How To Decrypt Apco 25 Encryption Algorithm

 admin  
How To Decrypt Apco 25 Encryption Algorithm 7,3/10 5260 reviews

How secure is AES-256? Ask Question Asked 7. So at the AES competition 11 years ago it is possible they would have avoided any algorithm they thought they could break in the near future. We know, from Edward Snowden, that the NSA does, routinely monitor all traffic and can decrypt all standard encryption, such as SSL. So it is likely. Secure conununication is made possible by designated transmitters and receivers (hereinafter 'encryption devices') sharing an encryption key that uniquely specifies an encryption algorithm for the communication. Only encryption devices having identical keys are capable of intelligibly reproducing the communication.

Project 25 (P25 or APCO-25) is a suite of standards for digitalmobile radio communications designed for use by public safety organizations in North America. P25 radios are a direct replacement for analog UHF (example FM) radios but add the ability to transfer data as well as voice, allowing for a more natural implementation of encryption or messaging. P25 radios are commonly implemented by dispatch organizations, such as police, fire, Ambulance and Emergency Rescue Service, using vehicle-mounted radios combined with walkie-talkie handheld use.

Starting around 2012, products became available with the newer phase 2 modulation protocol, the older protocol known as P25 became P25 phase 1. P25 phase 2 products use the more advanced AMBE2+ vocoder, which allows audio to pass through a more compressed bitstream and provides two TDMA voice channels in the same RF bandwidth (12.5 kHz), while phase 1 can provide only one voice channel. The two protocols are not compatible. However, P25 Phase 2 infrastructure can provide a 'dynamic transcoder' feature that translates between Phase 1 and Phase 2 as needed. In addition to this, phase 2 radios are backwards compatible with phase 1 modulation and analog FM modulation, per the standard. On the other hand, EU area created the standard for Terrestrial Trunked Radio similar to Project 25.

P25 fills a similar role as TETRA or DMR protocols.

  • 1Suite of standards overview
    • 1.4P25 phases
  • 3Adoption
  • 4Security flaws

Suite of standards overview[edit]

History[edit]

Public safety radios have been upgraded from analogFM to digital since the 1990s because of an increased use of data on radio systems for such features as GPS location, trunking, text messaging, metering, and encryption.

Various user protocols and different public safetyradio spectrum made it difficult for Public Safety agencies to achieve interoperability and widespread acceptance. However, lessons learned during disasters the United States faced in the past decades have forced agencies to assess their requirements during a disaster when basic infrastructure has failed. To meet the growing demands of public safety digital radio communication, the United States Federal Communications Commission (FCC) at the direction of the United States Congress initiated a 1988 inquiry for recommendations from users and manufacturers to improve existing communication systems.[1][2] Based on the recommendations, to find solutions that best serve the needs of public safety management, in October 1989 APCO Project 25 came into existence in a coalition with:[1][3]

  • Association of Public-Safety Communications Officials-International (APCO)
  • National Association of State Telecommunications Directors (NASTD)[4]
  • National Telecommunications and Information Administration (NTIA)
  • National Communications System (NCS)
  • National Security Agency (NSA)
  • Department of Defense (DoD)

A steering committee consisting of representatives from the above-mentioned agencies along with FPIC (Department of Homeland Security Federal Partnership for Interoperable Communication), Coast Guard and the Department of Commerce's National Institute of Standards and Technology (NIST), Office of Law Enforcement Standards was established to decide the priorities and scope of technical development of P25.[3]

Introduction[edit]

Several hand-held Project 25 radios used around the world.

Interoperable emergency communication is integral to initial response, public health, community safety, national security and economic stability. Of all the problems experienced during disaster events, one of the most serious is poor communication due to lack of appropriate and efficient means to collect, process, and transmit important information in a timely fashion. In some cases, radio communication systems are incompatible and inoperable not just within a jurisdiction but within departments or agencies in the same community.[5] Non-operability occurs due to use of outdated equipment, limited availability of radio frequencies, isolated or independent planning, lack of coordination, and cooperation, between agencies, community priorities competing for resources, funding and ownership, and control of communications systems.[6] Recognizing and understanding this need, Project 25 (P25) was initiated collaboratively by public safety agencies and manufacturers to address the issue with emergency communication systems. P25 is a collaborative project to ensure that two-way radios are interoperable. The goal of P25 is to enable public safety responders to communicate with each other and, thus, achieve enhanced coordination, timely response, and efficient and effective use of communications equipment.[7]

P25 was established to address the need for common digital public safety radio communications standards for first-responders and homeland security/emergency response professionals. The Telecommunications Industry Association's TR-8 engineering committee facilitates such work through its role as an ANSI-accredited standards development organization (SDO) and has published the P25 suite of standards as the TIA-102 series of documents, which now include 49 separate parts on Land Mobile Radio and TDMA implementations of the technology for public safety.[8]

Project 25 (P25) is a set of standards produced through the joint efforts of the Association of Public Safety Communications Officials International (APCO), the National Association of State Telecommunications Directors (NASTD), selected federal agencies and the National Communications System (NCS), and standardized under the Telecommunications Industry Association (TIA).. The P25 suite of standards involves digital Land Mobile Radio (LMR) services for local, state/provincial and national (federal) public safety organizations and agencies..

P25 is applicable to LMR equipment authorized or licensed, in the U.S., under NTIA or FCC rules and regulations.

Although developed primarily for North American public safety services, P25 technology and products are not limited to public safety alone and have also been selected and deployed in other private system application, worldwide.[9]

P25-compliant systems are being increasingly adopted and deployed.[where?] Radios can communicate in analog mode with legacy radios, and in either digital or analog mode with other P25 radios. Additionally, the deployment of P25-compliant systems will allow for a high degree of equipment interoperability and compatibility.

P25 standards use the proprietary Improved Multi-Band Excitation (IMBE) and Advanced Multi-Band Excitation (AMBE+2) voice codecs which were designed by Digital Voice Systems, Inc. to encode/decode the analog audio signals. It is rumored that the licensing cost for the voice-codecs that are used in P25 standard devices is the main reason that the cost of P25 compatible devices is so high.[10]

P25 may be used in 'talk around' mode without any intervening equipment between two radios, in conventional mode where two radios communicate through a repeater or base station without trunking or in a trunked mode where traffic is automatically assigned to one or more voice channels by a Repeater or Base Station.

The protocol supports the use of Data Encryption Standard (DES) encryption (56 bit), 2-key Triple-DES encryption, three-key Triple-DES encryption, Advanced Encryption Standard (AES) encryption at up to 256 bits keylength, RC4 (40 bits, sold by Motorola as Advanced Digital Privacy), or no encryption.

The protocol also supports the ACCORDION 1.3, BATON, Firefly, MAYFLY and SAVILLEType 1 ciphers.

P25 open interfaces[edit]

P25's Suite of Standards specify eight open interfaces between the various components of a land mobile radio system. These interfaces are:

  • Common Air Interface (CAI) – standard specifies the type and content of signals transmitted by compliant radios. One radio using CAI should be able to communicate with any other CAI radio, regardless of manufacturer
  • Subscriber Data Peripheral Interface – standard specifies the port through which mobiles and portables can connect to laptops or data networks
  • Fixed Station Interface – standard specifies a set of mandatory messages supporting digital voice, data, encryption and telephone interconnect necessary for communication between a Fixed Station and P25 RF Subsystem
  • Console Subsystem Interface – standard specifies the basic messaging to interface a console subsystem to a P25 RF Subsystem
  • Network Management Interface – standard specifies a single network management scheme which will allow all network elements of the RF subsystem to be managed
  • Data Network Interface – standard specifies the RF Subsystem's connections to computers, data networks, or external data sources
  • Telephone Interconnect Interface – standard specifies the interface to Public Switched Telephone Network (PSTN) supporting both analog and ISDN telephone interfaces.
  • Inter RF Subsystem Interface (ISSI) – standard specifies the interface between RF subsystems which will allow them to be connected into wide area networks

P25 phases[edit]

A hand-held Project 25 radio used in US systems.

P25-compliant technology has been deployed over two main phases with future phases yet to be finalized.

Phase 1[edit]

Phase 1 radio systems operate in 12.5 kHz digital mode using FDMA access method. Phase 1 radios use Continuous 4 level FM (C4FM) modulation—a special type of 4FSK modulation[11]—for digital transmissions at 4,800 baud and 2 bits per symbol, yielding 9,600 bits per second total channel throughput. Of this 9,600, 4,400 is voice data generated by the IMBE codec, 2,800 is forward error correction, and 2,400 is signalling and other control functions. Receivers designed for the C4FM standard can also demodulate the 'Compatible quadrature phase shift keying' (CQPSK) standard, as the parameters of the CQPSK signal were chosen to yield the same signal deviation at symbol time as C4FM. Phase 1 uses the IMBE voice codec.

These systems involve standardized service and facility specifications, ensuring that any manufacturers' compliant subscriber radio has access to the services described in such specifications. Abilities include backward compatibility and interoperability with other systems, across system boundaries, and regardless of system infrastructure. In addition, the P25 suite of standards provides an open interface to the radio frequency (RF) subsystem to facilitate interlinking of different vendors' systems.

Phase 2[edit]

To improve spectrum use, P25 Phase 2 was developed for trunking systems using a 2-slot TDMA scheme and is now required for all new trunking systems in the 700 MHz band.[12] Phase 2 uses the AMBE+2 voice codec to reduce the needed bitrate so that one voice channel will only require 6,000 bits per second (including error correction and signalling). Phase 2 is not backwards compatible with Phase 1 (due to the TDMA vs FDMA operation), although TDMA radios and systems are capable of operating in Phase 1 FDMA when required. A subscriber radio cannot use TDMA transmissions without a time source, therefore direct radio to radio communications (talkaround) resorts to FDMA. And subscriber radios can also resort to narrow-band FM being the least common denominator between almost any two way radio. This could make analog narrow-band FM the de facto 'interoperability' mode for some time.

Originally the implementation of Phase 2 was planned to use 6.25 kHz of bandwidth per frequency allocation, or FDMA. However it proved more advantageous to use existing 12.5 kHz frequency allocations in TDMA mode for a number of reasons. First it eliminated a huge administrative process of reallocating frequency assignments at the FCC for existing Phase 1 users. Second it reduced the amount of base station transmitters as only one transmitter is needed to broadcast two voice slots. And third it allowed subscriber radios to save battery life by only transmitting half the time which also yields the ability for the subscriber radio to listen and respond to system requests between transmissions.

Phase 2 is what is known as 6.25 kHz 'bandwidth equivalent' which satisfies an FCC requirement for voice transmissions to occupy less bandwidth. Voice traffic on a Phase 2 system transmits with the full 12.5 kHz per frequency allocation, as a Phase 1 system does, however it does so at a faster data rate of 12 kbit/s allowing two simultaneous voice transmissions. As such subscriber radios also transmit with the full 12.5 kHz, but in an on/off repeating fashion resulting in half the transmission and thus an equivalent of 6.25 kHz per each radio. This is accomplished using the AMBE voice coder that uses half the rate of the Phase 1 IMBE voice coders.

Beyond Phase 2[edit]

From 2000 to 2009, the European Telecommunications Standards Institute (ETSI) and TIA were working collaboratively on the Public Safety Partnership Project or Project MESA (Mobility for Emergency and Safety Applications),[13] which sought to define a unified set of requirements for a next-generation aeronautical and terrestrial digital wideband/broadband radio standard that could be used to transmit and receive voice, video, and high-speed data in wide-area, multiple-agency networks deployed by public safety agencies.[citation needed]

The final functional and technical requirements have been released by ETSI[14] and were expected to shape the next phases of American Project 25 and European DMR, dPMR, and TETRA, but no interest from the industry followed, since the requirements could not be met by available commercial off-the-shelf technology, and the project was closed in 2010.[citation needed]

Encryption

During the United States 2008 wireless spectrum auction, the FCC allocated 20 MHz of the 700 MHz UHF radio band spectrum freed in the digital TV transition to public safety networks. The FCC expects providers to employ LTE for high-speed data and video applications.[15]

Conventional implementation[edit]

P25 systems do not have to resort to using in band signaling such as Continuous Tone-Coded Squelch System (CTCSS) tone or Digital-Coded Squelch (DCS) codes for access control. Instead they use what is called a Network Access Code (NAC) which is included outside of the digital voice frame. This is a 12 bit code that prefixes every packet of data sent, including those carrying voice transmissions.

The NAC is a feature similar to CTCSS or DCS for analog radios. That is, radios can be programmed to only pass audio when receiving the correct NAC. NACs are programmed as a three-hexadecimal-digit code that is transmitted along with the digital signal being transmitted.

Since the NAC is a three-hexadecimal-digit number (12 bits), there are 4,096 possible NACs for programming, far more than all analog methods combined.

Three of the possible NACs have special functions:

  • 0x293 ($293) – the default NAC
  • 0xf7e ($F7E) – a receiver set for this NAC will pass audio on any decoded signal received
  • 0xf7f ($F7F) – a repeater receiver set for this NAC will allow all incoming decoded signals and the repeater transmitter will retransmit the received NAC.

Adoption[edit]

Adoption of these standards has been slowed by budget problems in the US; however, funding for communications upgrades from the Department of Homeland Security usually requires migrating to Project 25. It is also being used in other countries worldwide including Australia, New Zealand, Brazil, Canada, India and Russia.[16] As of mid-2004 there were 660 networks with P25 deployed in 54 countries.[16] At the same time, in 2005, the European Terrestrial Trunked Radio (TETRA) was deployed in sixty countries, and it is the preferred choice in Europe, China, and other countries.[16] This was largely based on TETRA systems being many times cheaper than P25 systems ($900 vs $6,000 for a radio)[16] at the time. However P25 radio prices are rapidly approaching parity with TETRA radio prices through increased competition in the P25 market. The majority of P25 networks are based in Northern America where it has the advantage that a P25 system has the same coverage and frequency bandwidth as the earlier analog systems that were in use so that channels can be easily upgraded one by one.[16] Some P25 networks also allow intelligent migration from the analog radios to digital radios operating within the same network. Both P25 and TETRA can offer varying degrees of functionality, depending on available radio spectrum, terrain and project budget.

While interoperability is a major goal of P25, many P25 features present interoperability challenges. In theory, all P25 compliant equipment is interoperable. In practice, interoperable communications isn't achievable without effective governance, standardized operating procedures, effective training and exercises, and inter-jurisdictional coordination. The difficulties inherent in developing P25 networks using features such as digital voice, encryption, or trunking sometimes result in feature-backlash and organizational retreat to minimal 'feature-free' P25 implementations which fulfill the letter of any Project 25 migration requirement without realizing the benefits thereof. Additionally, while not a technical issue per se, frictions often result from the unwieldy bureaucratic inter-agency processes that tend to develop in order to coordinate interoperability decisions.

Naming of P25 technology in regions[edit]

  • In Australia, P25 Technology was deployed to the public safety officers by the name of GRN(Government radio networks) (in NSW, South Australia), GWN(Government wireless networks) (in QLD).[17][18] Melbourne Metropolitan Radio (MMR) and Rural Mobile Radio (RMR) (in Victorian Government Radio Networks) [19][20]

Security flaws[edit]

OP25 Project—Encryption flaws in DES-OFB and ADP ciphers[edit]

At the Securecomm 2011 conference in London, security researcher Steve Glass presented a paper, written by himself and co-author Matt Ames, that explained how DES-OFB and Motorola's proprietary ADP (RC4 based) ciphers were vulnerable to brute force key recovery.[21] This research was the result of the OP25 project[22] which uses GNU Radio[23] and the Ettus Universal Software Radio Peripheral (USRP)[24] to implement an open source P25 packet sniffer and analyzer. The OP25 project was founded by Steve Glass in early 2008 while he was performing research into wireless networks as part of his PHD thesis.

The paper is available for download from the NICTA website.[25]

University of Pennsylvania research[edit]

In 2011, the Wall Street Journal published an article describing research into security flaws of the system, including a user interface that makes it difficult for users to recognize when transceivers are operating in secure mode.[26] According to the article, '(R)esearchers from the University of Pennsylvania overheard conversations that included descriptions of undercover agents and confidential informants, plans for forthcoming arrests and information on the technology used in surveillance operations.' The researchers found that the messages sent over the radios are sent in segments, and blocking just a portion of these segments can result in the entire message being jammed. 'Their research also shows that the radios can be effectively jammed (single radio, short range) using a highly modified pink electronic child’s toy and that the standard used by the radios 'provides a convenient means for an attacker' to continuously track the location of a radio’s user. With other systems, jammers have to expend a lot of power to block communications, but the P25 radios allow jamming at relatively low power, enabling the researchers to prevent reception using a $30 toy pager designed for pre-teens.'

The report was presented at the 20th Usenix Security Symposium in San Francisco in August 2011.[27] The report noted a number of security flaws in the Project 25 system, some specific to the way it has been implemented and some inherent in the security design.

Encryption lapses[edit]

The report did not find any breaks in the P25 encryption; however, they observed large amounts of sensitive traffic being sent in the clear due to implementations problems.They found switch markings for secure and clear modes difficult to distinguish (∅ vs. o). This is exacerbated by the fact that P25 radios when set to secure mode continue to operate without issuing a warning if another party switches to clear mode. In addition, the report authors said many P25 systems change keys too often, increasing the risk that an individual radio on a net may not be properly keyed, forcing all users on the net to transmit in the clear to maintain communications with that radio.

Jamming vulnerability[edit]

One design choice was to use lower levels of error correction for portions of the encoded voice data that is deemed less critical for intelligibility. As a result, bit errors may be expected in typical transmissions, and while harmless for voice communication, the presence of such errors force the use of stream ciphers, which can tolerate bit errors, and prevents the use of a standard technique, message authentication codes (MACs), to protect message integrity from stream cipher attacks. The varying levels of error correction are implemented by breaking P25 message frames into subframes. This allows an attacker to jam entire messages by transmitting only during certain short subframes that are critical to reception of the entire frame. As a result, an attacker can effectively jam Project 25 signals with average power levels much lower that the power levels used for communication. Such attacks can be targeted at encrypted transmissions only, forcing users to transmit in the clear.

Because Project 25 radios are designed to work in existing two-way radio frequency channels, they cannot use spread spectrum modulation, which is inherently jam-resistant. An optimal spread spectrum system can require an effective jammer to use 1,000 times as much power (30 dB more) as the individual communicators. According to the report, a P25 jammer could effectively operate at 1/25th the power (14 dB less) than the communicating radios. The authors developed a proof-of-concept jammer using a Texas Instruments CC1110 single chip radio, found in an inexpensive toy.[27]

Traffic analysis and active tracking[edit]

Certain metadata fields in the Project 25 protocol are not encrypted, allowing an attacker to perform traffic analysis to identify users. Because Project 25 radios respond to bad data packets addressed to them with a retransmission request, an attacker can deliberately send bad packets forcing a specific radio to transmit even if the user is attempting to maintain radio silence. Such tracking by authorized users is considered a feature of P25, referred to as 'presence'.[28]

The report's authors concluded by saying 'It is reasonable to wonder why this protocol, which was developed over many years and is used for sensitive and critical applications, is so difficult to use and so vulnerable to attack.' The authors separately issued a set of recommendations for P25 users to mitigate some of the problems found.[29] These include disabling the secure/clear switch, using Network Access Codes to segregate clear and encrypted traffic, and compensating for the unreliability of P25 over-the-air rekeying by extending key life.

Comparison between P25 and TETRA[edit]

P25 and TETRA are used in more than fifty-three countries worldwide for both public safety and private sector radio networks. There are some differences in features and capacities: [30][31][32]

  • TETRA is optimized for high population density areas, and has spectral efficiency of 4 time slots in 25 kHz. (Four communications channels per 25 kHz channel, an efficient use of spectrum). It supports full-duplex voice communication, data, and messaging. It does not provide simulcast, or VHS band.
  • P25 is optimized for wider area coverage with low population density, and also supports simulcast. It is, however, limited with respect to data support. There is a major subdivision within P25 radio systems: Phase I P25 operates analogue, digital, or mixed mode in a single 12.5 kHz channel. Phase II uses a 2-timeslot TDMA structure in each 12.5 kHz channel.

See also[edit]

  • APCO-16, another standard that was not as widely accepted, dealing with trunking formats
  • NXDN, a two-way digital radio standard with similar characteristics
  • Terrestrial Trunked Radio, TETRA, the European(EU) standard equivalent to P25
  • Government radio networks in Australia, examples deployment of P25 technology

Notes[edit]

  1. ^ ab'Project 25 Technology Interest Group - Content - General - What is Project 25?'. project25.org. Project 25 Technology Interest Group. Archived from the original on 2009-02-10. Retrieved 2014-06-06.Cite uses deprecated parameter deadurl= (help)
  2. ^'What is P25?'. Project25.org. Project 25 Technology Interest Group. Archived from the original on 2014-06-07. Retrieved 2014-06-06.Cite uses deprecated parameter deadurl= (help)
  3. ^ ab'Spectrum Management'. Apcointl.org. 2013-09-30. Archived from the original on February 12, 2012. Retrieved 2014-06-06.Cite uses deprecated parameter deadurl= (help)
  4. ^Home - National Association of State Technology Directors
  5. ^'SOR.book'(PDF). Retrieved 2010-09-26.
  6. ^Why Can't We Talk?
  7. ^'A Google Company'(PDF). Motorola. Retrieved 2014-06-06.
  8. ^Search Results IHS Standards Store
  9. ^Daniels Electronics LTD., P25 Radio Systems Training Guide
  10. ^'p25expence'. Retrieved 5 October 2016.
  11. ^'Aeroflex: Application Note - Understanding P25 Modulation Fidelity'(PDF). Archived from the original(PDF) on 2012-03-20. Retrieved 2012-03-26.Cite uses deprecated parameter dead-url= (help)
  12. ^'P25 Phase 2'. Retrieved 9 December 2016.
  13. ^'Mobile Broadband for Public Safety - Home Page'. Project MESA. Retrieved 2014-06-06.
  14. ^www.projectmesa.org - /ftp/Specifications/Archived 2010-06-13 at the Wayback Machine
  15. ^700 MHz Spectrum FCC.gov
  16. ^ abcdeIs this finally P25's year?, Interview with Don Pfohl of Project 25 and Bill Belt of Telecommunications Industry Association's wireless division, 1. May 2005
  17. ^http://smartcom.motorolasolutions.com/qld-projects-recognised-gwn-and-g20/
  18. ^http://www.mingara.net.au/project/qld-gwn
  19. ^http://www.esta.vic.gov.au/None/MMR
  20. ^'Australian Trunking Systems'.
  21. ^'Archived copy'. Archived from the original on 2012-02-03. Retrieved 2012-05-15.Cite uses deprecated parameter deadurl= (help)CS1 maint: archived copy as title (link) Securecomm 2011
  22. ^http://op25.osmocom.org OP25 Project homepage
  23. ^http://gnuradio.org GNU Radio
  24. ^http://ettus.com Ettus USRP
  25. ^http://www.nicta.com.au/pub?doc=5076 Insecurity in Public-Safety Communications: APCO Project 25
  26. ^Valentino-DeVries, Jennifer (2011-08-10). 'Security Flaws in Feds' Radios Make for Easy Eavesdropping'. Wall Street Journal. Retrieved 2011-08-10.
  27. ^ ab'Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio system,' S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, M. Blaze, Proceedings of the 20th Usenix Security Symposium, 2011
  28. ^Design Issues for P25 Digital National Interop
  29. ^P25 security mitigation guide, M. Blaze, et al.
  30. ^https://www.powertrunk.com/docs/Pros_and_Cons_of_P25_vs_TETRA.pdf
  31. ^https://psc.apcointl.org/2012/05/03/p25-and-tetra-technology-roundtable/
  32. ^https://tandcca.com/fm_file/dubai06swancomparison-pdf/

External links[edit]

  • http://www.project25.org/ Project 25 Technology Interest Group (PTIG) home page
  • P25 Overview TIA Standards Development Activities for Public Safety
  • https://web.archive.org/web/20110223005820/http://www.apco911.org/frequency/project25.php APCO International Project 25 page
  • http://www.apco.ca/ APCO Canada
  • http://www.dvsinc.com/papers/p25_training_guide.pdf Daniels' P25 Radio System Training Guide
  • http://urgentcomm.com/mag/radio_oil_water/ Some ways of avoiding P25 interoperability challenges
  • https://web.archive.org/web/20170709195455/https://valid8.com/P25_ISSI_%26_CSSI.html P25 Compliance Test Tools for ISSI
  • https://web.archive.org/web/20111009095647/http://www.etherstack.com/networks.htm#1 P25 Protocol Stack Software
  • https://web.archive.org/web/20110710160611/http://www.dvsinc.com/prj25.htm DVSI P25 Vocoder Software and Hardware
  • http://www.p25phase2.com Radio users and experts discuss P25 Phase 2
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Project_25&oldid=913133487'
How To Decrypt Apco 25 Encryption Algorithm

Encryption is the process of encoding files in such a way that only those who are authorized can access it. Mankind is using encryption from ages even when computers were not in existence. During war they would pass some kind of message that only their tribe or those who are concerned were able to understand.

Linux distribution provides a few standard encryption/decryption tools that can prove to be handy at times. Here in this article we have covered 7 such tools with proper standard examples, which will help you to encrypt, decrypt and password protect your files.

If you are interested in knowing how to generate Random password in Linux as well as creating random password you may like to visit the below link:

1. GnuPG

GnuPG stands for GNU Privacy Guard and is often called as GPG which is a collection of cryptographic software. Written by GNU Project in C programming Language. Latest stable release is 2.0.27.

In most of the today’s Linux distributions, the gnupg package comes by default, if in-case it’s not installed you may apt or yum it from repository.

We have a text file (tecmint.txt) located at ~/Desktop/Tecmint/, which will be used in the examples that follows this article.

Before moving further, check the content of the text file.

Now encrypt tecmint.txt file using gpg. Fisierul meu descarca muzica. As soon as you run the gpc command with option -c (encryption only with symmetric cipher) it will create a file texmint.txt.gpg. You may list the content of the directory to verify.

Note: Enter Paraphrase twice to encrypt the given file. The above encryption was done with CAST5 encryption algorithm automatically. You may specify a different algorithm optionally.

To see all the encryption algorithm present you may fire.

Now, if you want to decrypt the above encrypted file, you may use the following command, but before we start decrypting we will first remove the original file i.e., tecmint.txt and leave the encrypted file tecmint.txt.gpg untouched.

Note: You need to provide the same password you gave at encryption to decrypt when prompted.

2. bcrypt

bcrypt is a key derivation function which is based upon Blowfish cipher. Blowfish cipher is not recommended since the time it was figured that the cipher algorithm can be attacked.

How To Decrypt Apco 25 Encryption Algorithm

If you have not installed bcrypt, you may apt or yum the required package.

Encrypt the file using bcrypt.

How To Decrypt Apco 25 Encryption Algorithms

As soon as you fire the above command, a new file name texmint.txt.bfe is created and original file tecmint.txt gets replaced.

Decrypt the file using bcrypt.

Note: bcrypt do not has a secure form of encryption and hence it’s support has been disabled at least on Debian Jessie.

3. ccrypt

Designed as a replacement of UNIX crypt, ccrypt is an utility for files and streams encryption and decryption. It uses Rijndael cypher.

If you have not installed ccrypt you may apt or yum it.

Encrypt a file using ccrypt. It uses ccencrypt to encrypt and ccdecrypt to decrypt. It is important to notice that at encryption, the original file (tecmint.txt) is replaced by (tecmint.txt.cpt) and at decryption the encrypted file (tecmint.txt.cpt) is replaced by original file (tecmint.txt). You may like to use ls command to check this.

Encrypt a file.

Decrypt a file.

Provide the same password you gave during encryption to decrypt.

4. Zip

It is one of the most famous archive format and it is so much famous that we generally call archive files as zip files in day-to-day communication. It uses pkzip stream cipher algorithm.

If you have not installed zip you may like to apt or yum it.

Apco 25 Radios For Sale

Create a encrypted zip file (several files grouped together) using zip.

Here mypassword is the password used to encrypt it. A archive is created with the name tecmint.zip with zipped files tecmint.txt, tecmint1.txt and tecmint2.txt.

Decrypt the password protected zipped file using unzip.

You need to provide the same password you provided at encryption.

5. Openssl

Openssl is a command line cryptographic toolkit which can be used to encrypt message as well as files.

You may like to install openssl, if it is not already installed.

Encrypt a file using openssl encryption.

Explanation of each option used in the above command.

  1. enc : encryption
  2. -aes-256-cbc : the algorithm to be used.
  3. -in : full path of file to be encrypted.
  4. -out : full path where it will be decrypted.

Decrypt a file using openssl.

6. 7-zip

The very famous open source 7-zip archiver written in C++ and able to compress and uncompress most of the known archive file format.

If you have not installed 7-zip you may like to apt or yum it.

Compress files into zip using 7-zip and encrypt it.

Decompress encrypted zip file using 7-zip.

Note: Provide same password throughout in encryption and decryption process when prompted.

All the tools we have used till now are command based. There is a GUI based encryption tool provided by nautilus, which will help you to encrypt/decrypt files using Graphical interface.

7. Nautilus Encryption Utility

Steps to encrypt files in GUI using Nautilus encryption utility.

Encryption of file in GUI

1. Right click the file you want to encrypt.

2. Select format to zip and provide location to save. Provide password to encrypt as well.

3. Notice the message – encrypted zip created successfully.

Encrypted Zip File Confirmation

Decryption of file in GUI

1. Try opening the zip in GUI. Notice the LOCK-ICON next to file. It will prompt for password, Enter it.

2. When successful, it will open the file for you.

Decryption Confirmation

That’s all for now. I’ll be here again with another interesting topic. Till then stay tuned and connected to Tecmint. Don’t forget to provide us with your valuable feedback in the comments below. Like and share us and help us get spread.

   Coments are closed