background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "Совместимость шифрования AES на Caltta и Motorola."

input logo icon
Video tags
|

Video tags

Caltta
Motorola
Mototrbo
AES
AES256
Шифрование
Encrypt
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:03
will try to program the
00:00:07
Kalta DMR radio station, the Kalta radio station
00:00:10
in our case, the pH 660 model
00:00:15
in this line there is also a 600 model
00:00:18
without a display with the same dimensions and a 690 model
00:00:21
with a full-size keyboard about
00:00:24
programming to work in a closed
00:00:26
channel using encryption
00:00:29
method A from a key length of
00:00:32
256 bits and we will combine it today
00:00:36
with Motorola, first we will program
00:00:39
the card then we will program Motorola
00:00:41
we will enable encryption And if 256 and check
00:00:45
whether these models are compatible Is
00:00:47
this encryption compatible Will everything work for us
00:00:50
the station is now factory reset
00:00:52
to the factory settings to zero, so I read it,
00:00:58
we won’t do all the settings carefully, you
00:01:01
and I will only focus on the
00:01:03
basic ones that we need to work in the
00:01:06
basic settings, we’ll check if there are
00:01:10
any specific options that
00:01:11
could interfere with us, the language here is not
00:01:15
important to us Now you don’t have to select it,
00:01:19
we move immediately through the menu items in the
00:01:23
direction of the
00:01:25
list
00:01:27
secret keys encryption keys you can
00:01:31
activate any key length you and I
00:01:35
will be interested in the key Let me remind you that
00:01:38
for the rc4 encryption method it does not
00:01:41
matter In what order the
00:01:43
keys are in the list for the
00:01:46
iOS encryption method does not important From what length of the
00:01:50
key 40 bits 128 256 is important not
00:01:54
only the content of the key, not only its
00:01:56
length but also its place in the list of keys, this is
00:02:01
important, always remember this If you have
00:02:03
Key number one at one station and the
00:02:06
same key at the second station at
00:02:08
number 2, encryption already works according to the
00:02:11
method And if it doesn’t So we add,
00:02:14
we can, of course, add more keys here,
00:02:17
but we don’t seem to need it now We are
00:02:20
now interested in one key, so we
00:02:22
will have k1 We will call it that, and from the
00:02:28
length y we will be 64 64 multiplied by 4 and it
00:02:34
just turns out 256 so this
00:02:37
method
00:02:39
indicates the key length 64 characters in the
00:02:43
S method it will be 256 characters 256
00:02:47
key length but here it is not
00:02:50
displayed we are interested
00:02:52
in having
00:02:53
some kind of key generated for us so
00:02:55
we add a
00:02:57
new key from number 3, for example,
00:03:01
64 characters. Here we have generated it and then we will
00:03:07
use the
00:03:09
third key. Although, by and large,
00:03:14
Yes, she swears at us about the designation of the
00:03:17
key. And there are 3, let it be so.
00:03:21
We immediately copy this value to ourselves in a
00:03:26
text editor
00:03:28
so that we registered the value in
00:03:31
Motorola, how long is it here? 64
00:03:33
characters this will be our
00:03:35
256-bit key for iOS encryption in the
00:03:39
table we entered the key Okay now
00:03:43
Let's move on Demerkin crowned Basic
00:03:46
settings
00:03:47
check here the
00:03:49
radio station identifier here
00:03:51
we leave all the parameters at default
00:03:54
this is already a taste and the color of who is
00:03:58
programming what, we check if there are
00:04:00
any parameters that could
00:04:02
interfere with us again, everything is fine here. We
00:04:05
go to the incript section,
00:04:08
we check the incript Mode, that is, the encryption mode is
00:04:13
soft ingript Well, in the demo you are different and do not
00:04:16
select
00:04:19
Voice Only Data Only in this radio station Voice and Data,
00:04:23
select Voice Only Because if you
00:04:26
select Voice and Data, then
00:04:29
not only the contents of your packets will be encrypted,
00:04:31
but also the
00:04:35
Destination and fields, that is, Where does
00:04:38
the signal come from ID person Where
00:04:42
does the call come from and, accordingly, its
00:04:45
direction if group current groups ID
00:04:48
if individual call then
00:04:51
the individual number of the called
00:04:53
correspondent, this data will also be
00:04:55
encrypted, and if on the other
00:04:57
side it is
00:04:59
only troop encryption that is activated,
00:05:02
then no routing will be
00:05:04
carried out, it will be especially important to
00:05:05
remember this. When you work through a
00:05:08
repeater that sees you transparently
00:05:10
with a bridge, that is, it lets everything through
00:05:13
and It will also allow encrypted traffic
00:05:15
if the encryption is
00:05:17
only Voice Only because it needs to
00:05:20
understand where the signal is coming from and where.
00:05:22
Therefore, in typical cases, in most cases
00:05:25
we select Voice Only in the Motorola, it
00:05:29
will be easier for you there in old firmware this
00:05:32
option is not available at all in new firmware.
00:05:35
just let’s see
00:05:36
here everything is clear, we don’t touch the call System
00:05:40
and we got to the Digital Channel,
00:05:43
select the channel settings, let’s
00:05:49
take the frequency for testing,
00:05:55
let it be 446 050, let’s call it like this Color
00:06:00
code 1 time Slot one, let it be
00:06:03
written directly cleanliness
00:06:09
here, unfortunately not like a motorized car Or
00:06:12
how to trick with the ability to copy from the
00:06:16
receiving unit to the transmitting frequency RX
00:06:19
grouplist Compose by default If
00:06:21
you need some other one, you choose
00:06:24
your other one that is relevant for your
00:06:27
network
00:06:29
And here is the important point: choose
00:06:32
nq encryption If you leave
00:06:36
Basic here, then that one will be used the same
00:06:40
set of encryption keys that we entered in the
00:06:42
table, but the encryption method will be
00:06:44
proprietary from calcium. I don’t know which one.
00:06:48
If you select in Hands advanced,
00:06:51
then here below when choosing a key you
00:06:56
will already see If you had a
00:07:00
ten-digit key specified in the table and you select
00:07:03
it from this list, encryption will be
00:07:05
carried out using the arc4 method
00:07:09
using a 40-bit key 10 by 4
00:07:11
40 If you here select a key with a length of
00:07:15
32 characters or 64 characters from our
00:07:18
list, then it will be
00:07:21
128-bit encryption or
00:07:24
256-bit, respectively, we are with you under number a C3,
00:07:27
under this name,
00:07:29
we programmed a 64-character key
00:07:32
that corresponds to A, there are 256 bits, we
00:07:37
select it. We have selected
00:07:39
everything in this channel, our setup is
00:07:42
complete, we have a channel
00:07:46
called [music]
00:07:48
d446050, let’s remember this moment
00:07:51
Okay, here we don’t touch anything further.
00:07:54
We need to now a simple test, this is in
00:07:57
principle and there is no need to record
00:07:59
the radio station
00:08:04
while the station is being written, I
00:08:06
forgot to say TX Contact, our unit
00:08:10
is a group call number one and
00:08:14
RX grouplist, of course, also a
00:08:17
contact list with these contacts
00:08:20
number one, just in case, I’ll show you
00:08:22
so that it is clear the contact
00:08:26
group call identifier one and RX
00:08:30
grouplist actually He is in this
00:08:34
list we
00:08:36
have a kalta we programmed
00:08:40
actually on this channel we have it
00:08:43
now it remains to
00:08:44
program Motorola Motorola
00:08:48
as a sample Motorola we will
00:08:50
use Motorola SL
00:08:54
400010
00:08:56
functional it is identical to Motorola
00:09:01
models such as
00:09:05
dp44004600
00:09:07
48007 and
00:09:11
4401461 481 34 41 361 all basic
00:09:18
basic functions including
00:09:21
encryption encryption methods that
00:09:23
they can do and I have it at hand today
00:09:27
so we are working with it,
00:09:30
our code is open Motorola posters
00:09:34
first of all you need to make sure in
00:09:36
your Motorola whether your
00:09:38
NPP license is activated you have it here in the
00:09:42
configuration in the main settings, it
00:09:45
will be immediately visible if it is activated.
00:09:48
Here is the icon A from the line Well, and
00:09:53
it will be purchased or activated there
00:09:55
it says
00:09:56
if it is Yes, you can move on if
00:09:59
it is Well, then accordingly you need to take
00:10:02
care first of all about activation And
00:10:05
if only then we can continue without
00:10:07
this, nothing will happen, but we have it
00:10:09
activated. Let's go to the
00:10:12
settings in the general settings, let's check
00:10:16
some parameters
00:10:18
so that nothing interferes with us, but
00:10:22
theoretically there
00:10:24
shouldn't be anything that interferes with us, here all the
00:10:26
default parameters the station has been reset to
00:10:28
factory settings, look especially
00:10:32
especially nothing here from the parameters that
00:10:36
would affect our experiment right now,
00:10:38
we don’t seem to be here, so we don’t
00:10:42
touch it, we go to the defense
00:10:46
in the Motorola, it’s implemented a little differently,
00:10:48
everything is not like kalto type of
00:10:51
confidentiality here
00:10:54
Motorola asks you to decide what
00:10:57
we will do work with basic
00:10:59
confidentiality That is, this is even But
00:11:02
this is encryption in essence, but it is more
00:11:04
like an
00:11:06
inversion voice scrambler only
00:11:08
in digital mode, something like this,
00:11:11
if we choose basic, then we
00:11:14
will work with fixed keys, there are
00:11:20
255 of them in total fixed
00:11:24
keys We won’t work with them we are
00:11:27
interested in improved encryption that’s
00:11:30
when we chose improved we have here with
00:11:33
you next we need to enter the value of
00:11:36
the keys the
00:11:37
first table after the
00:11:41
privacy type we have
00:11:43
improved privacy keys This is
00:11:47
arc4 40 bits 10 characters come out
00:11:53
here one two three 4 5 6 7 8 9 0 10
00:11:59
characters won’t fit in there anymore This is
00:12:03
our arc4 40 bit we’ll call it RC
00:12:09
4
00:12:12
to use iOS 256 encryption we
00:12:17
go down to the value of the symmetric
00:12:21
key here where the symmetric key is
00:12:24
already here We are dealing with using the
00:12:27
NPP encryption method we add a key
00:12:31
estimate kay we will call it the same as we
00:12:34
called it on the map
00:12:37
remember that in the table since in tracing paper
00:12:40
we made three keys the table we
00:12:42
should also have three keys
00:12:45
does not matter any set of characters
00:12:47
we do for one key
00:12:54
we add a second one we add 3 here we
00:13:00
can also have any value
00:13:03
as much as we want and
00:13:06
we also call the third key on the list A
00:13:10
from 3 just like we did in the map and
00:13:14
here we insert from our
00:13:16
text notebook the value of this
00:13:19
key that we used in the tracing paper
00:13:23
we insert is
00:13:26
Key number 3 This is also an important
00:13:29
point, always remember that the
00:13:33
key must be in the same position
00:13:36
as at other stations. Okay, there is a
00:13:39
symmetrical key, then
00:13:42
check the parameters below, because if you don’t
00:13:44
enter an arbitrary key somewhere, even
00:13:47
any system will not write the code for the plug
00:13:49
radio station in ours In this case, this always
00:13:52
happens with just a key,
00:13:54
we register any arbitrary one just so
00:13:56
that the parameters are recorded because well,
00:13:59
we won’t use it anyway, right
00:14:00
now we register an arbitrary one,
00:14:03
then we don’t touch anything and
00:14:06
go
00:14:08
to contacts, remember that we had a
00:14:12
clever contact number one
00:14:15
identifier One he had check here the
00:14:18
same group call
00:14:20
identifier number one
00:14:23
look at the lists of reception groups
00:14:29
sheet one number one added excellent by
00:14:34
default the parameters matched We do
00:14:37
n’t need to do anything else here go
00:14:39
directly to the channel itself
00:14:43
Zone 1
00:14:49
opens for a long time and take channel number
00:14:52
one
00:14:53
edit it
00:15:01
let’s call it 446
00:15:06
050 so that it looks like
00:15:10
Color code 1 time Slot one so that everything is the
00:15:14
same as in Kalta OK we
00:15:19
leave these parameters at default do not
00:15:22
touch
00:15:23
here where confidentiality is
00:15:27
not checked if we check this box
00:15:30
then rc4 40-bit encryption will be used in this channel
00:15:32
which
00:15:36
we will select from the first list,
00:15:38
uncheck the
00:15:41
symmetrical alias or in English,
00:15:46
this is ours is 256 and here
00:15:51
from the list We select Key number 3, I
00:15:53
repeat, it can be
00:15:56
number 123 10 it doesn’t matter, the main thing is that
00:16:00
this number is identical in your
00:16:03
stations
00:16:04
you chose a symmetric alias and And there is
00:16:08
number three, excellent
00:16:09
decryption of a fixed secret
00:16:11
key, we check the box here now, for the sake of
00:16:14
experiment, we don’t set to ignore
00:16:16
unprotected voice packets when
00:16:19
receiving data, we also don’t set If you check it,
00:16:22
then you will only hear
00:16:24
your encrypted signal, you won’t hear other signals
00:16:26
you will,
00:16:28
but Kay, we don’t need it here
00:16:33
because we have the Access Security tutor in a
00:16:35
direct channel with you now, we wo
00:16:37
n’t use it any
00:16:40
further, we move
00:16:45
all these default parameters, we don’t touch anything
00:16:51
and we get to prescribing purity 4460, a
00:16:58
convenient moment You can copy the parameters
00:17:03
As you can see below Here we have a list of
00:17:06
receiving groups RX sheet 1 where we have a contact with
00:17:09
ID 1 and for transmission there is also a
00:17:12
group call contact with
00:17:15
ID 1
00:17:17
time-out timer we don’t touch the free
00:17:20
channel here we’ll put it like in tracing paper you can
00:17:23
always transmit so that
00:17:26
essentially everything is the same for ours experiment, we have
00:17:29
all programmed and are recording the
00:17:32
parameters of the radio station, an
00:17:37
important point is an important point when you
00:17:41
are
00:17:42
registering the keys.
00:17:46
Don’t forget
00:17:48
to watch. More precisely, not when you register
00:17:51
the key, when you select encryption in the channel,
00:17:55
remember that a symmetric key is just that,
00:17:58
but just
00:18:01
confidentiality is either basic
00:18:04
encryption or rc4 40 bits depending on
00:18:07
what we chose from the list so we
00:18:11
recorded
00:18:13
the station signed up and we are ready for the
00:18:18
final stage of our experiment so
00:18:21
now all that remains is to understand how to output both of them so
00:18:25
that it can be seen So 446 by 50
00:18:29
This is the only channel that we
00:18:31
programmed on the Motorola itself
00:18:34
we see the key is on, that is, encryption is
00:18:37
active, we check that we have the
00:18:43
same history on the card, the lock is on, encryption
00:18:47
is active, the channel is what we need 446
00:18:51
050, let's try to call Motorola 123 123,
00:19:00
this is what we are calling Motorola,
00:19:03
let go with
00:19:08
one hand, shoot with the other, say, please
00:19:10
forgive me Dear viewers, no it’s
00:19:14
very convenient to do all this in makeshift
00:19:16
conditions
00:19:18
and We pass on
00:19:20
123 123
00:19:23
here it is, our reception
00:19:27
has been released
00:19:29
As we can see
00:19:30
again here 1 2 3 1 2 3 1 2 3
00:19:40
I’m releasing
00:19:43
NPP encryption works without problems
00:19:47
between tracing paper and Motorola, the main thing is to
00:19:50
carefully take your time and set everything up correctly
00:19:52
and, moreover,
00:19:54
encryption using the ies algorithm will
00:19:58
work on any equipment where
00:20:01
this method is supported in the
00:20:04
etsi standards, including its
00:20:09
structure and those manufacturers that
00:20:11
support this algorithm are described Naturally,
00:20:14
it will work Regardless of
00:20:17
which manufacturer it is, it has
00:20:18
already been verified for those who have already since then, the
00:20:21
unbelieving Foma, the
00:20:25
compatibility of this encryption between
00:20:28
Motorola Calta Hitera Kenwood radios has been verified. I apologize,
00:20:37
DMR, some versions are something that has already
00:20:41
been tested, something that is functioning, I am
00:20:44
sure that there are still manufacturers
00:20:46
who also provide full
00:20:49
compatibility of NPP and arc4 encryption with
00:20:53
other manufacturers, that is, the
00:20:55
protocols are standardized, which means will
00:20:57
work on almost any hardware
00:21:00
by 99 percent Thank you for your attention
00:21:03
friends I hope this information was
00:21:05
useful to you

Description:

Эксперимент, демонстрирующий совместимость шифрования голоса по алгоритму AES в DMR радиостанциях Caltta и Motorola.

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "Совместимость шифрования AES на Caltta и Motorola." video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "Совместимость шифрования AES на Caltta и Motorola." video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "Совместимость шифрования AES на Caltta и Motorola." video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "Совместимость шифрования AES на Caltta и Motorola." video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "Совместимость шифрования AES на Caltta и Motorola."?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "Совместимость шифрования AES на Caltta и Motorola."?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.