Questions tagged [military-encryption]

9 questions
42
votes
12 answers

Differences between industrial and military cryptography

Industrial and military cryptography should follow the same basic rules, but what does make them different is: Higher key length, protocols unknown to the civilian world, and perhaps unique methods of transferring media Are there other…
R1w
  • 1,960
  • 4
  • 23
  • 45
8
votes
3 answers

Key management for military GPS receivers

I wonder what encryption scheme is used in high-precision encrypted GPS streams (the so-called “P(Y) code”). If there's a master key needed, then it has to be in every device. Yet the master key doesn't seem to have ever leaked (unlike like game…
7
votes
1 answer

How do encrypted radios perform key exchange?

I'm having difficulty finding documentation for the over-the-air protocols used by encrypted public safety radios. It seems that most systems are based on Project 25, previously known as APCO Project 25, now simply called P25, and that this…
vy32
  • 439
  • 3
  • 13
3
votes
1 answer

On real-time decryption of encrypted radio communications

According to Jack Watling & Nick Reynolds, Ukrainian officers recalled one incident in which the Russian headquarters gave pre-emptive warning to its units of an artillery strike based on Ukrainian troops calling in a fire mission. The Ukrainian…
2
votes
2 answers

How were codes in WW1 reciphered (to enhance security levels) without them turning meaningless?

In WW1, the Germans made their communications secret by encoding their messages. This meant that the message's sender would have a codebook with all possible words and phrases he might use listed in alphabetical order. Those were attached to a…
2
votes
1 answer

Choosing encryption algorithms and protocols in military systems

Militaries use their own cryptographic algorithms, those of a private third party, or ones that are openly available. However, fear of a backdoor having been planted in publicly-available encryption protocols scares them even though it is…
R1w
  • 1,960
  • 4
  • 23
  • 45
2
votes
0 answers

Hagelin C-35 implementation

I have tried to implement the Hagelin C-35 machine. This machine has the historical significance of being the first mechanical pin-and-lug machine, as far as I know. It is thus a predecessor of M-209 and CX-52, among others. Nevertheless, the only…
Keplerto
  • 121
  • 2
0
votes
0 answers

Seeking Open Research Problems in zk Cryptography for Military Applications

I am currently working on my thesis as a researcher specializing in zero-knowledge (zk) cryptography. My focus is on identifying and solving open research problems related to the application of zk cryptography in military systems. I am particularly…
-2
votes
1 answer

Playfair cipher or ADFGX?

As part of an assignment, I have been given a cipher text of FFFXXXFGXAGFAFDAFXADDAGAD with the following description, A zebra could unlock this German, 1st World War cipher. At first, I thought that the description could contain a Playfair…