|
|
|
|
← T-3014 Motorola SABER FILL Voice KVL-3000 →
The device is housed in the plastic enclosure, similar to that of an old model
Motorola MX handheld radio.
The standard batteries of that radio can be used.
An optional cable is used to connect the T-3020 to the desired radio.
The image on the right shows a typical T-3020/AX with a coiled cable for
connection to Motorola radios with an MX-compatible
socket. Other cables were available for connection to other radios,
such as the Motorola Saber.
The device is powered by a standard MX battery
that should be installed at the bottom of the case.
|
|
|
Note that this key loader is suitable only for transferring
keys for the US Data Encryption Standard (DES)
and not for Motorola's
improved DES-XL. For the latter, the T-3011
or the KVL-3000 should be used instead.
It should also be noted that there is a variant with a reduced keyboard
on which the letters A-F are missing. This version was probably promoted
for export use. The keys created with that variant are only 42-bits long 1
(rather than usual 56 bits) and will be easier to break.
|
-
The keys generated with this variant are still 56 bits long,
but 14 bits are fixed (always 0), which means that only 42 bits
are significant.
|
There were different versions of the T-3020, both internally and externally.
There were versions with different software and versions for
export only. Generally speaking the software version is identified by a
two-letter suffix to the model number. The higher the number (or actually the
letter), the more features and radios are supported.
The following versions are known:
|
- Full keypad
This version is suitable for loading DES keys into a number of motorola
(handheld) radios, such as the Motorola Saber.
It is suitable for entering keys which contain the numbers 0-9 and the letters A-F.
For the DES algorithm,
the keys were always 56 bits long.
- Reduced keypad
This is the same version as the one above, but with a different keypad,
which only has the numbers 0-9 on it. This means that it has only half the
number of possibilities for each digit when entering the key. As a result,
the keys generated with this variant are limited to 42 bits rather than
the usual 56. This version was promoted for export only.
|
At the time DES was introduced as an approved encryption standard,
it was assumed to be secure against cryptanalytic attacks. The algorithm was
developed at IBM in the mid-1970s. In 1976 — after consultation with the US
National Security Agency (NSA) — the algorithm was
strengthened against differential cryptanalysis, but weakened against
brute force attacks, by reducing the number of key bits from 64 to 56. 1
This was probably done to give the NSA an advantage.
It is likely that 56-bit keys could be broken by the NSA, but it is also likely
that this required a lot of processing power, of which only limited resources were
available (even at the NSA). By further reducing the number of key bits on export
devices to 42 (dropping another 14 bits), breaking the key becomes 16,384 times
faster (214). Just as an example: if it takes 24 hours to break a 56-bit
key, it takes just 5 seconds to break an 42-bit one.
|
|
-
The NSA initially wanted the number of key bits to be reduced from 64 to 48 bits,
but eventually 56 bits was negotiated as a compromise.
|
Although the function of a key loader is rather limited — it can only be
used for entering, storing and transferring cryptographic keys —
the T-3020 is actually a very complex device that houses more components
than one would be inclined to think, not least because of the fact that
the keys are stored in the internal memory in encrypted form, using an
internal DES encryption module.
|
Getting access to the interior and requires only four screws to be released
at the rear side, after which the rear panel can be removed. Inside the device
are two stacked circuit board (PCBs).
One of these PCBs is mounted to the front panel. It holds the power circuits,
the interface to the radio, and EPROM and a typical white Motorola TRN4836A
hybrid DES encryption module, which is installed in a socket at the edge of
the PCB.
The other PCB holds some proprietary Motorola parts, such as the processor,
a ROM, I/O circuitry and CMOS RAM. It also holds a 3.84 MHz crystal.
|
|
|
The two PCBs are interconnected by means of several single-in-line PCB
headers, mounted along the edges of the PCBs. The DES encryption module is
mounted in such a way that it can easily be removed and replaced for another one,
if necessary.
Judging from the date codes on the various components, the device shown here
was manfuctured in 1984 (the oldest parts are from 1981).
|
|
|
Any links shown in red are currently unavailable.
If you like the information on this website, why not make a donation?
© Crypto Museum. Created: Tuesday 30 May 2017. Last changed: Thursday, 19 July 2018 - 15:41 CET.
|
|
|
|
|