TITLE

Is King Crypto's Crown Secure?

AUTHOR(S)
Richardson, Doug; Keggler, Johnny
PUB. DATE
April 2007
SOURCE
Armada International;Apr/May2007, Vol. 31 Issue 2, p20
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the emergence military technologies for encrypted communications. The Tadiran Communications CNR-9000 tactical combat radio system of the Israeli Defense Forces uses digital encryption for voice and data and incorporates full-band frequency-hopping techniques. The Harris Radio Frequency (RF) Communications PRC-117F radio used by the U.S. Special Operations Forces community is a software-controlled radio that can be assembled into manpack and base-station configurations.
ACCESSION #
24910962

 

Related Articles

  • TECHNICAL COMMUNICATIONS GETS MORE AFGHANISTAN ORDERS.  // Worldwide Telecom;Jan2011, Vol. 23 Issue 1, p1 

    The article reports on additional orders valued at around 1.5 million U.S. dollars received by Technical Communications Corp. (TCC) for its DSP 9000 radio encryptor that will equip the military forces in Afghanistan. Datron World Communications, a global supplier of tactical communications...

  • Two New Air Force Thunderbird Frequencies Discovered. Van Horn, Larry // Monitoring Times;Nov2012, Vol. 31 Issue 11, p42 

    The author reports the discovery of two new frequencies in use by the U.S. Air Force Thunderbird Flight Demonstration Team, one of which is a team Very High Frequency (VHF) signal of 141.175 Megahertz (MHz) and the other being a frequency of 4845.0 MHz that transmitted a live video feed from a...

  • Steganography. Adamy, Dave // Journal of Electronic Defense;Oct2012, Vol. 35 Issue 10, p47 

    The article presents Part 18 of the spectrum warfare series which explores the subject of steganography or hidden writing, focusing on its applications in electronic and information warfare. It discusses the functions and advantages of steganography and encryption, and describes methods of...

  • Harris Corp. Conducts Successful Demonstration of Networked Maritime Radio.  // Microwave Journal;Sep2008, Vol. 51 Issue 9, p117 

    The article reports on the three-day series of demonstrations of Harris Corp.'s SeaLancet RT-1944/U tactical radio. It states that the tactical radio is designed to provide network-centric communications to networks. The features of the radio are presented. Its applications include...

  • BAE Systems' Phoenix Radios Successful In Tactical Networking At Army Exercise. Roosevelt, Ann // Defense Daily;12/17/2012, Vol. 256 Issue 51, p4 

    The article reports that according to BAE Systems Inc., its Phoenix-2C radios provided tactical networking capabilities during recent exercises conducted by the U.S. Army. These radios were tested at Ft. Huachuca, Arizona in December 2012. With the help of Phoenix radios, soldiers can...

  • Automatic Target Classification for Naval Radars. Moruzzis, Michel; Saulais, Pierre; Tan Hock Tat; Tong Cherng Huei // Military Technology;Jul2005, Vol. 29 Issue 7, p91 

    Discusses the techniques and main concepts for automatic classification of air and naval targets for naval radars. General architecture of the classification function; Kinematics, Doppler spectrum and range profiles of air targets; Classification of naval targets.

  • The tactical high-speed data super radio-access unit: a success in Kosovo. Llanos, Andrew; Are, David // Army Communicator;Fall2001, Vol. 26 Issue 3, p12 

    The article describes one of the successes for communications soldiers in Kosovo. It details the Signal Regiment's provision of information services as part of Task Force Falcon supporting Kosovo Forces and the United Nations (UN) mission in Kosovo. It discusses the successful use of the...

  • RFID: HF versus UHF technologies, Part Two.  // Packaging Digest;Mar2005, Vol. 42 Issue 3, p36 

    Part II. Addresses the myths and confusion surrounding radio frequency identification system (RFID). Comparison between high-frequency and ultra-high-frequency technology for item-level pedigree pharmaceutical tracking; Environmental factors, global standards and requirements, privacy issues in...

  • Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Batina, Lejla; Lee, Yong; Seys, Stefaan; SingelĂ©e, Dave; Verbauwhede, Ingrid // Personal & Ubiquitous Computing;Mar2012, Vol. 16 Issue 3, p323 

    Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have been scanned simultaneously, various new schemes have been proposed. Their common property is the use of symmetric-key primitives. However, it has been shown that such...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics