Questions tagged [military-encryption]
9 questions
42
votes
12 answers
Differences between industrial and military cryptography
Industrial and military cryptography should follow the same basic rules, but what does make them different is:
Higher key length, protocols unknown to the civilian world, and perhaps unique methods of transferring media
Are there other…
R1w
- 1,960
- 4
- 23
- 45
8
votes
3 answers
Key management for military GPS receivers
I wonder what encryption scheme is used in high-precision encrypted GPS streams (the so-called “P(Y) code”). If there's a master key needed, then it has to be in every device. Yet the master key doesn't seem to have ever leaked (unlike like game…
Klayman
- 191
- 1
- 2
7
votes
1 answer
How do encrypted radios perform key exchange?
I'm having difficulty finding documentation for the over-the-air protocols used by encrypted public safety radios. It seems that most systems are based on Project 25, previously known as APCO Project 25, now simply called P25, and that this…
vy32
- 439
- 3
- 13
3
votes
1 answer
On real-time decryption of encrypted radio communications
According to Jack Watling & Nick Reynolds,
Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian…
Rodrigo de Azevedo
- 237
- 1
- 11
2
votes
2 answers
How were codes in WW1 reciphered (to enhance security levels) without them turning meaningless?
In WW1, the Germans made their communications secret by encoding their messages. This meant that the message's sender would have a codebook with all possible words and phrases he might use listed in alphabetical order. Those were attached to a…
Kristian Francisco Milla Niels
- 101
- 1
- 5
2
votes
1 answer
Choosing encryption algorithms and protocols in military systems
Militaries use their own cryptographic algorithms, those of a private third party, or ones that are openly available. However, fear of a backdoor having been planted in publicly-available encryption protocols scares them even though it is…
R1w
- 1,960
- 4
- 23
- 45
2
votes
0 answers
Hagelin C-35 implementation
I have tried to implement the Hagelin C-35 machine. This machine has the historical significance of being the first mechanical pin-and-lug machine, as far as
I know. It is thus a predecessor of M-209 and CX-52, among others. Nevertheless, the only…
Keplerto
- 121
- 2
0
votes
0 answers
Seeking Open Research Problems in zk Cryptography for Military Applications
I am currently working on my thesis as a researcher specializing in zero-knowledge (zk) cryptography. My focus is on identifying and solving open research problems related to the application of zk cryptography in military systems.
I am particularly…
Nerses Asaturyan
- 15
- 2
-2
votes
1 answer
Playfair cipher or ADFGX?
As part of an assignment, I have been given a cipher text of
FFFXXXFGXAGFAFDAFXADDAGAD
with the following description,
A zebra could unlock this German, 1st World War cipher.
At first, I thought that the description could contain a Playfair…
MPol
- 25
- 3