Encryption made for police and military radios may be easily cracked

Date:

Share:



Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping.

When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for sensitive communication to deploy an end-to-end encryption solution on top of the flawed algorithm to bolster the security of their communications.

But now the same researchers have found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It’s not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them.

The end-to-end encryption the researchers examined, which is expensive to deploy, is most commonly used in radios for law enforcement agencies, special forces, and covert military and intelligence teams that are involved in national security work and therefore need an extra layer of security. But ETSI’s endorsement of the algorithm two years ago to mitigate flaws found in its lower-level encryption algorithm suggests it may be used more widely now than at the time.

In 2023, Carlo Meijer, Wouter Bokslag, and Jos Wetzels of security firm Midnight Blue, based in the Netherlands, discovered vulnerabilities in encryption algorithms that are part of a European radio standard created by ETSI called TETRA (Terrestrial Trunked Radio), which has been baked into radio systems made by Motorola, Damm, Sepura, and others since the ’90s. The flaws remained unknown publicly until their disclosure, because ETSI refused for decades to let anyone examine the proprietary algorithms. The end-to-end encryption the researchers examined recently is designed to run on top of TETRA encryption algorithms.



Source link

━ more like this

Watch NASA’s SpaceX Crew-10 astronauts return to Earth

The astronauts part of SpaceX's Crew-10 mission are on their way back home. Their Dragon capsule called Endurance is scheduled to splash down...

Ukrainian special forces strike deep inside Russia blowing up a drone storage site – London Business News | Londonlovesbusiness.com

Ukrainian special forces have attacked a “logistics hub” storing Shahed drones deep behind enemy lines on Saturday. The SBU Special Operations Center “A” attacked...

Ville Helenius: Better programme delivery with ProMeSe – London Business News | Londonlovesbusiness.com

Ville Helenius has redefined the game in major programme delivery. His Oxford research entitled Programme Management Methods and Programme Performance: The Role of the Cost of...

Russia issues a NOTAM as Putin is set to launch ‘doomsday’ nuclear missile – London Business News | Londonlovesbusiness.com

Russian authorities have issued a Notice to Airman (NOTAM) as Vladimir Putin is set to test fire the “unstoppable doomsday” nuclear missile dubbed...

A magical farming sim, cat museum exploration and other new indie games worth checking out

Welcome to our latest recap of what's going on in the indie game space. This week, Nintendo held its latest Indie World showcase...
spot_img