28-Mar-2024 23:40 GMT.
UNDER CONSTRUCTION
Anonymous, there are 9 items in your selection
[Files] Sovjet miltary voice encryption machine "Elbrus" for AmigaANN.lu
Posted on 18-Oct-2002 21:50 GMT by selco9 comments
View flat
View list
The simulation of the Sovjet military voice encryption machine "Elbrus" is now available in Aminet. A simulation of the Sovjet voice encryption machine "Elbrus" for Amiga is finally available in Aminet as /util/crypt/elbrus_demo.lha. This machine was used for instance in the NVA (army of the former GDR) and similar machines are still in use in Russia today. The machine manipulates the analouge signal, e.g. the encrypted speech still fits into a 3 khz voice channel and can be transmitted via short wave radio or telephone. A demo version, an example wave file and a detailed descripion is included in the archive and on http://selco.da.ru. The Aminet demo version does not contain any digital encryption in order to comply with the crypto regulations. The full version is available from the author. (Shareware)
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 1 of 9ANN.lu
Posted by Anonymous on 18-Oct-2002 21:11 GMT
"...does not contain any digital encryption in order to comply with the crypto regulations..."
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 2 of 9ANN.lu
Posted by rez on 18-Oct-2002 23:33 GMT
In reply to Comment 1 (Anonymous):
it only says that it scramble the signal in a way that doesn't require a password key to be descrambled. that's all. not that it does nothing.
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 3 of 9ANN.lu
Posted by tinman on 19-Oct-2002 08:06 GMT
In reply to Comment 1 (Anonymous):
it also says that is a limitation of the demo version.
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 4 of 9ANN.lu
Posted by selco on 19-Oct-2002 08:42 GMT
Thats right. The machine changes analogue processing parameters of the voice
signal every view milliseconds. These switching-commands are derived from a
random bitstream (transmitted together with the voice signal) and the password.
That means the sender and receiver apply the same digital operations to the
bitstream by using the pasword in order to get the parameters for the analogues processing.
The Aminet demo does not contain *this* part.
That means the bitstream is used as it is, e.g. unprocessed, without
considering the password. The voice signal becomes totally unintelligible
(Thats the purpose of the machine ;) (listen to the supplied example wave-file)
but as the password was not used at all everybody will be able to decrypt the
signal again.
The archive contains a longer description of the principle.
regards selco
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 5 of 9ANN.lu
Posted by Mike Veroukis on 19-Oct-2002 14:18 GMT
In reply to Comment 4 (selco):
So I suppose that this would be only useful for encrypting audi files before sending them to a friend or something. I'm sure the oiriginal use for this was to encrypt live & direct communications like phone lines. Is there anyway to use this thing as a plugin for some kind of internet voice chat system?
Also, how secure is it? Hasn't the NSA cracked this yet? :)
- Mike
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 6 of 9ANN.lu
Posted by Anonymous on 19-Oct-2002 17:00 GMT
In reply to Comment 5 (Mike Veroukis):
It's of almost no practical value to civilians now that most communications systems are digital (and can therefore carry digital encryption) but it's still quite cool because you can actually hear what it's doing.
In terms of security, this technology is sufficient to defeat an adversary with limited resources and no specialist knowledge. Examples of such adversaries would include your family and friends, organised crime, local police, small companies and poor African countries.
On the other hand the NSA, or any similarly sophisticated group can probably handle off-line cryptanalysis of this system as a routine service.
The sole advantage of "analogue voice" crypto systems is that they can be cheaply deployed with an existing, tried and tested analogue communication system. This means you'll find it used by police forces and army units where cost was more important than high security. If you do "break" one of these systems the conversations you'll hear will use codewords [which you may or may not understand] and be mostly routine stuff.
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 7 of 9ANN.lu
Posted by Mike Veroukis on 20-Oct-2002 01:22 GMT
In reply to Comment 6 (Anonymous):
Basically the sort of thing Osama Bin Ladden would be interested in. :)
- Mike
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 8 of 9ANN.lu
Posted by Trizt on 20-Oct-2002 12:31 GMT
In reply to Comment 5 (Mike Veroukis):
What I have heared:
1. Most of the USSR military trafic went over dedicated cables, located in the sea north of USSR.
2. Thise cables wasn't guarded
3. US Navy tapped into thise cable with help of submarines
How much truth there is to this, I don't know.
Sovjet miltary voice encryption machine "Elbrus" for Amiga : Comment 9 of 9ANN.lu
Posted by alan buxey on 21-Oct-2002 09:48 GMT
..nice. what sort of CPU power does this require?
would it be easy to integrate into a current Amiga internet chat program?
Also, what STRENGTH of encryption does this have compared to digital? Why
can you not have the encryption part 'active' - export laws worldwide have changed
quite dramatically - the US no longer worries about < 256bit stuff for example
Anonymous, there are 9 items in your selection
Back to Top