Motorola ENCRYPTION standards

The General forum is where users can discuss any topic regarding Motorola communications equipment - hardware, software, etc. There are also several focused forums on this board, so please take the time to ensure that your questions doesn't fall into one of those categories before posting here!

Moderator: Queue Moderator

Post Reply
radioinstl
Posts: 354
Joined: Tue Feb 11, 2003 1:07 pm
What radios do you own?: Liberty MBITR APX7000 75000

Motorola ENCRYPTION standards

Post by radioinstl »

Algorithm
Key Length
Total Number of different keys
Years required to test all keys

ADP, 40 bit, 1.09 E+12, 34,865 or 3.48 E+4 Years
DVP, 96 bit, 7.92 E+28, 2.51 E+21 Years
DES, 128 bit, 3.40 E+38, 1.07 E+31 Years
AES, 256 bit, 1.15 E+77, 3.67 E+69 Years

Encryption

DES

Introduced in 1983 – Type III encryption algorithm 128 bit key
Currently, the most widely used encryption algorithm in the market
Analog capable only
Utilized a self-synchronizing which did have an adverse impact on the performance of the radio


DES-XL

Introduced in 1987 – Type III encryption algorithm
128 bit key
Analog and Digital capable
Introduced a external synchronizing scheme which alleviated performance lost by DES algorithm

DES-OFB

Introduced in 1997 – Type III encryption algorithm
128 bit key
Digital capable only
Used fundamentals of DES-XL and advanced the scheme
APCO adopted this algorithm as its standard for Project 25 in 1996


AES

Introduced in 2002 – Type III encryption algorithm
256 bits
Digital capable only
Built off of DES-OFB platform, but added features, notable number of bits
Adopted by APCO as a P25 standard in 2002


OTAR

Introduced in 1990
Provides the capability to re-key the algorithms within radio via an over-the-air network
Currently requires the use of a data system (RNC – data controller) to send requests over conventional channels
OTAR for Project 25 was introduced in 1999


ADP (Advanced Digital Privacy)

Software based encryption introduced in late 2003
Motorola proprietary implementation of RC4 algorithm
Not a FIPS certified solution
40 bits
Software based only on XTS 2500
Software or UCM based on XTS 5000/ASTRO Spectra Plus/XTL 5000
Software based can be key loaded through CPS
Hardware based needs to be key loaded by KVL 3000 Plus

Type 1

Classified encryption
Introduced in 1991 and re-introduced in 2003
User avatar
wavetar
Administrator
Posts: 7341
Joined: Sun Sep 09, 2001 4:00 pm

Post by wavetar »

The DES info is wrong, it's only 56-bit, not 128, and was introduced in 1977, not 1983. It was reaffirmed in 1983.

This site below explains the DES algorithm in great detail, including the key length, and CFB/OFB variations.

http://www.tropsoft.com/strongenc/des.htm

And the 'official' FIPS paper on DES:

http://www.itl.nist.gov/fipspubs/fip46-2.htm

Also, the number of available keys for DVP is actually 2.36 E+21 (true 64-bit)...it's DVP-XL which has 7.9 E+28 available keys.

Todd
No trees were harmed in the posting of this message...however an extraordinarily large number of electrons were horribly inconvenienced.

Welcome to the /\/\achine.
radioinstl
Posts: 354
Joined: Tue Feb 11, 2003 1:07 pm
What radios do you own?: Liberty MBITR APX7000 75000

Post by radioinstl »

Thanx for the corrections. This info was taken from a "M" paper and was meant to help some of the newbies on the board as opposed to being a high end reference.
User avatar
wavetar
Administrator
Posts: 7341
Joined: Sun Sep 09, 2001 4:00 pm

Post by wavetar »

Just for reference, what is your 'timeline' for cracking the various algorithms based on? IE: 1 million keys per second? More? Less?

Todd
No trees were harmed in the posting of this message...however an extraordinarily large number of electrons were horribly inconvenienced.

Welcome to the /\/\achine.
radioinstl
Posts: 354
Joined: Tue Feb 11, 2003 1:07 pm
What radios do you own?: Liberty MBITR APX7000 75000

Post by radioinstl »

Todd, no idea on time line, I gave you word for word what was on the motorola document
User avatar
wavetar
Administrator
Posts: 7341
Joined: Sun Sep 09, 2001 4:00 pm

Post by wavetar »

It appears this Motorola document was written by one of the 'new' engineers that don't know their arse from a hole in the ground.

Todd
No trees were harmed in the posting of this message...however an extraordinarily large number of electrons were horribly inconvenienced.

Welcome to the /\/\achine.
Cowthief
Fail 01/90
Posts: 1900
Joined: Wed Sep 05, 2001 4:00 pm

Key crack timeline.

Post by Cowthief »

Hello.

The key gets cracked in MUCH less time, a few minutes to 2 hours maximum for the Russian code breaking boxes.
DES was the standard for direcTV, it got raped to the point that a new system was put in its place.
That has also been cracked.
The point being, the key NEEDS to be changed.
This is kind of like back-ups for the computer, it gets done when something goes wrong, after the fact.
eleet
Posts: 42
Joined: Tue Mar 23, 2004 8:04 pm

Post by eleet »

Hello!

DirecTV DES encryption was not 'cracked.' What was cracked was part of their conditional access system, which includes DES encryption of some mpeg packets, most of them are actually in the clear! These content keys are changed lots, and sent ahead of time. The encryption used in DirecTV is still DES.

In a conditional access system like this, keys or information needed to detemine the keys are passed to the client enveloped inside of some public/private arrangement. Also, its authorization list. Application responsible for tuning video on the settop gets keys from hardware secure element (in directv's case, smartcard.) If client not authorized for tuned program then no/incorrect decryption keys are released by the hardware secure element.

Looks like the first message is a training slide! Maybe from installer training?

Laws of physics and mathematics do not change... if you try to guess the key in a brute force effort, then you can assume you need to guess every key in the universe, and this will take a lot of time no matter how much power you have. Anything on the air can be recorded and will be decrypted if someone tries and persists, but it could be a long time from now before he gets lucky.

The only way to decrypt fast is to use the NSA's backdoor! Change the keys every shift if you are paranoid.
User avatar
jnglmassiv
Batboard $upporter
Posts: 512
Joined: Sun Feb 24, 2002 4:00 pm

Post by jnglmassiv »

eleet wrote: then you can assume you need to guess every key in the universe
The assumption is that you need, on average, to try half the keys. The odds are against the correct key being the first number you try...or the last..or the second or the second to last, etc.
User avatar
jim
Posts: 2184
Joined: Sun Sep 09, 2001 4:00 pm

Post by jim »

When you know the number of possible keys, start at 1/3 of the way from the beginning.
Post Reply

Return to “General Motorola Solutions & Legacy Radio Discussion”