Breaking NATO Radio Encryption [video]
HALFLOOP-24 encryption, used by NATO and the US military, has vulnerabilities allowing key recovery in two hours, compromising communication security and highlighting the need for improved encryption standards.
Read original articleA recent presentation at the 38th Chaos Communication Congress (38c3) highlighted significant vulnerabilities in the HALFLOOP-24 encryption algorithm, which is utilized by NATO and the US military for high-frequency radio communications. The research indicates that an attacker can recover the secret key with just two hours of intercepted radio traffic, undermining the security of the automatic link establishment (ALE) protocol. HALFLOOP-24, standardized in 2017, was designed to enhance the security of ALE frames, which protect against unauthorized access and traffic analysis. However, flaws in the algorithm's handling of tweaks allow for differential cryptanalysis, enabling attackers to bypass substantial portions of the encryption process. This vulnerability not only compromises the confidentiality of ALE handshake messages but also facilitates denial-of-service attacks. The findings are detailed in two research papers titled "Breaking HALFLOOP-24" and "Destroying HALFLOOP-24," which build upon earlier work on the SoDark cipher, the predecessor to HALFLOOP. The implications of these vulnerabilities raise concerns about the security of military communications and the need for more robust encryption standards.
- HALFLOOP-24 encryption used by NATO and the US military has critical vulnerabilities.
- An attacker can recover the secret key with only two hours of intercepted traffic.
- The algorithm's flaws allow for differential cryptanalysis, compromising communication security.
- The findings are documented in two research papers that build on previous work on the SoDark cipher.
- The vulnerabilities highlight the need for improved encryption standards in military communications.
Related
Did a broken random number generator in Cuba help expose an espionage network?
A cryptologic mystery involving a broken random number generator in Cuba exposes a Russian espionage network. Anomalies in encrypted shortwave radio transmissions lead to the arrest of Russian spies, highlighting vulnerabilities in one-time pad ciphers.
Chinese scientists use quantum computers to crack military-grade encryption
Chinese researchers have advanced quantum computing by attacking military-grade encryption algorithms RSA and AES, posing a threat to current standards. NIST is developing post-quantum cryptographic solutions in response.
Chinese Break RSA
Chinese researchers demonstrated a quantum attack on RSA and AES encryption using a D-Wave quantum computer, threatening military-grade encryption and prompting NIST to develop post-quantum cryptographic algorithms.
Chinese scientists use quantum computers to crack military-grade encryption
Chinese researchers demonstrated a quantum attack on RSA and AES encryption using a D-Wave quantum computer, raising concerns about military-grade encryption security and prompting the need for post-quantum cryptographic solutions.
Chinese scientists use quantum computers to crack military-grade encryption
Chinese researchers demonstrated a quantum attack on RSA and AES algorithms using a D-Wave quantum computer, raising concerns about military-grade encryption security and prompting NIST to develop post-quantum cryptographic standards.
I am not a cryptography or digital radio expert, so grain of salt and all that.
Slide 14 shows real world feasibility, I think it's safe to say that while theoretically possible it's unlikely that this creates a significant real world issue. One bit of info I don't know - how long is a set of exchanged keys used for in most situations?
https://tosc.iacr.org/index.php/ToSC/article/view/9856/11598
Related
Did a broken random number generator in Cuba help expose an espionage network?
A cryptologic mystery involving a broken random number generator in Cuba exposes a Russian espionage network. Anomalies in encrypted shortwave radio transmissions lead to the arrest of Russian spies, highlighting vulnerabilities in one-time pad ciphers.
Chinese scientists use quantum computers to crack military-grade encryption
Chinese researchers have advanced quantum computing by attacking military-grade encryption algorithms RSA and AES, posing a threat to current standards. NIST is developing post-quantum cryptographic solutions in response.
Chinese Break RSA
Chinese researchers demonstrated a quantum attack on RSA and AES encryption using a D-Wave quantum computer, threatening military-grade encryption and prompting NIST to develop post-quantum cryptographic algorithms.
Chinese scientists use quantum computers to crack military-grade encryption
Chinese researchers demonstrated a quantum attack on RSA and AES encryption using a D-Wave quantum computer, raising concerns about military-grade encryption security and prompting the need for post-quantum cryptographic solutions.
Chinese scientists use quantum computers to crack military-grade encryption
Chinese researchers demonstrated a quantum attack on RSA and AES algorithms using a D-Wave quantum computer, raising concerns about military-grade encryption security and prompting NIST to develop post-quantum cryptographic standards.