[2412] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Existing digital phone encryption

daemon@ATHENA.MIT.EDU (Jeff Simmons)
Tue Mar 31 08:56:50 1998

From: Jeff Simmons <jsimmons@goblin.punk.net>
To: karn@qualcomm.com (Phil Karn)
Date: Mon, 30 Mar 1998 22:25:24 -0800 (PST)
Cc: shamrock@netcom.com, cryptography@c2.net
In-Reply-To: <199803310555.VAA13729@servo.qualcomm.com> from "Phil Karn" at Mar 30, 98 09:55:48 pm

Phil Karn writes:
 
> IS-54 TDMA encryption is a joke. It consists of a fixed "mask", equal
> in length to the vocoder frame, that is XORed with every frame of the
> conversation. Think of it as a frame-sized one-time-pad that is reused
> for the entire conversation.

Thanks.  And how does the mask get propagated to the two phones, e.g.
how does the system do 'key management'.

-- 
Jeff Simmons                            jsimmons@goblin.punk.net

"By these actions SRL became the first to operate intentionally lethal
machinery over the net with standard browser software."
	-- Survival Research Laboratories web page (www.srl.org)

home help back first fref pref prev next nref lref last post