![]() |
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
|
#1
|
|||
|
|||
![]() |
#2
|
|||
|
|||
![]()
On 25 Sep 2003 06:23:38 -0700, Kevin Brooks wrote:
(phil hunt) wrote in message ... On 23 Sep 2003 20:00:32 -0700, Kevin Brooks wrote: No. Paul is correct, DF'ing a "frequency agile" (or "hopping") transmitter is no easy task. For example, the standard US SINCGARS radio changes frequencies about one hundred times per *second*, Bear in mind that I'm talking about automated electronic gear here, not manual intervention. Electronics works in time spans a lot quicker than 10 ms. So what? Unless you know the frequency hopping plan ahead of time (something that is rather closely guarded), you can't capture enough of the transmission to do you any good--they use a rather broad spectrum. OK, I now understand that DF generally relies on knowing the frequency in advance. BTW, when you say a rather broad spectrum, how broad? And divided into how many bands, roughly? It uses the entire normal military VHF FM spectrum, 30-88 MHz. ISTR that the steps in between are measured in 1 KHz increments, as opposed to the old 10 KHz increments found in older FM radios like the AN/VRC-12 family, so the number of different frequencies SINGCARS can use is 58,000. More than one 1 kHz slot is likely to be in use at anyone time, since you need enough bandwidth for voice. Say 20, then about 1/3000th of the frequency space is in use at any one time. Modern crypto is good enough to withstand all cryptanalytic attacks. Only if it were so...but thank goodness it is not. Oh? So who can break AES/Rijndael? Otherwise we would have lost the value of one of our largest and most valuable intel programs, and NSA would no longer exist. Even the cypher keys used by our modern tactical radios (said keys being generated by NSA at the top end, though we now have computers in the field capable of "key generation" using input from that source) are not unbreakable--instead, they are tough enough to break that we can be reasonably assured that the bad guys will not be able to gain any kind of *timely* tactical intel; enough computing power in the hands of the crypto-geeks and they can indeed break them, True, but "enough" happens to be more than all the computers in existance right now, or likely to exist. Assume: there are 1 billion computers, each of which can check 1 billion keys/second. Then a brute-force search on a 128-bit keyspace would take about 10^60 years. -- "It's easier to find people online who openly support the KKK than people who openly support the RIAA" -- comment on Wikipedia |
#3
|
|||
|
|||
![]() |
Thread Tools | |
Display Modes | |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
---California International Air Show Pics Posted!!!! | Tyson Rininger | Aerobatics | 0 | February 23rd 04 11:51 AM |
TRUCKEE,CA DONNER LAKE 12-03 PICS. @ webshots | TRUCKEE_DONNER_LAKE | Instrument Flight Rules | 3 | December 19th 03 04:48 PM |
Aviation Pics | Tyson Rininger | Aviation Marketplace | 0 | November 7th 03 01:04 AM |
b-17C interior pics site | old hoodoo | Military Aviation | 0 | September 15th 03 03:42 AM |
Nam era F-4 pilot pics? | davidG35 | Military Aviation | 2 | August 4th 03 03:44 PM |