Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

38C3 - Breaking NATO Radio Encryption

Автор: media.ccc.de

Загружено: 2025-01-21

Просмотров: 32493

Описание:

https://media.ccc.de/v/38c3-breaking-...

We present fatal security flaws in the HALFLOOP-24 encryption algorithm, which is used by the US military and NATO. HALFLOOP-24 was meant to safeguard the automatic link establishment protocol in high frequency radio, but our research demonstrates that merely two hours of intercepted radio traffic are sufficient to recover the secret key. In the talk, we start with the fundamentals of symmetric key cryptography before going into the details of high frequency radio, HALFLOOP-24, and the foundation of our attack.

High frequency (HF) radio, also known as shortwave radio, is commonly used by the military, other government agencies and industries that need highly robust long-distance communication without any external infrastructures. HF radio uses frequencies between 3 and 30 MHz. These frequencies enable skywave propagation, where the radio signals are reflected by electrically charged particles in the upper atmosphere. While this effect enables communication across very large distances, historically, it required trained and experienced operators to establish a radio link.

This dependence on operators was reduced by the introduction of the automatic link establishment (ALE) protocol. In a nutshell, an ALE-enabled radio establishes a link to another radio by selecting a suitable frequency according to a propagation model and then transmitting a call frame. If the frequency is good, the other radio receives the frame and the two radios perform a handshake to set up a link. The encryption of these ALE frames is known as linking protection. It is primarily meant to protect unauthorized users from establishing links with radios in a network or interfering with established links. Additionally, encryption of ALE frames also protects the network from certain types of traffic analysis, which is the analysis of operating data such as network structure, frequencies, callsigns and schedules. The first ALE standard did not specify a cipher, but specified how to integrate a stream cipher with ALE. Later standards introduced the 56-bit key Lattice/SoDark cipher, which is now recommended to be replaced with HALFLOOP whenever possible.

HALFLOOP, which is standardized in US standard [MIL-STD-188-14D](https://quicksearch.dla.mil/qsDocDeta...) since 2017, is essentially a downscaled version of the Advanced Encryption Standard (AES), which effectively is the most used encryption algorithm today. While this downscaling led to many strong components in HALFLOOP, a fatal flaw in the handling of the so-called tweak enables devastating attacks. In a nutshell, by applying a technique known as differential cryptanalysis, an attacker can skip large parts of the encryption process. In turn, this makes it possible to extract the used secret key and hence enables an attacker to break the confidentiality of the ALE handshake messages and also makes an efficient denial-of-service attack possible.

These attacks are described in the two research papers, [Breaking HALFLOOP-24](https://doi.org/10.46586/tosc.v2022.i...) and [Destroying HALFLOOP-24](https://doi.org/10.46586/tosc.v2023.i.... They were initiated by the presentation of the [Cryptanalysis of the SoDark Cipher](https://doi.org/10.46586/tosc.v2021.i..., the predecessor of HALFLOOP.

Lukas Stennes

https://events.ccc.de/congress/2024/h...

#38c3 #Security

Licensed to the public under http://creativecommons.org/licenses/b...

38C3 - Breaking NATO Radio Encryption

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Software Defined Radio

Software Defined Radio

39C3 - Hacking washing machines

39C3 - Hacking washing machines

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

Цепи Маркова — математика предсказаний [Veritasium]

Цепи Маркова — математика предсказаний [Veritasium]

Grabbing Military Satellite Data With Hacked TV Dish

Grabbing Military Satellite Data With Hacked TV Dish

Surveilling the Masses with Wi-Fi Positioning Systems

Surveilling the Masses with Wi-Fi Positioning Systems

The Physicist Who Puts Penrose’s Quantum Ideas To The Test | Ivette Fuentes

The Physicist Who Puts Penrose’s Quantum Ideas To The Test | Ivette Fuentes

Протокол TLS. Аутентификация | Компьютерные сети 2025 - 42

Протокол TLS. Аутентификация | Компьютерные сети 2025 - 42

Сергей Есенин: Настоящая история без школьных мифов / Личности / МИНАЕВ

Сергей Есенин: Настоящая история без школьных мифов / Личности / МИНАЕВ

Как Сделать Настольный ЭЛЕКТРОЭРОЗИОННЫЙ Станок?

Как Сделать Настольный ЭЛЕКТРОЭРОЗИОННЫЙ Станок?

DEF CON 18 - Jonathan Lee & Neil Pahl - Bypassing Smart-Card Authentication

DEF CON 18 - Jonathan Lee & Neil Pahl - Bypassing Smart-Card Authentication

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

39C3 - Verlorene Domains, offene Türen - Was alte Behördendomains verraten

39C3 - Verlorene Domains, offene Türen - Was alte Behördendomains verraten

Откуда в трубке телефона берётся гудок?

Откуда в трубке телефона берётся гудок?

Meshtastic LoRa против Gotenna Mesh — лучшая зашифрованная связь вне сети?

Meshtastic LoRa против Gotenna Mesh — лучшая зашифрованная связь вне сети?

38C3 - Hacking the RP2350

38C3 - Hacking the RP2350

Как я с нуля сделал ноутбук на базе C64 — Portable 64 (эмуляция)

Как я с нуля сделал ноутбук на базе C64 — Portable 64 (эмуляция)

Почему НЕЛЬЗЯ использовать бесплатный ВПН? Разбор специалистом по кибербезопасности

Почему НЕЛЬЗЯ использовать бесплатный ВПН? Разбор специалистом по кибербезопасности

39C3 - KIM 1.5: Noch mehr Kaos In der Medizinischen Telematikinfrastruktur (TI)

39C3 - KIM 1.5: Noch mehr Kaos In der Medizinischen Telematikinfrastruktur (TI)

This ESP32 Antenna Array Can See WiFi

This ESP32 Antenna Array Can See WiFi

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]