The hardest part was coming up with the equipment to get a working 2-slot repeater in single site mode. Unfortunately with OpenSky you just can't buy some mobiles or portables and use them in conventional mode.
It already is and has been for years unless you manage to get AES-256. Basic privacy offers privacy against scanners and anyone who doesn't try. Enhanced privacy is 40 bit and offers privacy from scanners and casual listeners using SDR programs. Of course I'd never try. This is for informational purposes only.
Hi, sorry to bother you, but do you have any knowledge about the subject of "voice to skull" and about the transmission of voices in a person's head, what frequency can be used and how can it be decoded, I also ask for a friend?
Great info. At least encryption does not modify main DMR protocol, so you can identify and record encrypted transmission to analyze and decode it later.
@@Gripengamer yea, i dont have 7 billion years (i believe thats the actual number they said it takes to decrypt it) and if you use PROPER OPSEC with encryption on radios, you revolve your keys. So even if someone somehow could decrypt your key? By the time they decrypted it, you changed your key already and all that work for nothing.
The real question is - can you apply a known key to listen in to the encryption using ANY SDR software or decoding software? What if you are testing the strength of your own encryption? Have you figured out how to try random keys or common keys as a form of pen testing your own security? I'm pretty surprised that people haven't said anything about this publicly which makes me think there are folks doing this quietly. I have seen you can jam signals but this is pretty much a no go unless you want to get caught up in legal problems. Besides - Looking for passive testing not intrusive testing that will disrupt normal operations. This also gives away (eventually) that something is 'not right'.
if only you know they key, you cannot decrypt it. Its 256 AES, even taking hundreds of super computers to try to decrypt the key - it can take BILLIONS of years, to decode a single key. And if youre smart? You change your key often
Unless the key is something stupid like all 1's or similar the key is just too damn long to guess. On our Harris radios the key manager software generates the AES key and even we don't know the actual key value.
I’ve heard it, it sounds like a helicopter when in FDMA mode but in TDMA it’s different here are some links for you to listen, DMR FDMA:www.w2sjw.com/sounds/DMR TDMA_Simplex.mp3 DMR TDMA:www.w2sjw.com/sounds/DMR_TDMA.mp3
By the way, TDMA is short for. Time division multiple access FDMA it’s also short for. Frequency division multiple access when used in Symplex for amateur radio
like a bunch of clicks and pops. Even unencrypted. Its exactly that - a "digital" signal. Its not modulated the same, so an analog scanner or even another analog radio tuned to the same frequency will just be like "yea, I have a signal but - I have no idea what this is" and you just here this annoying popping sound that sounds like a machine gun lmao. Analog radios typically us FM (Frequency Modulation) so it has no idea what to do with a digital signal thats modulated a completely different way
Hello Friend. Is it possible to open a hack sdrsharp? And is there a guide somewhere? I have a signal here. It's locked anyway and I don't know how to unlock it.
Hello my friend When I hear in my country, I don't hear anything I find guidance in writing Enc Group call; TG = 1RID = 5136068 Is there a solution to this thing? I want to know what, please
Do you have any idea of what kind of security or encryption (if any) is being done between these TYT MD-UV390 radios... How secure it is really? ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-R_fYaK84VU4.html
Tytera uses a simple xor scheme for encryption. It's not secure. Their 128 bit encryption sounds like it should be strong, right? Well how secure is it if all it does is generate a 49 bit key stream to xor with the plaintext and then use the same key stream for every voice frame? That means there are only 2^49 possibilities. So why have 128 bit keys?
Ha, even if there was one AES 256 was designed to be quantum resistant. It would be reduced to AES 128 bit strength. Still very strong. So strong that if a computer could search 2^80 keys a second it will still take 100,000 years to search just 1% of the AES 128 key space. My guess is the most expensive, purpose built supercomputers today could probably only search 20 - 50 quadrillion keys per second. That's very fast. Fast enough to crack any 80 bit keys (RSA-1024 included) in under a year. Hence, the changeover to RSA-2048.
RFI-Crypto Lab yea it was more of a joke, thought experiment. As it is quantum computers are still huge setups in labs and no where near being practical outside of research. But looking at the last 50 years who knows how fast technology can develop. It’d be cool to see what the NSA or CIA uses but most likely they just require every agency, departmen/ applicant (domestically) to send their secret keys
@@charliedallachie3539 This video has got to be at least 20+ years old since it's still focused on the DES cipher. No idea when it was built, maybe early 90's and updated? The Thinking Machine : ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-4VTxyRVmL5c.html
@@brisadelmar5686 DSD has no ability to decode any mode of privacy, even if you lawfully know any key in use. The programmers have stated they wont implement that feature.
There is software called dsdbp its put with dsdplus folder and decrypt the signal .. m.ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-FVyFm7GvacQ.html They post link for download then deleting it
I saw a video on YT of a guy decoding a DMR BP protected system, but I've never seen that version. He could of modified the old dsd himself? I did see in person a version of DSD+ decoding Moto BP with the key number displayed in the event window. That was an old DSD+ version (1.035d). The version of DSD+ I have now does not have that BP decoding feature.
@@rfi-cryptolab4251 Thanks for the info! Can you share any info on the pricing model? Is it on a per-radio basis, or is it a flat price for "up to X number of radios" model? And if you don't mind, I''d love to know a price as well ;)
@@systemfive7 I upgraded 4 Hytera PD782's and the price was $275 each. I since found another dealer that charged $225 per radio. The dealer places the order and the upgrade license is created by Hytera and sent back to the dealer. The dealer then emails the licenses to you. You go into CPS and there's a feature upgrade menu where you place the upgrade license file. Once applied you can select "full encrypt" and create either a 128 bit or 256 bit key. The license also enables "random key". If enabled, you program up to 30 AES keys and the key will change each transmission. All radios must have all the proper key IDs and keys set up. I don't use random key as I need the radios to work with 40 bit encryption also. Hytera offers AES in either DMRA standard or Hytera proprietary. DMRA using a 256 bit key will work with MotoTRBO radios equipped with AES.
@@rfi-cryptolab4251 Thank you so much for taking the time to answer! That was just the kind of info I needed! Subscribed to your channel as well, you've got some interesting videos I'll go through :)
I don't own a DMR capable scanner, but my guess would be no. RAS also will not prevent programs such as DSD from receiving traffic. Hytera has an interesting feature called "over the air encrypt" which takes a user defined 128-bit key and scrambles the signalling info such as talk group code and radio ID number. Coupling the above with voice encryption provides decent privacy. Using AES with the above provides very strong security.
i had no problem obtaining AE31 boards for my nx-5000 series radios and the encryption software from kenwood and now i run all my HT and mobiles on AES 256Bit on ham frequencies in Canada its legal
@@rfi-cryptolab4251 my cost was around 400 canadian dollars per cryptographic module. Prices vary depending on wether you are paying retail or dealer cost.
@@davidgrant2725 Thank you for the information. I purchased the AES (DMRA) licenses for my Hytera radios. They were $275/radio. You can enter a 128 or 256 bit key. Using 256 they work with MotoTRBO AES.
Is there a way to decrypt (not decode the digital) signal that my local police use? They use a digital trunk system but it’s also encrypted. Thanks in advance Jay
There’s no possible way to just listen to police encryption? I heard if you use a method that isn’t a scanner it’s still considered a legal loophole according to FCC laws. Is it automatically a felony?
Do you need anything other than the programming software and cable to load keys on these? I only have the TYT MD-380, and that's how it is for basic and enhanced privacy. I know some radios require a key load device (KVL) to load encryption keys
Will Phoneman Neither MotoTRBO or the Hytera DMR radios require a key loader. You set the keys using CPS. It's more convenient, but I'm not sure it's as good. At least if someone tried to read your Moto or HYT radio, the keys would not display. Now on an MD-380, they will display, but the scheme on those isn't secure anyway. Only AES can be considered secure. On higher tier HYT's, you can create, select, and edit keys from the radio display/key pad, but you can't view them there (actual key). Hope this helps.