Post by brian w edgintonPost by DanPost by A ThompsonHas anyone heard same, & if there is where can it be found & I'm assuming
(assumption being the mother of all F*#K ups) it
would have to be run via a PC if it was correct information.
Thanks
There are plenty of applications that would allow you to decrypt police
comms, you just need an encryption key to do so.
True!
Late!
But, true.
----------------------------------
If you want to stand out in the crowd...
check the alleys for escape routes, first
In trying to determine the future, you should study the past.
Lets look at the history shall we?
DVP. 30 years old. Secure?
From the NSA: no.
From the DSD: no.
From some computer nerd with a surplus CRAY-2 in his basement: perhaps
not. Brute forcing it is only half his problem, he'd need to know
about the coding & formatting of the signal (ie how the bits are
transmitted on air, how to sync up with the frames, and frame
formatting, extracting the voice frames from error checking, and then
there's the voice-coding & compression to figure out...)
From you and I with domestic budgets of less than $5000 - yes! And
will continue to be so for perhaps another 5-10 years... by which time
no-one will be using DVP anyway because of its obsolecence.
Plus I've never seen an 'application' downloadable on the 'net for a
PC that will purport to 'decode' DVP or P25 encryption even if you had
a key to give it. Well, nothing that wasn't a virus.
So with this bit of history under our belts, lets try to predict the
future.
OK, so the P25 trunking bit has been worked out, that helps - but it
doesn't get us any closer than if we were listening to a simplex
transmission of P25.
The codec used, called IMBE, made by DVSI is well known. Your 396T
even has a IMBE codec inside! Wonderful, we have figured out the
voice codec, and can even figure out the digital bits of P25 since
it's a open standard.
Now for the encryption - the 'only' thing keeping the communications
secure.
Now it's been reported that the 56 bit DES has been broken, by people
with super computers or a very large network of computers. Great!
We're on our way.
But the problem is that you need to invest lots of time, money and
effort to brute force the key. Often the investment in time & money
is too great for us hobbyists. I sure don't have 5 years to devote,
nor 10 PCs to dedicate to the task. And if the target user decides to
change the key once every few months... we're SOOL. Even with Moore's
Law - regular changing of the key will ensure that the encryption will
remain secure from hobbyists & criminals until DES on P25 is obsolete
too.
Actually, in the USA, on a scanning website, someone who has a DES
encrypted radio made a high quality recording of him speaking a
phrase. He challenged everyone to decode it - he even used a known
weak key from memory - and offered some expensive bit of radio gear in
his shack as incentive to the first successful decoder. No-one has
yet claimed the prize!
And if in 20 years I'm wrong, you can come back to me and say "ner
ner, told you so" - I won't be offended, I promise.