Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Encryption

Encryption Made For Police and Military Radios May Be Easily Cracked (wired.com) 64

An anonymous reader quotes a report from Wired: Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure -- as well as police, intelligence agencies, and military forces around the world -- that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for sensitive communication to deploy an end-to-end encryption solution on top of the flawed algorithm to bolster the security of their communications. But now the same researchers have found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It's not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them. Wired notes that the end-to-end encryption the researchers examined is most commonly used by law enforcement and national security teams. "But ETSI's endorsement of the algorithm two years ago to mitigate flaws found in its lower-level encryption algorithm suggests it may be used more widely now than at the time."

Encryption Made For Police and Military Radios May Be Easily Cracked

Comments Filter:
  • by allo ( 1728082 ) on Thursday August 07, 2025 @06:20PM (#65573924)

    56 Bit RSA.

  • by Indy1 ( 99447 ) on Thursday August 07, 2025 @06:55PM (#65574014)

    In the US, a lot of agencies are still using RC4 (known as Motorola advanced digital privacy, aka ADP ) for critical communications. And these agencies have zero clue how easy it would be to brute force the keys.

    • It's not about zero clue, it's about preventing inadvertent listening. There's very little operational need for perfect security for emergency services. Land mobile radio by design has very limited security in most cases just to stop someone setting up the wrong radio from accessing the wrong communications. It is like that with APCO-25 (P25) and it's like that with TETRA (which is what is used in Europe).

      • by Indy1 ( 99447 )

        Yet would you use RC4 for wifi or web security?

        Poor security is no security, and I'm shocked someone hasn't written a program that would tie into a cheap realtek SDR and eat ADP keys for breakfast.

        It would be like when DVD encryption got cracked. Once someone buys a case a beer and spends a weekend coding it, the horse is out of the barn for good.

         

        • Two completely different things. With radios you need to be within physical range of the radio with advanced signal-interception gear to capture and decrypt the conversation, which will then give you some tactical comms that could well be out of date by the time you've recovered it.

          With Internet-based stuff any attacker anywhere in the world with access to on-path capabilities can capture and decrypt at their leisure, and it's typically data that isn't short-term tactical comms that's stale after five min

        • Yet would you use RC4 for wifi or web security?

          Poor security is no security, and I'm shocked someone hasn't written a program that would tie into a cheap realtek SDR and eat ADP keys for breakfast.

          Firstly such programs exist. Secondly you're spot on, poor security is no security. But you missed my point. The use case here isn't security. Would I use RC4 for Wifi? No, that would give someone access to my home network which has sensitive data. Would I use RC4 for web security? Yeah for most things I do absolutely. Take this post for example: I don't give a shit who reads it. Heck I don't give a shit if my Slashdot account is compromised. I give so little shits that I happily used Slashdot without any e

  • by taustin ( 171655 ) on Thursday August 07, 2025 @07:43PM (#65574096) Homepage Journal

    Back doors into encrypted communications? Is there a government in the world that hasn't demanded exactly this?

  • It should be a felony to insert backdoors in standards. It should not be free of consequences to threaten millions of peoples privacy.
  • Spooks backdoor encryption devices - who knew :o
  • Backdoor? (Score:4, Interesting)

    by ceoyoyo ( 59147 ) on Thursday August 07, 2025 @08:30PM (#65574168)

    That doesn't really sound like a backdoor.

    The original article says the standard cut it down to meet export control requirements. The algorithm in question is one of four choices, and the standard makes pretty clear that it's the one for shady foreigners:

    The Cipher Key has an input length of 80 bits;
    the Initialization Vector has a length of 29 bits. The effective Cipher Key length of TEA4 is reduced within the
    algorithm to 56 bits to permit worldwide exportability without restriction, at time of definition.

    • It gets worse, TEA1 truncates the key to 32 bits.

      All these standards were developed in the 90's, back when they thought SSL 2.0 was fine, but turned out to the full of flaws. SSL 3.0 was also flawed.
      40 bit RC4 and DES? You got the shitty algorithms in your web servers and browsers if you didn't work around the export restrictions of the time.

      • Re:Backdoor? (Score:4, Informative)

        by thegarbz ( 1787294 ) on Friday August 08, 2025 @12:01AM (#65574420)

        TEA1 isn't meant for any sensitive applications, it was truncated on purpose. Its the base encryption designed to not inadvertently have devices misregister on the wrong networks. No one gives a shit about you calling your logistics man over the radio from the security hut that a truck is coming his way ready to unload. That's the kind of thing TEA1 encryption was meant for - all applications which were previously not encrypted at all.

      • by ceoyoyo ( 59147 )

        The US didn't put a bunch of football field sized satellites into space and build hidden rooms in everyone's network switching buildings so they could record stuff that's indistinguishable from static. TETRA is from 1995, when people were "smuggling munitions" by wearing t-shirts with the RSA algorithm printed on them.

  • by kackle ( 910159 ) on Friday August 08, 2025 @08:50AM (#65574896)
    My first technical job was at a radio shop, for several years. I would have a real conversation with law enforcement before assuming encryption is a good idea. It costs...

    The radios are more expensive. The power requirements are more, meaning more gasoline and pollution or a lifetime. Their repair is more money and more difficult to do, meaning they get junked sooner--happy earth day. They would likely be more sensitive/fragile to noise during reception, making conversation loss more of an issue (I saw that at that job), the last thing you'd want. Also, there would be a transmission delay similar to today's digital cellular phones (albeit, that's probably trivial).
    • I currently work in a radio shop. Modern 2-way radios are software defined radios (SDR's), not the old crystal oscillator technology. Encryption is just another feature you can buy and install in the radio. Encrypted and un-encrypted radios are the same hardware now, so they are no harder to repair and they operate exactly the same. There is no delay when using encryption.

      This would be like making an assessment of today's computing technology by using experiences from the 1990's.

      Yes, there are old and insec

Error in operator: add beer

Working...