Radio Encryption: The Evolution

Radio Encryption: The Evolution

The theory behind using codes as a form of encryption is age-old. The ancient Spartans are known to have used a form of cryptography called a ‘scytale’ essentially a strip of paper wrapped around a baton. The paper was then unwound and appeared as a random list of letters unless wrapped around the same sized baton. This illustrates the fundamental aspect of encryption: only the sender and the receiver have knowledge of the specific ‘key’ that unlocks the message.

Jumping ahead to the age of wireless communications, very early radio voice transmissions were not very clear and the use of Morse code improved the likelihood of messages being correctly received and understood. As the popularity of wireless communications increased, so did concerns for security. Transmitting over the air, by way of broadcast, meant that messages could be easily intercepted and fall into unintended hands. So wireless transmitters turned to the age-old espionage tricks of codes and ciphers.

These codes evolved from simple substitution codes to single use code phrases with security measures and identification prefixing the message itself. These were all coded by operatives in the field who were under immense pressure. This meant that mistakes were bound to be made with messages sometimes needing to be repeatedly transmitted exposing field operatives for extended periods of time. This gave military opponents extra time to both break the cipher and catch undercover operatives. These operator codes were quickly replaced with mechanically generated encoding such as the German Enigma machine which significantly decreased the time operatives were in the open and decreased the chances of the codes being broken.

Radio Encryption

In the modern era, ciphers, codes and keys are generated digitally offering much higher levels of security. These keys – along with multiple other levels of encryption – combine to make encrypted voice over HF radio unintelligible to any listener without the correct key. The keys are now longer – 56 characters for DES-56 encryption or 256 characters for AES-256 encryption – and more complex, forming only one part of the encryption process.

Barrett Communications offers two tiers of encryption for their HF transceivers. The lower tier DES-56 encryption is non-export controlled and suitable for non-classified, time-critical information transfer e.g. orders that will become irrelevant in less than 24 hours.

The upper tier of encryption offered by Barrett is export-controlled US Federal Standard AES-256 encryption. This encryption offers greater security than DES-56 and is suitable for the transfer of classified information.

Both encryption tiers can be combined with Barrett’s Frequency Hopping option, significantly increasing the level of information security.


What a digital voice vocoder can offer

Whether you’re on a tactical operation or a humanitarian mission, you need to be confident that your team can understand each and every word you say.

Why you need a high-power HF transmitter

the Barrett 4075 high-power HF transmitter When you need to communicate over long distances with confidence and reliability, you need an HF transmitter that can handle the task.

Using HF radio to call worldwide

The Barrett 2060 Interconnect and 4050 transceiver High-frequency radio allows you to do more than just communicate with other radio sets.

Know your HF security options

For so many tactical missions, discretion and secure communication are key. Barrett Communications understands this and offers the kinds of security features

The diverse range of critical communications scenarios

From firefighters on the front lines of forest fires to embassies and consulates around the globe, workers of all stripes need critical communications channels to get their jobs done.

Using a manpack to stay in touch

Long range patrols, away from your typical communication channels, require communications equipment capable of long haul links back to base.

Post by onchada_admin