DMR Encryption Application Notes R1.2
DMR Encryption Application Notes R1.2
DMR Encryption Application Notes R1.2
Copyright Information
Hytera is the trademark or registered trademark of Hytera Communications Co., Ltd. (the
Company) in PRC and/or other countries or areas. The Company retains the ownership of
its trademarks and product names. All other trademarks and/or product names that may
be used in this document are properties of their respective owners.
The product described in this document may include the Companys computer programs
stored in memory or other media. Laws in PRC and/or other countries or areas protect the
exclusive rights of the Company with respect to its computer programs. The purchase of
this product shall not be deemed to grant, either directly or by implication, any rights to the
purchaser regarding the Companys computer programs. Any of the Companys computer
programs may not be copied, modified, distributed, decompiled, or reverse-engineered in
any manner without the prior written consent of the Company.
Disclaimer
The Company endeavors to achieve the accuracy and completeness of this document,
but no warranty of accuracy or reliability is given. All the specifications and designs are
subject to change without notice due to continuous technology development. No part of
this document may be copied, modified, translated, or distributed in any manner without
the express written permission of us.
If you have any suggestions or would like to learn more details, please visit our website at:
http://www.hytera.com.
Revision History
Version
Date
Description
R1.0
01-28-2011
Initial release
R1.1
05-25-2011
R1.2
10-29-2012
Remarks
Contents
1. Overview ....................................................................................................................... 3
1.1 Definition .............................................................................................................. 3
1.2 Principle ............................................................................................................... 3
1.2.1 Basic Encrypt............................................................................................. 3
1.2.2 Full Encrypt................................................................................................ 4
1.3 Version ................................................................................................................. 6
1.4 Scope................................................................................................................... 7
2. Encryption and Communication .................................................................................... 8
2.1 Application of Encryption...................................................................................... 8
2.2 Transfer of Encrypted Data .................................................................................. 9
3 Equipment Requirements .......................................................................................... 10
4. Configuration Guide .....................................................................................................11
4.1 Terminal Configuration ........................................................................................11
4.1.1 Software Configuration .............................................................................11
4.1.2 Terminal Menu Configuration ................................................................... 14
4.2 Repeater Configuration ...................................................................................... 15
4.2.1 Configuring the Customer Programming Software (CPS)........................ 15
4.2.2 Repeater Interface Configuration............................................................. 18
4.3 MultiKey Decrypt................................................................................................ 18
4.3 Hardware Configuration ..................................................................................... 20
5. Instruction of Application ............................................................................................. 21
6. FAQ............................................................................................................................. 22
1. Overview
1.1 Definition
This function provides end-to-end encryption for communication services (including voice
and data) on digital channels, allowing the target terminal to receive the voice and data
privately.
1.2 Principle
Hytera provides two encryption mechanisms: Basic Encrypt and Full Encrypt, which
employ a key accessible to the involved call parties only. Advanced encryption provides
two types of technologies: Hytera encryption and DMRA encryption. Hytera encryption is
named for Hyteras own encryption algorithm innovation, and DMRA encryption is DMR
standard encryption which applies the technology/encryption specified by DMR
association. In addition, basic encryption adopts the encryption technology innovated by
Hytera.
1.3 Version
1) DMR conventional series software R2.0: Basic Encrypt available;
2) DMR conventional series software R2.5: Basic Encrypt available;
3) DMR conventional series software R3.0: Basic Encrypt and Full Encrypt available (you
can view key list and create new key in the menu).
4) DMR conventional series software R4.5: Add multi-key decrypt and repeater
encryption.
5) DMR conventional series R5.0: DMRA encryption added, complying with DMR
standard protocol.
1.4 Scope
These two mechanisms encrypt voice and data only, rather than other information
involved in supplementary services (Radio enable/Radio disable, Remote monitor, Radio
check and Alert call, etc).
In advanced encryption, radios encrypted by Hytera encryption and those by DMRA
encryption cannot communicate with each other.
You cannot check the encryption key from the radios or repeaters directly. Also, when you
check it through the CPS from the PC, you will only see 000 rather than the actual key.
The key acquired by reading the data cannot be written into the radios or repeater until it is
reset and edited.
2) RM (Repeater Mode)
When transferring the radios data via air, the repeater can monitor the data even though it
is encrypted. Moreover, the repeater can transmit encrypted voice signals.
You can play the received encrypted voice through the front panel and transmit the
encrypted voice via the PTT on this panel.
Equipment Requirements
10
4. Configuration Guide
4.1 Terminal Configuration
The encryption function can be enabled/disabled through the CPS (Customer
Programming Software), menu or programmed key, but the encryption type can only be
set via the CPS. If the terminal does not support such menu or programmed key, the
encryption function on the current channel cannot be changed.
And it can not be programmed via the remote control or air interface.
12
14
Encryption: To enable the Encrypt feature, the Encrypt option must be checked.
Encrypt Key Length: In this box, 10 characters indicate 40 bits, 32 characters equal to 128
15
The key defined for a radio via the CPS is unreadable, unchangeable and undeletable to
users. Once the key is programmed into a radio, it cannot be read via the CPS, but can be
overwritten by a new key. The Encrypt feature supports only the processing on the key via
the CPS rather than remote or Via Air.
Corresponding encryption key: to set the corresponding key for the channel.
Enter Channel -> Digital Channel -> Encrypt, as shown in Figure 4.2.1-2.
1) Encrypt: to decide whether the transmitted voice/data by the current channel is to be
encrypted. This option is applicable to the transmitting party only.
2) Encrypt Type: to select the encrypt type (Basic/Advanced).
3) Encrypt Key: to select an encryption key for the transmitting slot of the current channel.
16
17
18
19
20
5. Instruction of Application
As a tool for commanding and dispatching, the conventional wireless communication
system plays an important role widely. However, its security and reliability encounter a
great challenge due to poor privacy. Therefore, all kinds of important voice or data must
be transferred securely. In response to the security issue, Hytera develops a unique digital
encryption function, which can secure the privacy of voice and data in two levels: Basic
Encrypt and Full Encrypt.
By applying ARC4 and AES, Full Encrypt is an ideal solution for communication security in
many areas such as government, public security, energy and transportation.
21
6. FAQ
6.1 Can both encryption mechanisms apply to one terminal?
Yes, but each channel supports one mechanism only.
6.6 Will the encryption settings work for both parties operating on
the same channel?
Yes, but the Encrypt option applies to the transmitting party only, that is, if this option is
checked, the data to be transferred will be encrypted; otherwise, the data will not be
encrypted. See figure 4.1.1-2.
22
6.7 Can A Radio with Hytera Encryption and That with DMRA
Encryption Communicate with Each Other?
No, they cannot communicate with each other, because of the different ways in the key
generation and embedding, as well as processing the encryption parameters between
Hytera encryption and DMRA encryption. Advanced encryption provides two types of
protocols: Hytera encryption and DMRA encryption. Hytera encryption adopts the
encryption algorithm innovated by itself, and DMRA encryption is DMR standard
encryption.
23