home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cis.ohio-state.edu!zaphod.mps.ohio-state.edu!news.acns.nwu.edu!telecom-request
- Date: 19 Aug 92 17:16:19 GMT
- From: Brinton Cooper <abc@brl.mil>
- Newsgroups: comp.dcom.telecom
- Subject: Re: New 900 MHz Cordless Phone
- Message-ID: <telecom12.647.10@eecs.nwu.edu>
- Organization: The US Army Research Laboratory
- Sender: Telecom@eecs.nwu.edu
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 12, Issue 647, Message 10 of 11
- Lines: 44
-
- In article <telecom12.623.1@eecs.nwu.edu> mailrus!gatech!eecom!
- wberbeni@uunet.UU.NET (W. Berbenich) writes:
-
- > In article <telecom12.613.1@eecs.nwu.edu> jongsma@esseye.si.com (Ken
- > Jongsma) writes:
-
- >> In the August 3rd {Business Week}...
-
- >> Cincinnati Microwave, Inc. [the radar detector people] figures
- >> executives and consumers will pay a small premium for cordless
- >> privacy. The company has developed a phone, to be marketed in October
- >> by its Escort division for about $300, that thwarts eavesdroppers with
- >> "spread spectrum" technology, which is similar to the encryption
- >> method that the military uses in secure radios. The signals between
-
- > I believe there may be a misstatement of fact in the BW piece. Is
- > there anyone who believes that spread-spectrum is a form of cipher or
- > encryption? I am quite sure that it isn't.
-
- I don't know the "rules," if any, for cordless phones, but the FCC
- requires radio amateurs experimenting with spread spectrum to use a
- known, LINEAR, generator for the spectrum spreading code. The code
- generated by a linear shift register, pseudorandom code generator
- having n stages can be "broken," by solving 2n+1 linear equations.
-
- Also, linear codes are much easier to generate than are nonlinear
- codes, suggesting that Cincinnati Microwave, in an effort to control
- development costs while being able to choose codes from a very large
- set, may well be using linear codes.
-
- It sounds as if the sets described are effective only against
- unsophisticated users who tune in using an older TV with a tuner that
- covers through channel 84. It wouldn't take much more than a code
- demodulator and a PC with suitable interface to give a savvy
- eavesdropper the ability to continue his/her hobby.
-
- In fact, if truely secure encryption were this easy, Cincinnati Micro
- would be making big bucks on the encryption technology alone and
- wouldn't worry about selling phones.
-
-
- Brinton Cooper <abc@brl.mil>, <cooper@udel.edu>, or <ab.cooper@compmail.com>
-
-