Technology Portfolio Operator Training Training Bank. AES 256 encryption is P25 compliant and FIPS certified to prevent. MACE provides cryptographic services (encryption and decryption) of all voice. Project 25 Standards Based.
If you have 23 years: A commodity 2.5GHz Intel Core i7 processor can easily compute one million DES keys per second in software using the OpenSSL library. This is, however, optimized for the case of encrypting the key with large volumes of traffic and not key searching. A bit-sliced implementation carefully optimized for key searching can reach in excess of twenty-eight million keys/second.
Even so, DES is not trivially defeated. Even at one hundred million keys per second it will take almost twenty-three years to search the whole key space. It is possible to achieve much better performance using dedicated hardware and many processors running in parallel.
In 1998 the EFF constructed an ASIC-based device that could search the DES keyspace within 9 days at a cost of 250,000 US$ 8. Also the research is on the conventional side of the house. On a TRS, either a 3600 or APCO25, when you employ encryption the ability to make a clear call on a talk-group that is strapped for secure is impossible.
And even using a different key will not allow the rogue user to be able to communicate with valid users as they will not be able to hear each other. The paper is not all inclusive, especially where trunking systems are employed that create additional layers of protection.
Conventional is very easy to manipulate and the more experienced technical users are well aware of it. The most important thing is that the end user devices are properly programmed and secure channels are strapped secure only. If a radio looses its keys it should be taken out of service and a loaner radio supplied unti it can be re-keyed by a keyloader or OTAR.
Comments are closed.
|
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |