From: rustman@netcom.com (Rusty H. Hodge)
To: cypherpunks@toad.com
Message Hash: 664961b8901cac7653908a9856259051bb900fd1cc8fc8ffbc85d1d6957c57de
Message ID: <199312040049.QAA01411@mail.netcom.com>
Reply To: <199312031116.DAA24889@mail.netcom.com>
UTC Datetime: 1993-12-04 00:49:19 UTC
Raw Date: Fri, 3 Dec 93 16:49:19 PST
From: rustman@netcom.com (Rusty H. Hodge)
Date: Fri, 3 Dec 93 16:49:19 PST
To: cypherpunks@toad.com
Subject: Re: cryptanalysis for radio communications
In-Reply-To: <199312031116.DAA24889@mail.netcom.com>
Message-ID: <199312040049.QAA01411@mail.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
sameer@uclink.berkeley.edu says...
> I was wondering if any cryptanalysis packages existed which
> could help in decrypted information picked up with a scanner. It seems
> that a bunch of people trying to defend their home from the feds were
> listening in on the feds radio communications, but now they're
> encrypting stuff. It's probably not very strong crypto, maybe just a
> simple XOR.
Actually, Morotola makes some nice DES encryption systems for radio
communications. Listening to these on a normal scanner, you will hear the
squelch open and a burst of white-noise like sound. This is the DES
encryption that the feds use.
There are simple frequency inversion systems that are in use by some
agencies, mostly local if any, but there are $25 kits to decode this.
To break the Motorola system, it would not be an easy undertaking. You
would have to demodulate the digital data stream, figure out the word
sync, and then start analysing. That assumes that there is no compression
going on!
Maybe you could modify some of the circuits out ther for decoding the cellular
control channel data stream, although that is much slower than this.
--
Rusty H. Hodge, Cyberneticist, Futurist <rustman@netcom.com>
Return to December 1993
Return to “sameer@uclink.berkeley.edu”