES key...
And this is in reference to 128-bit keys. 256-bit keys have much more key-space available. I'm not sure about you, but I don't intend to live another 500,000,000,000,000 years. And even if I did, would the police still be using P25 radios? Would the information be relevant 500-trillion years from now?
balibago said:
Having .01 percent of the population with the skills and savvy to do it decrypting these transmissions is good for freedom and good for America!
Hopefully you understand what you're saying sounds kind of silly.