Decoding DMR & P25 With TETRA With RTLSDR Dongle
As we are looking at getting our entry level HAM radio license we are still a big SWL fan. One thing we pride ourselves on is being able to listen – track – decode a number of activities. We know once we get licensed the mode that interest us the most is Digital over the radio. So DMR is on the list for sure along with WinLink, for now let’s focus on how to Decode DMR with the use of FREE software and a TRLSDR Dongle v3
Mat has put together some really good information and nice video. You should be using SDR Sharp Ok here is the info from M0DQW Below:
Here I go through setting up SDR # (Sharp) application from Airspy, to decode DMR Digital audio using DSD Plus command line application.
Using a specially made plugin, available free of charge, you can now control DSD Plus directly from SDR #. This tutorial already assumes that you have SDR # installed and working with your existing RTL SDR device.
You will also need to know any local frequencies to you that broadcast DMR or Digital audio, such as local Ham Radio repeaters.
Here’s what you are going to need:
RTLSDR Dongle: Buy from here to make sure you get the real thing https://www.rtl-sdr.com/buy-rtl-sdr-dvb-t-dongles/
Virtual Audio Cable https://www.vb-audio.com/Cable
DSD Plus (Latest Version) https://www.dsdplus.com/download-2 SDR # DSD Plus plugin http://www.rtl-sdr.ru/page/novyj-plag
DSD Information https://www.rtl-sdr.com/new-version-of-digital-speech-decoder-dsd-1-071-released/
ENCRYPTION ON THE TETRA PROTOCOL HAS BEEN BROKEN
TETRA (Terrestrial Trunked Radio) is a digital voice and text radio communications protocol often used by authorities and industry in European and many countries other than the USA. A major advantage to a digital communications protocol like TETRA is it’s ability to be secured via encryption.
Recently the security researchers at Midnight Blue in the Netherlands have discovered a collection of five vulnerabilities collectively called “TETRA:BURST” and most of the five vulnerabilities apply to almost every TETRA network in the world. These two most critical vulnerabilities allow TETRA to be easily decrypted or attacked by consumer hardware.
The first critical vulnerability is designated CVE-2022-24401 is described as decryption oracle attack.
The Air Interface Encryption (AIE) keystream generator relies on the network time, which is publicly broadcast in an unauthenticated manner. This allows for decryption oracle attacks.
The second vulnerability CVE-2022-24402 notes that a backdoor has been built into TEA1 encrypted TETRA, which allows for a very easy brute force decryption.
The TEA1 algorithm has a backdoor that reduces the original 80-bit key to a key size which is trivially brute-forceable on consumer hardware in minutes.
FULL ARTICLE CLICK HERE
- Website Visit Website
We write rarely, but only the best content.
Please check your email for a confirmation email.
Only once you've confirmed your email will you be subscribed to our newsletter.