The following article is from Miro, OM3CKU: Loosely based on CRYPTO AG and Racal company materials.
High-frequency electromagnetic waves (HF) occupy 1.5-30 MHz of the frequency spectrum. After the discovery of radiotelegraphy at the end of the 19th century, they dominated wireless communication for decades. But what is the value of KV in the Internet age? Today's technical solution indicates: KV is capable of development and compatible with the Internet.
At the time of the boom in information technology, it seemed almost as if KV was a gradually outdated technique compared to VHF, microwave and satellite connections, optical networks and interconnection of networks seemed to be a suitable technology for almost all services. Although, these seemingly quite fast, new communication technologies also created new possibilities, they certainly cannot offer the best price solution for all applicable variants. After all, it is important to have other alternatives available for the operational connection of self-government during an emergency. And this is exactly where KV demonstrates its strengths. But it is not quite easy to "put everything back", KV also has the advantages of digital processing and can take over some important functions in building communication systems of all sizes.

You will read in the article
KV: Qualities that never get old
Every means of communication has physical limitations and shortcomings should be respected, but also used. Respecting them, KV offers very well-known parameters: KV can create a separate and secure wireless connection at any distance, including an international connection. KV is a kind of "free resource" for aviation, including crisis situations or disasters.
The physical dependence on factors such as season and time of day and the amount of solar activity is now easily handled with frequency selection that can be automated. Other steps, operational quality requirements have long-term trials behind them. A big advantage: KV can be used by both stationary and mobile stations.
In technical terms: KV has really benefited greatly from the development of integrated circuits. The signaling process is now largely digital and correspondence reliable. And what's more, an extremely extensive set of knowledge and experience gives many options for the used variants. Therefore, we can assume that KV applications will play an important role in the future.
Large range of location
A wide range of possibilities for using KV exists not only for voice communication, but also for data communication in "stable" and "mobile" modes, including "portable" examples of use:
- Stable use:
Diplomatic radio networks, independent of foreign operating centers, means of long-distance communications as well as backup for government and military use, communications with ocean-going ships (civilian and military), emergency networks.
- Mobile/portable applications:
Mobile diplomats (governments, organizations), mobile networks for police and security services, large networks for border guards (ships, aircraft and vehicles connect to each other and to operational centers at virtually any distance), systems for mobile and portable equipment in all types of troops.

Renaissance thanks to the integration system
Here are other reasons for the KV renaissance. It is true that in many cases the opinion still prevails that KV is mainly suitable for voice transmissions. In fact, it has a long tradition of use for data communications. Modern wireless systems use modems or automatic switches for optimal speed/bandwidth selection. Channel selection and other parameter settings can also be partially automated, operator input is now usually very little.
Integration into extensive communication and data networks (with Internet connection) can also be implemented. If the subscriber uses the information system, he can communicate via radio link, in mobile or stable mode, with the Internet or WAN/LAN subscribers and use the entire chain of services.
This is how we perceive existing KV systems, but with the aim of increasing their reach and also integrating them into mass networks. The principle: "if nothing else, KV still works", always has a justification and will be used in the future as well.
High security!
Intenzita KV technológií a ich bezpečnosť bola rozpoznaná veľmi skoro (pred druhou svetovou vojnou) a praktické riešenia boli rozvinuté až počas nej. Číslicová Technique umožňuje držať krok s technologickým pokrokom.
With the transition to VHF/UHF bands, the security aspect was neglected for a long time, especially with regard to the Internet. The assumption that such connections are less susceptible to attack has turned out to be a fundamental mistake.
KV doesn't need to get all the way here. It is a rule that KV users traditionally have a very high level of security awareness, which is not yet common in other technologies! We feel this is a very positive point of view when it is necessary to compile safety measures for the entire systems that make up the operating stage.
High security relies on cryptology
Highly secure KV transmission is carried out by encrypting the signals entering the radio systems. Voice transmission is possible in analog or digital mode. Digital data transfer in synchronous or asynchronous mode is at a speed dependent on the bandwidth. The robust Pactor II mode (more robust than the new Pactor III) is continuously used. Addendum STANAG 5066 and NATO data links, they also count on it.
Finally, security can be implemented by encrypting the signal by the user using PCs or laptops and used immediately (or via a data server) as the radio signal arrives. This even works with hand-held combat-ready laptops. In voice transmission, the encryption unit is connected between the microphone and the transmitter. For large systems with multiple levels, multi-channel encryption and radio units, a simplex, half-duplex or duplex device can be built-in. KV allows to ensure a wide system of transmission, processing and storage of information and thus a very reliable link in the information and data chain. Indeed, only secret, special customer algorithms and security systems can use hardware and software at the same time in order to ensure high security applied to all KV systems. Thanks to this philosophy, compressed keying is risk-free. For example: Access to the device protected by a password depending on the use, security models are also mechanically protected and automatically destroy all stored data in the event of an attack on the device. If the direction is to be secured during transmission, then this can be handled safely with hopping or spread spectrum. These methods are mainly used in military and naval applications.
The strategic point of leadership can be largely automated, requiring no other actions besides manually pressing the distribution button (drawn from the card or via the keyboard). The use of Security Network Management (SNMC) and the distribution button over the network (encrypted) is a common standard of technology today. Compatibility issues with currently available KV systems do not usually cause problems if they are equipped with suitable interfaces with the necessary parameters.
