home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: sci.crypt
- Path: sparky!uunet!cs.utexas.edu!torn!nott!dgbt!clark.dgim.doc.ca!news
- From: nur@mars.dgrc.doc.ca (Nur Serinken)
- Subject: Re: Motorola 'Secure-Clea
- Message-ID: <1993Jan6.133347.310@clark.dgim.doc.ca>
- Sender: news@clark.dgim.doc.ca (Usenet News)
- Reply-To: nur@mars.dgrc.doc.ca
- Organization: Communication Research Centre
- References: <1993Jan6.083201.7026@netcom.com>
- Distribution: na
- Date: Wed, 6 Jan 93 13:33:47 GMT
- Lines: 55
-
- In article 7026@netcom.com, rcain@netcom.com (Robert Cain) writes:
-
- What about the modern analog devices that use split band inversion where
- one of 32 programmable split points in the voice band may be selected
- and changed at 60 Hz or faster at "random?" Two separate inversions
- are performed, one for the lower sideband and one for the upper
- sideband around the split point. This seems *much* harder. This topic
- has come up before but perhaps we have new readers. Does anyone have
- any actual knowledge of or experience at trying to decode such a
- signal? With such short segments it seems to me that only brute force
- "try the possibilities" could work and the combinatorics are rather
- formidable with 32^60 or 2E90 possibilities in each second's worth of
- speech.
-
- Combine this with spread spectrum or Pulson modulation and, well....
-
- What's Pulson modulation? It is a method where the signal is impressed
- on a carrier that is a sequence of pseudo randomly spaced 1.5 ns pulses
- by dithering the pulse position about its expected position. In theory
- this can only be demodulated by a receiver that knows the pseudo random
- spacing of the carrier pulse train. A transceiver has been
- demonstrated by Pulson Communications using a pulse train centered at
- 1.9 GHz with a 100% pseudo random modulation of the pulses about the
- center period (before dithering.) Now that I think about it, a PRN
- that can spit out a new number every 500 ps sounds rather difficult.
- Not to mention the method for controling the pulse position that
- rapidly. Well, they say they have done it anyway.
-
- Bob
- --
- Bob Cain rcain@netcom.com 408-358-2007
-
- End of article from Bob Cain.
-
-
- If the 32 folding frequencies are identified by analyzing spectograph of the
- encrypted signal, the inversion operation will be trivial. At the 32 folding
- frequencies there will be a deep null and some folding sine wave leaking. If
- the folding operation is performed at 16 msec intervals when one folding location
- in time is identified next folding operation will be 16 msec later. ( 16 msec is
- assumed if the folding performed at 60 times per second ). If the system uses
- same 32 folding frequencies a parallel bank of detector filters can detect
- the folding points and invert them.
-
- ---
-
-
- Nur Serinken | Communications Research Centre -DRL
- | PO Box 11490 Stn "H"
- | Ottawa, ON K2H 8S2
- Voice-(613) 998-2289| Canada
- Fax -(613) 990-7987|
- INTERNET: nur@mars.dgrc.doc.ca
-
-