Changing the radio encryption
The following section describes how to change the encryption of the Silvus radio network.
Last updated
The following section describes how to change the encryption of the Silvus radio network.
Last updated
This guide will help you configure the Silvus radios' encryption in the DeltaQuad Evo Government (GOV) Edition according to your needs. These steps ensure secure communication and protect your data from unauthorized access and cyber threats.
The Silvus radio in the DeltaQuad Evo GOV is set up with encryption by default. DeltaQuad uses randomized encryption keys that are not written down anywhere. It is the operator's responsibility to change the radio encryption to meet the specific requirements of the operation.
Encryption is essential for securing the data transmitted between drones and ground stations. It ensures that sensitive information, such as video feeds and control commands, is protected from unauthorized access. By using encryption, you can prevent cyber threats, eavesdropping, and tampering, thereby maintaining the integrity and confidentiality of your communications.
Silvus radios support several encryption protocols, which vary in the level of security they provide:
AES 56-bit
AES 128-bit
AES 256-bit
These protocols use Advanced Encryption Standard (AES), with higher bit numbers offering stronger security. AES 256, for instance, is highly recommended for the highest level of security.
Access the Configuration Interface:
Connect to the Silvus radio through a web browser using the radio's IP address. A connection guide can be found here.
Navigate to the Security Settings:
Locate the security settings tab and click on encryption.
Select the Encryption Protocol:
Choose the desired AES encryption level (56, 128, or 256-bit) from the dropdown menu or selection box.
Generate a Wrapping and HMAC key and input Encryption key:
Click on the respective fields to generate a Wrapping and HMAC key. The system does not store these keys for security reasons. They are randomly generated based on the chosen encryption method.
Click on the field to input the Encryption key. Enter your encryption key, ensuring it meets the protocol requirements for length and complexity. The system does not store this key for security reasons.
Save and Apply Settings:
After configuring the encryption settings, ensure that you save and apply these settings not only on the device you are currently configuring but also across the entire network. This means applying and saving the settings for all radios, both ground and air units, to ensure uniform encryption across all communication links.
Testing and Verification:
Perform a communication test to ensure that the encryption is working correctly. Verify that data transmission is secure and that there are no connectivity issues.
Additional Considerations
Random Key Generation: The system can generate random keys based on the encryption method, enhancing security by preventing predictable patterns.
Non-Storage of Keys: For cybersecurity, encryption keys are not stored. This practice mitigates the risk of unauthorized access to the keys.
Regularly update and manage encryption settings to adapt to evolving security needs and maintain robust protection against cyber threats.