[2412] in cryptography@c2.net mail archive
Re: Existing digital phone encryption
daemon@ATHENA.MIT.EDU (Jeff Simmons)
Tue Mar 31 08:56:50 1998
From: Jeff Simmons <jsimmons@goblin.punk.net>
To: karn@qualcomm.com (Phil Karn)
Date: Mon, 30 Mar 1998 22:25:24 -0800 (PST)
Cc: shamrock@netcom.com, cryptography@c2.net
In-Reply-To: <199803310555.VAA13729@servo.qualcomm.com> from "Phil Karn" at Mar 30, 98 09:55:48 pm
Phil Karn writes:
> IS-54 TDMA encryption is a joke. It consists of a fixed "mask", equal
> in length to the vocoder frame, that is XORed with every frame of the
> conversation. Think of it as a frame-sized one-time-pad that is reused
> for the entire conversation.
Thanks. And how does the mask get propagated to the two phones, e.g.
how does the system do 'key management'.
--
Jeff Simmons jsimmons@goblin.punk.net
"By these actions SRL became the first to operate intentionally lethal
machinery over the net with standard browser software."
-- Survival Research Laboratories web page (www.srl.org)