• To anyone looking to acquire commercial radio programming software:

    Please do not make requests for copies of radio programming software which is sold (or was sold) by the manufacturer for any monetary value. All requests will be deleted and a forum infraction issued. Making a request such as this is attempting to engage in software piracy and this forum cannot be involved or associated with this activity. The same goes for any private transaction via Private Message. Even if you attempt to engage in this activity in PM's we will still enforce the forum rules. Your PM's are not private and the administration has the right to read them if there's a hint to criminal activity.

    If you are having trouble legally obtaining software please state so. We do not want any hurt feelings when your vague post is mistaken for a free request. It is YOUR responsibility to properly word your request.

    To obtain Motorola software see the Sticky in the Motorola forum.

    The various other vendors often permit their dealers to sell the software online (i.e., Kenwood). Please use Google or some other search engine to find a dealer that sells the software. Typically each series or individual radio requires its own software package. Often the Kenwood software is less than $100 so don't be a cheapskate; just purchase it.

    For M/A Com/Harris/GE, etc: there are two software packages that program all current and past radios. One package is for conventional programming and the other for trunked programming. The trunked package is in upwards of $2,500. The conventional package is more reasonable though is still several hundred dollars. The benefit is you do not need multiple versions for each radio (unlike Motorola).

    This is a large and very visible forum. We cannot jeopardize the ability to provide the RadioReference services by allowing this activity to occur. Please respect this.

Wondering how encryption works.

Thatsclear

Member
Joined
Oct 25, 2019
Messages
108
I'm just curious of an example of a encryption code? I mean AES256 for instance, is it just "ABCDF1873487934594DJHSGFD9584857HFKHFJKFHSF8957304" --- but 256 characters and that is what is done? Just some random string of letters precents people from hearing?

thanks
 

a417

Active Member
Joined
Mar 14, 2004
Messages
4,669
Do you know how encryption in computers works?
Like when something is encryted to be sent and recieved, or are you asking for a really ELI5-type breakdown?

Understanding what you know (or think you know) will help the hive-mind here possibly help you.

This information is found all-over the internet, the only real functional difference with radios is that it is sent over RF...no wires.

You can go into any search engine on any platform and google "how encryption works" and find a very large amount of content out there.
 

KevinC

The big K
Super Moderator
Joined
Jan 7, 2001
Messages
12,522
Location
1 point
0-9 and A-F. Such as...

0B561C11C750819B8675E2089E6298B3B614F99C763E33B3F4BAF42887F2C4AB
And of course my example isn't...

a cryptographically strong key that involves 14 rounds of randomization, SHA-512, PBKDF2, HMAC, a 64 byte initial token, a 64 byte dynamic salt, and 1 million iterations
...but I seriously doubt anyone will figure out any key variable I use. :p
 

GlobalNorth

Active Member
Premium Subscriber
Joined
May 2, 2020
Messages
2,301
Location
Fort Misery
Learn quantum encryption. There's a ton of cash to be made in it and you'll single handedly earn an Intelligence Star medal from the IC.
 

merlin

Active Member
Joined
Jul 3, 2003
Messages
3,124
Location
DN32su
Not too complicated. ALL trunking and DMR is digital weather voice or data. Encryption passes that data through an algorytm that permutes shifts, and obfuscates that digital stream (Cypher text). Now that algorythm uses a "KEY" to both encrypt and restore the original
back to plain text. That "KEY" is internally gennerated from a 'seed'. That seed may be 64 to 256 'bits'.
That means without that correct 'seed', there can be as many as 255^255 possible cobinations, and only one correct one to decypher the data stream.
 

Attachments

  • Block-diagram-for-AES-encryption-and-decryption.png
    Block-diagram-for-AES-encryption-and-decryption.png
    232 KB · Views: 22

David628

Member
Joined
Jan 9, 2010
Messages
238
Location
Colorado
“I'm just curious of an example of a encryption code? I mean AES256 for instance, is it just "ABCDF1873487934594DJHSGFD9584857HFKHFJKFHSF8957304" --- but 256 characters and that is what is done? Just some random string of letters precents people from hearing?

thanks”


Searched google, maybe this?
 

Forts

Mentor
Database Admin
Joined
Dec 19, 2002
Messages
6,890
Location
Ontario, Canada
As mentioned, AES256 is 256 *binary* bits, whereas DES is 64 and ADP/ARC4 is 40. These translate to a 32 byte, 8 byte and 5 byte hexidecimal key, which is the value that is typically entered into key loading device for the radio.

For example...
AES256 - 8F0284863DB01EB026A7C7599758F06936AC07526820C7463D2BFD8E0B858749
DES - C297B5B086BC0268
ADP - B4499FE923
 

ladn

Explorer of the Frequency Spectrum
Premium Subscriber
Joined
Oct 25, 2008
Messages
1,465
Location
Southern California and sometimes Owens Valley
Just some random string of letters precents people from hearing?
Part of the strength of the key is the number of elements (more elements=greater number of possible "answers").
Another part of this is how the key is derived or generated. A key that uses a predictable set of elements, like 000111222333444...EEEFFF would be less secure than a key derived from a true random number generator.

As I recall, the NSA has a subsidiary or affiliate that provides a key generation service based on a true random number generation algorithm. The keys are generated and transmitted securely to subscribers (think three letter government agencies and large state/local law enforcement) electronic key vaults and then loaded into equipment. There's no need for anyone to actually view the key's character string.
 

jimmy9999

Member
Joined
Oct 10, 2023
Messages
39
That "KEY" is internally gennerated from a 'seed'. That seed may be 64 to 256 'bits'.
That means without that correct 'seed', there can be as many as 255^255 possible cobinations, and only one correct one to decypher the data stream.
Not really.
A 64-bit key gives 2^64 or 256^8 possible keys.
A 128-bit key gives 2^128 or 256^16 possible keys.
A 256-bit key gives 2^256 or 256^32 possible keys.
 

RayAir

Member
Joined
Dec 31, 2005
Messages
1,946
As mentioned, AES256 is 256 *binary* bits, whereas DES is 64 and ADP/ARC4 is 40. These translate to a 32 byte, 8 byte and 5 byte hexidecimal key, which is the value that is typically entered into key loading device for the radio.

For example...
AES256 - 8F0284863DB01EB026A7C7599758F06936AC07526820C7463D2BFD8E0B858749
DES - C297B5B086BC0268
ADP - B4499FE923

ADP- ABC123
DES- 0123456789ABCDEF
 

merlin

Active Member
Joined
Jul 3, 2003
Messages
3,124
Location
DN32su
Not really.
A 64-bit key gives 2^64 or 256^8 possible keys.
A 128-bit key gives 2^128 or 256^16 possible keys.
A 256-bit key gives 2^256 or 256^32 possible keys.
You are right, I stand corrected, still, 2 with 256 places is a lot of combinations.
 

krokus

Member
Premium Subscriber
Joined
Jun 9, 2006
Messages
6,131
Location
Southeastern Michigan
The Security Now podcast has episodes that explain encryption well. They are old episodes, so I would suggest using a search for them. All of the information is applicable to radio traffic that is encrypted, when using a digital radio format, such as P25, DMR, NXDN, etc.
 
Top