Radio Encryption: The Evolution

Radio Encryption: The Evolution

The theory behind using codes as a form of encryption is age-old. The ancient Spartans are known to have used a form of cryptography called a ‘scytale’ essentially a strip of paper wrapped around a baton. The paper was then unwound and appeared as a random list of letters unless wrapped around the same sized baton. This illustrates the fundamental aspect of encryption: only the sender and the receiver have knowledge of the specific ‘key’ that unlocks the message.

Jumping ahead to the age of wireless communications, very early radio voice transmissions were not very clear and the use of Morse code improved the likelihood of messages being correctly received and understood. As the popularity of wireless communications increased, so did concerns for security. Transmitting over the air, by way of broadcast, meant that messages could be easily intercepted and fall into unintended hands. So wireless transmitters turned to the age-old espionage tricks of codes and ciphers.

These codes evolved from simple substitution codes to single use code phrases with security measures and identification prefixing the message itself. These were all coded by operatives in the field who were under immense pressure. This meant that mistakes were bound to be made with messages sometimes needing to be repeatedly transmitted exposing field operatives for extended periods of time. This gave military opponents extra time to both break the cipher and catch undercover operatives. These operator codes were quickly replaced with mechanically generated encoding such as the German Enigma machine which significantly decreased the time operatives were in the open and decreased the chances of the codes being broken.

Radio Encryption

In the modern era, ciphers, codes and keys are generated digitally offering much higher levels of security. These keys – along with multiple other levels of encryption – combine to make encrypted voice over HF radio unintelligible to any listener without the correct key. The keys are now longer – 56 characters for DES-56 encryption or 256 characters for AES-256 encryption – and more complex, forming only one part of the encryption process.

Barrett Communications offers two tiers of encryption for their HF transceivers. The lower tier DES-56 encryption is non-export controlled and suitable for non-classified, time-critical information transfer e.g. orders that will become irrelevant in less than 24 hours.

The upper tier of encryption offered by Barrett is export-controlled US Federal Standard AES-256 encryption. This encryption offers greater security than DES-56 and is suitable for the transfer of classified information.

Both encryption tiers can be combined with Barrett’s Frequency Hopping option, significantly increasing the level of information security.

RELATED ARTICLES

The diverse range of critical communications scenarios

From firefighters on the front lines of forest fires to embassies and consulates around the globe, workers of all stripes need critical communications channels to get their jobs done. More Related News/Articles:What 3 factors does HF radio offer critical communications?The importance of encryption for critical…Has software-defined radio transformed critical response?What role does secure radio play […]

Using a manpack to stay in touch

Long range patrols, away from your typical communication channels, require communications equipment capable of long haul links back to base. More Related News/Articles:A simple guide to interoperability between HF and…How are Barrett’s HF radios helping African…How vital is HF radio communications in remote…Why do we need secure communication?

The automatic tuning advantage

When engaging in a critical comms or humanitarian mission, timing and efficiency are everything. More Related News/Articles:NVIS kit for 2019 Automatic Tuning Mobile Whip…What is the right antenna for your operation?The best antennas to use during field operationsWhy humanitarian services need to use SSB transmissions

HF or VHF: Which is right for you?

If you’ve managed a tactical, critical comms or humanitarian mission, then you know the importance of making sure every member of your team is on the same page. More Related News/Articles:Radio tracking features for security and transparency3 questions to answer when setting up a critical…What’s the difference between how HF and VHF/UHF…Feeding The World: HF […]

Radio tracking features for security and transparency

Whether engaging in tactical, humanitarian, law enforcement or commercial work, you need a radio tracking system that keeps you and your team accounted for. More Related News/Articles:Why security is the top requirement for tactical…Barrett launches new tracking capability3 basic elements of tactical HF radio securityWhat role does secure radio play in critical communication?

Barrett helps break new ground in inter-island communication with Vanuatu

As a part a Defence Cooperation Program between Australia and Vanuatu, Barrett Communications recently delivered new 4050 HF Software Defined Radios (SDR) to the police force of Vanuatu. More Related News/Articles:Barrett Communications continues to deliver…The automatic tuning advantageBarrett: Empowering communities with communications…Barrett at Pacific Endeavour 2018: what did we learn?

Post by onchada_admin