CODAN NGT Voice Encryptor Option

Slides:



Advertisements
Similar presentations
VHF-90M Military VHF-Transciever
Advertisements

WELCOME A Security Masterpiece. Control Panel Line-up Max Zones Basic Zones Max Zones Basic Zones n 1725EX14 6 (4 + 2) n 1728EX15 7 (5 + 2) n 1738EX16.
High Performance 32 Channel ADPCM Codec File Number Here ® LogiCORE Products.
Projector Controllers
GST FIRE ALARM SYSTEM INTERNATIONAL BUSINESS DEPARTMENT , GST BEIJING
6-1 I/O Methods I/O – Transfer of data between memory of the system and the I/O device Most devices operate asynchronously from the CPU Most methods involve.
Smart EQ Digital Stereo Equalizer Dustin Demontigny David Bull.
DSP Implementation of a 1961 Fender Champ Amplifier James Siegle Advisor: Dr. Thomas L. Stewart March 11, 2003.
Monitoring systems COMET types MS55 & MS6 MS55/MS6 Configuration.
1 Summary of SDR Analog radio systems are being replaced by digital radio systems for various radio applications. SDR technology aims to take advantage.
Produces audio signals to be used as a tool or aid in any audio system Pink or white noise Used to mask or cover unwanted background noise Helps limit.
ESTeem Training Class ESTeem Overview. ESTeem Product Categories Licensed Serial – Long Range Application – Exclusive Use of FCC Frequency – PLC Emulation.
All rights reserved © 2010, Mobiserve Prepared By: RIZWAN AHMED RAFIQ Operation Support Engineer (Training & Consultancy) ALCATEL BTS.
Technician License Course Chapter 5 Operating Station Equipment Lesson Plan Module 11: Transmitters, Receivers and Transceivers.
Datron World Communications Inc. RT7000 HF TRANSCEIVER FIELD MAINTENANCE PROCEDURES.
Developed and Presented By: Martin Dunsmuir, AScT, VE7BDF, VE0MD President, White Squall Consulting Inc. NVIS Antenna System Design, Construction and Deployment.
NSGF 2000 PICO EVENT TIMER HERSTMONCEUX SLR STATION.
1 Security Systems ST-CO/GP | 11/21/2006 | © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights.
Automatic Equalization for Live Venue Sound Systems Damien Dooley, Final Year ECE Progress To Date, Monday 21 st January 2008.
Zones 1 to 8 Siren Keypad Power 12V Data and clock By default: Zone 1 Entry Exit 2 Follower 3 Instant 4 Instant 5 Instant 6 Instant 7 Instant 8 Panic.
PRO OX ® -100 Kit PROGRAMMABLE DIGITAL OXYGEN MONITOR US & FOREIGN PATENTS ISSUED & PENDING STATE-OF-THE-ART TECHNOLOGY FOR PRECISE OXYGEN MONITORING MADE.
Antenna Arrays and Automotive Applications
ARM Based Active Kiosk with Speech Student’s Name with USN No. Guide Name HOD Name College Name, Dept.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Security Systems BU Communication Systems Slide 1 Plena Voice Alarm System Phase 2.
VHF102 Transverter Integration
Codec 2 open source speech codec
Single Ended Measuring Modes of ELQ 30A+
FCC DIGITAL 1ch VIDEO&1ch AUDIO LINK PRODUCT SPECIFICATION
804 Multimedia Test Instrument
Feature descriptions and practical usage
Technician License Course Module Ten Operating Station Equipment
Monitoring systems COMET types MS55 & MS6
Instructor Materials Chapter 6 Building a Home Network
Global System for Mobile Communications
Voice Manipulator Department of Electrical & Computer Engineering
FCC DIGITAL 2ch VIDEO & 1ch AUDIO / 1ch DATA LINK
GEM-P1632 Hybrid Control Communicator
Legacy -Marking Solutions-
Digital Communications Chapter 13. Source Coding
Adaptive Filters Common filter design methods assume that the characteristics of the signal remain constant in time. However, when the signal characteristics.
Overview Communication is the transfer of information from one place to another. This should be done - as efficiently as possible - with as much fidelity/reliability.
디지털통신 Introduction 임 민 중 동국대학교 정보통신공학과 1.
This chapter provides a series of applications.
NSA-7000 Stylish flush mount Network Sensors
Anne Pratoomtong ECE734, Spring2002
New BRS Digital Radio NXDN 1pin Screw Connector 7 Color LED Second PTT
Introduction King Saud University
“I don’t have to be careful, I’ve got a gun.”
Asynchronous Serial Communications
Technician Licensing Class
Chapter 8: Monitoring the Network
Operating procedures and practices
NGT Enhancements Unique user interface
CSCI1600: Embedded and Real Time Software
Duy Dang, Robert Kern, Esteban Kleckner
Overview of Signals & Systems
Five Key Computer Components
Technisonic Industries TDFM-136
Splash.
Which of the following is a digital communications mode?
Capstone Design Team 1 Kahnec De La Torre – Lead Report Manager
Voice Manipulator Department of Electrical & Computer Engineering
Wavewin Sniffer 24 Configuration & Polling Software
An Introduction to CDMA Air Interface: IS-95A
CSCI1600: Embedded and Real Time Software
♪ Embedded System Design: Synthesizing Music Using Programmable Logic
Embedded Sound Processing : Implementing the Echo Effect
Security in Wide Area Networks
Introduction 1st semester King Saud University
Presentation transcript:

CODAN NGT Voice Encryptor Option

What is the Voice Encryptor Option? Highly secure voice encryption facility for use with NGT HF SSB transceivers Extremely simple to use Fully integrated in NGT transceiver & unobtrusive Available on all models VR, SR & AR Exclusive to Codan

Background Developed in partnership with CES Communications Ltd. of New Zealand CES is a firm specialised in voice & fax security products Codan’s NGT Voice Encryptor option uses CES’s Safe technology Safe characteristics are intrinsically suitable for use on HF

Simple To Use Single key activates secure mode (8-key labelled with SEC) Security mode is visually and audibly confirmed Hold 8-key optionally enters PIN mode for additional security

Suitability for use on HF No synchronisation required Any distance / Any number of stations Excellent decrypted signal recovery Reliable communication even in weak signal conditions Frequency offset is automatically compensated

Highly Secure Unique patented signal encryption algorithm (US Patent 5101432) 109864 combinations possible 1038 active combinations (128 bit key) Security level is well suited for tactical military use or any commercial requirement Algorithm is user modifiable if needed

Voice Encryptor Hardware Requires latest RF Unit DSP PCB with special ribbon connector fitted Encryptor PCB mounted on top of four hexagonal spacers Connects to DSP board via a ribbon connector Security keys are reset when PCB is removed from transceiver

Security Modes Available Corporate Mode with user programmable keys Global Mode with factory hard-coded key Optional PIN mode for additional security on top of Corporate or Global modes Current mode indicated on display

So Which Mode Do You Use? Corporate Mode for primary security within an organisation Global Mode is much less secure but useful for interoperability with other organisations PIN mode is optional and intended for temporary secure sessions of groups within an organisation

Basic Security Users Security switched On/Off via 8-key One 8 digit pre-configured Corporate Key Global Mode locked & hidden PIN mode via Hold-8-key disabled & hidden

Advanced Security Users Security On/Off via 8-key Additional PIN mode available via Hold-8 User can select between Corporate & Global Modes

Highly Sophisticated Security Users (e.g. Governments) In addition to the advanced facilities: More than one Corporate Keys configured (Up to 6 key locations available) Allow user selection of key index for e.g. rotating the key in use on a weekly basis Modified base-key which changes all Corporate Keys (default is normally all 0’s) User modifications to encryption algorithm (requires PC application from CES)

Security Key Management Security keys are programmable via Handset, NSP, CICS or Over-The-Air Handset programmable items include: Corporate Key (8 digits, index 1) Default Mode (Corporate / Global) Corporate Key Index to use Base key & other corporate keys (16 digits) programmable via CICS only

Security Modes Key Relations Global Key (Hard-coded) PIN (Optional) Global Mode Random Number Generator Working Key Seed (128 bits) Corporate Mode Corporatate Key (Index 1..Index 6) Corporatate Key (Index 1..Index 6) Corporatate Key (Index 1..Index 6) PIN (Optional) Corporate Key (Index 1..Index 6) Base Key (Index 0) - default 0’s

So how does it work? A 128 bit seed is generated from Global or Corporate Keys and optional PIN Seed is used as input to a random generator Random generator output is used to determine coefficients of an digital FIR filter Audio signal is sampled at 8000 kHz

So how does it work? (cont.) Samples are stepped through FIR taps 2048 taps with each a 16 bit coefficient Randomised coefficients produce a filter with a fully randomised group delay and hence signal encryption Nr. of bits used in coefficients is 32768 232768 bits ==> ~ 109864 possibilities

Impulse Response Example Impulse input into FIR filter results in 250ms noise burst The voice encryptor also uses a frequency inversion process on top of the time smearing

Security Levels & Key Space Total Key Space 109864 Sophisticated users can shift the whole Active Key Space through modification of the Random Number Generator used. Active Key Space 1038 Corporate + PIN 1012 Corporate 108

So what does it sound like? Encrypted Transmission Clear Transmission Decrypted Transmission

Availability Available for all NGT models (VR, SR, AR) Part Number 15-00507-000 Requires end-customer certificate to obtain export licence from Australia

Summary Fully integrated voice security facility Very high security level, approaching TCC DSP-9000 security levels Third of the price of the TCC units Adaptable from a very basic mode to a highly sophisticated mode Suitable for many military & government level security requirements