Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

How is sigint used?

SIGINT is intelligence derived from electronic signals and


systems used by foreign targets, such as communications systems,
radars, and weapons systems. SIGINT provides a vital window for our
nation into foreign adversaries' capabilities, actions, and intentions.

https://www.di-mgt.com.au/cryptokeys.html

What is a key?
A definition of a key from ISO/IEC 10116 (2nd edition): 1997 is
A sequence of symbols that controls the operation of a cryptographic
transformation (e.g. encipherment, decipherment).
In practice a key is normally a string of bits used by a cryptographic
algorithm to transform plain text into cipher text or vice versa. The key
should be the only part of the algorithm that it is necessary to keep
secret.
Key length
The key length is usually expressed in bits, 8 bits to one byte. Bytes are
a more convenient form for storing and representing keys because
most computer systems use a byte as the smallest unit of storage (the
strict term for an 8-bit byte is octet). Just remember that most
encryption algorithms work with bit strings. It's up to the user to pass
them in the required format to the encryption function they are using.
That format is generally as an array of bytes, but could be in
hexadecimal or base64 format

How relevant is key length?


To crack some ciphertext encrypted with a 64-bit key by the brute-force
method of trying every combination of keys possible means you have
2^64 possible combinations or 1.8 x 10^19 (that's 18 followed by 18
naughts). You can expect, on the average, to find a correct answer in
half this number of tries. If you have a computer that can carry out one
encryption operation every millisecond, it will take about 292 million
years to find the correct value. Speed up your computer by a million
times and it will still take about 3 centuries to solve
People often get confused between "password" and "key". A password
is typically a series of ASCII characters typed at a keyboard, e.g.
"hello123" or "my secret pass phrase". This makes it easier for users to
remember. They are, of course, much easier to crack because there are
significantly fewer combinations to choose from.
A key used by an encryption algorithm is a bit string. A 128-bit key will
have exactly 128 bits in it, i.e. 16 bytes. You will often see keys written
in hexadecimal format where each character represents 4 bits, e.g.
"FEDCBA98765432100123456789ABCDEF" represents 16 bytes or 128
bits. The actual bits in this example are

1111 1110 1101 1100 1011 1010 1001 1000


0111 0110 0101 0100 0011 0010 0001 0000
0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

Base Station System or BSS consists of:


Base Transceiver Station (BTS) is a GSM device that is directly related to
MS and serves as the sender and receiver.
Base Station Controller (BSC) is a controller device for base stations
located between the BTS and MSC.
https://resources.infosecinstitute.com/topic/introduction-to-gsm-
security/ best at gsm architecture
Abis-Interface
The Abis-interface1 is the interface between the BTS and the BSC. It is a
pulse
code modulation (PCM) 30 interface. The transmission rate is 2 Mbps
which is
partitioned into 32 channels of 64 Kbps each. The compression
techniques that
GSM utilises packs up 8 GSM traffic channels into a single 64 Kbps
channel.
From full text pdf
What's base64 encoding?
"Encoding" simply means converting data from one form to another,
not necessarily encrypted. Just remember that Encoding is not
encryption.
base64 encoding is a method to convert 8-bit characters to 7-bit
characters so they can be transferred over the internet. MIME uses
this; so does PGP. It's also known as radix 64 encoding. Binary data
encoded with base64 encoding looks like

You might also like