Home |
Search |
Today's Posts |
#11
|
|||
|
|||
As for decrypting true digital encrypted transmissions, I don't
believe there is such an animal since you NEED the key. Without it, you're just guessing. Perhaps this box rambles through keys in a trial and error mode until it picks up a signal? Depending on the key size, this could take countless years to accomplish. Yes, I guess it's supposed to be some sort of number cruncher, scanning when a digital encrypted signal is transmitted, which isn't very often. There's not very many digital scanners in the county, like one or two, so they don't really worry about encrypting unless it's a "major operation". Maybe i misunderstood, he might have been telling me about a box to decode not decrypt, saving me about $400 and using a normal analog scanner?? I'll have to get ahold of him and clarify |
#12
|
|||
|
|||
In article ,
Mark wrote: I would think that any encrypted system out there today is nearly impossible to crack since it can only be done via brute force (ie - guessing) and the compute power required just isn't accessible to nearly everyone. Even the 50 cpu example you cite, is insignificant if they use a 4096 key (which certainly is not unreasonable). very few voice encryption systems use more than a 128 bit key. with bruteforce attack a 128 bit key is certainly doable with a 50 cpu distributed attack. should take about two weeks...... Me been there, done that....... |
#13
|
|||
|
|||
In article ,
Mark wrote: On Wed, 30 Mar 2005 17:39:33 GMT, Me wrote: very few voice encryption systems use more than a 128 bit key. On what planet? I agree that 4096 may be a tad off, but 128 most certainly is as well. with bruteforce attack a 128 bit key is certainly doable with a 50 cpu distributed attack. should take about two weeks...... Me been there, done that....... I seriously doubt you have access to 50 cpu's for a two week period and have cracked any type of digital voice encryption ever. As a matter of fact, I'm telling you that you're full of it. But, if you are a good enough salesman, perhaps you'll convince some. I wouldn't want to sell you on anything..... as I really don't care what you think..... I am just stating the facts of the case at hand..... Your mileage may vary...... but the facts of the case don't change just because you seem to have a different opinion....... 50 cpu's are readily available in most highschool computerlabs, and can be crunching away on such problems 12 hours a day, and full time on weekends....... this isn't "Rocket Science", it is just distributive computing, which has been around for 10 years....... I take it you have never dealt with digital vioce communications hardware, and keyloaders that set and load the keys into those systems......if you had such experience, you would know normal keylengths, and encryption systems that they use....... Me |
#14
|
|||
|
|||
In article ,
Mark wrote: I wouldn't want to sell you on anything..... as I really don't care what you think..... Obviously you do. I am just stating the facts of the case at hand..... Your mileage may vary...... but the facts of the case don't change just because you seem to have a different opinion....... 50 cpu's are readily available in most highschool computerlabs, and can be crunching away on such problems 12 hours a day, and full time on weekends....... this isn't "Rocket Science", it is just distributive computing, which has been around for 10 years....... I take it you have never dealt with digital vioce communications hardware, and keyloaders that set and load the keys into those systems......if you had such experience, you would know normal keylengths, and encryption systems that they use....... As a salesman, you need to convince people how you have such a vast world of experience in voice encryption, yet are either a high school student or work in the computer lab at a high school....... As you claim that distributed computing has been around for so long, you should then also know that there are plenty of FREE web resources that allow you to share cpu cycles from computers all over the world of people who feel like contributing their unused cpu cycles to any one of a million causes. Have fun. I am only more convinced that you've cracked no such thing. The horse is dead, I'm done beating it. No, I just have a lot more communications experience than you do. I graduated from High School long before there were computers, let alone conputerlabs in them. I am retired, and have been a Federal Agent, and worked for the Feds in a communications technical advisory position. Like I stated before, this isn't "Rocket Science", and these things have all been done before. It doesn't require any new knowledge base, it just requires an understanding of the system and a bit of computing power. Mac G5 Dual 2.5Ghz boxes have enough computing power to do this type of bruteforce cruching all by themselves. Yea, it would take a month or two but that is not unreasonable, considering that it is a desktop machine and running 2.0Gflop+.....and that assumes that the key is found in the last half of the iteration and not the first half. That is a 50/50 proposition, in bruteforce key cracking. Also with some knowledge of the guy who setup the key, one could reduce the job significantly, because most of these guys aren't crypies and they don't pick totally random keys seeds, which reduces the problem by a few orders of magnitude. Me |
#15
|
|||
|
|||
this isn't "Rocket Science", and these things have all been done before. It doesn't require any new knowledge base, it just requires an understanding of the system and a bit of computing power. Mac G5 Dual 2.5Ghz boxes have enough computing power to do this type of bruteforce cruching all by themselves. If one were to use a computer, or range of computers, for crunching 128+ bit keys or even down to 64 bit, where could this software be obtained? Aside from experimenting with digital voice encryption, I have some other keys that I would like to try and crack (keys of my own, not others), like a 802.11g system I just setup and want to test for maximum key strength. Probing around the net for such things these days can brand you a hacker in the eyes of the cyber cops, even if your intentions are good. |
#16
|
|||
|
|||
"WSnipes" wrote:
If one were to use a computer, or range of computers, for crunching 128+ bit keys or even down to 64 bit, where could this software be obtained? Usually it is written by the uy who wants ro break the key Aside from experimenting with digital voice encryption, I have some other keys that I would like to try and crack (keys of my own, not others), like a 802.11g system I just setup and want to test for maximum key strength. Aircrack for Windows? It cracked my own WEP key really fast. regards - Ralph -- Want to get in touch? http://www.radio-link.net/whereisralph.txt |
#17
|
|||
|
|||
does anyone else here see what the real truth behind this move is all
about. the truth that yhey dont want you to know is that they would like to go back to doing their "good ole boy" business as usual. keeping officers safe? safe from repercussions of possibly being filmed or overheard going about their routine business of beating the crap out of alleged criminals. now for sure there will be enough time for every officer that responds to get a couple of good licks in before the public becomes aware. just how many settlements has the city of w. falls had to dish out for incidents that were caught on tape, or overheard on regular comm networks, or howmany have they nearly skirted away from. open communications is one of the only safety checks that remains that keep the police as an organization becoming from becoming the "secret police" is this sounding familiar. police with no fear of being caught or documented going about their oooooo dangerous jobs. forget about the courts, go to the minority community, and the activists who champion for the civil rights, and stir up the city council reps to call for a special vote so the citizens affected can decide if the police they trust to protect them or worth spending big technology bucks to hide their activities from these same people who pay ther salary. and while their at it, call for the recall of the chief, city manager, and mayor or any other official that supports such an action against their own citizens |
#18
|
|||
|
|||
I guess that may be the truth, but since i'm not from W.Falls i
can't totally agree. Our S.O. moved to Astro P-25 to be compliant with Homeland Security, as we border Canada, and to have an "extended" range being able to cover the whole state with just one radio system. The older analog system required many hours of phone time between counties. Once this new one is all in place, an officer can contact another in a county that is 500 miles away just by using his two-way and the proper talk group ID. Plus, during an emergency, all county, state, and federal agencies(within the state) can communicate w/out having to know each other's cell numbers. Along with being digitally coded and encrypted...and yes, it keeps out the rubbernecks as well. For the most part, there are two reasons for going digital: Secure communications using encoding(which scanners can now pick up) along with encryption(so far hasn't been cracked, or atleast this info isn't being shared), and to extend communication range. does anyone else here see what the real truth behind this move is all about. the truth that yhey dont want you to know is that they would like to go back to doing their "good ole boy" business as usual. keeping officers safe? safe from repercussions of possibly being filmed or overheard going about their routine business of beating the crap out of alleged criminals. now for sure there will be enough time for every officer that responds to get a couple of good licks in before the public becomes aware. |
#19
|
|||
|
|||
In article om,
"WSnipes" wrote: I guess that may be the truth, but since i'm not from W.Falls i can't totally agree. Our S.O. moved to Astro P-25 to be compliant with Homeland Security, as we border Canada, and to have an "extended" range being able to cover the whole state with just one radio system. The older analog system required many hours of phone time between counties. Once this new one is all in place, an officer can contact another in a county that is 500 miles away just by using his two-way and the proper talk group ID. Plus, during an emergency, all county, state, and federal agencies(within the state) can communicate w/out having to know each other's cell numbers. Along with being digitally coded and encrypted...and yes, it keeps out the rubbernecks as well. For the most part, there are two reasons for going digital: Secure communications using encoding(which scanners can now pick up) along with encryption(so far hasn't been cracked, or atleast this info isn't being shared), and to extend communication range. One thing to consider when designing a system like the one above, is that it depends entirely on common carriers to provide the interconnections that support that wide area coverage. If you have a big disaster (earthquake, supervolcano, or the like) that takes out your common carrier links, by knocking all the microwave dish antennas out of alignment, your really cool digital system DIES, BIGTIME, and no amount of support is going to bring it back quickly, untill those links are fixed. This is a couple of months worth of work for a State wide system. Me been there, laughed at trying to do that....quickly.... |
#20
|
|||
|
|||
Yes, that is true. In my statement though, i was relating to a security
breech or similar along the canada border, or other security factors, not just natural disasters as you stated, but i see your point clearly. One thing to consider when designing a system like the one above, is that it depends entirely on common carriers to provide the interconnections that support that wide area coverage. If you have a big disaster (earthquake, supervolcano, or the like) that takes out your common carrier links, by knocking all the microwave dish antennas out of alignment, your really cool digital system DIES, BIGTIME, and no amount of support is going to bring it back quickly, untill those links are fixed. This is a couple of months worth of work for a State wide system. |
Reply |
Thread Tools | Search this Thread |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Forum | |||
Radio call letters: What do they mean? | Broadcasting | |||
For sale: Partial interest in LPTV. East coast beach resort city. | Broadcasting | |||
Who peed in the pool? | Policy | |||
For sale: Partial interest in AM daytimer in small Alabama city. | Broadcasting | |||
Needed : and Australian and NZ equivalants of the VOACAP city database for Finland. | Shortwave |