[TrunkCom] Re: Tetrapol in the US
Wayne M H
[email protected]
Wed, 16 Oct 2002 06:16:28 -0700
On Wed, 16 Oct 2002 12:00:00 +0100, Ian Wraith
<[email protected]> wrote:
> OK with normal encrypted radio systems over here (Tetra & GSM) each =
radio
>or phone has its own key. When a conversation is set up with another
>radio the encrypted digital conversation is only between the radio and
>the base station. The base station knows the radios encryption key
>and decrypts the voice. This decrypted voice is then routed around the
>network to the base station serving the 2nd radio or phone. This base
>station knows that radios encryption key and re-encrypts the voice =
before
>transmitting it. This has advantages in that key management is very
Base station or central controller? You would think if the base
station itself decrypted it someone could tap into the T/E-1 or MW
path to the central controlling point (Whatever Tetra calls it) and
pull out the audio.
-Wayne