Page 1 of 1

New P25 Security Vulnerability Article

Posted: Sun Sep 11, 2011 8:49 am
by escomm
http://tech.slashdot.org/story/11/09/10 ... Encryption

At least one of the authors is a member here

Re: New P25 Security Vulnerability Article

Posted: Sun Sep 11, 2011 8:55 pm
by MattSR
Interesting!

ADP and DES-OFB Key recovery via brute force..!

Re: New P25 Security Vulnerability Article

Posted: Mon Sep 12, 2011 8:58 am
by d119
Before anyone gets any bright ideas, please remember that tampering with encryption and trying to break it is a felony on a federal level.

Of course that is not the case when you are in a lab environment testing proof of concept, as was the situation with this article.

While it's not exactly step-by-step, this article does highlight a lot of the "how-to" and I certainly hope that one would be smarter than to attempt this.

I know MOST folks here have their heads screwed on properly, but history has shown us there are always one or two who think they are "exempt".

I'm not pointing any fingers or telling anyone what or what not to do, I just want to remind everyone that doing this sort of thing is not a good idea.

Re: New P25 Security Vulnerability Article

Posted: Mon Sep 12, 2011 9:39 am
by Batwings21
Come on you just know we are counting the days til someone with more brains than common sense cracks a local Pd's encryption and posts a feed on RR...

Re: New P25 Security Vulnerability Article

Posted: Mon Sep 12, 2011 1:23 pm
by mr.syntrx
Or wants the PD to keep using the old key, so they keep replaying old OTAR frames with that key to make sure the PD does so 8)

Re: New P25 Security Vulnerability Article

Posted: Mon Sep 12, 2011 3:23 pm
by MattSR
It seems that in reality, no one really cares about people listening to encrypted comms. I mean, look how many times GSM A5/1 has been broken and I can't think of a single prosecution...

Re: New P25 Security Vulnerability Article

Posted: Mon Sep 12, 2011 3:29 pm
by escomm
MattSR wrote:It seems that in reality, no one really cares about people listening to encrypted comms. I mean, look how many times GSM A5/1 has been broken and I can't think of a single prosecution...
Ah, that's the public getting spied on, nobody cares about that :lol: Spy on the government and a ton of bricks comes down on you.

Think of it this way, the average joe (in the US) has no expectation of privacy when in a public place, and therefore can be recorded by anyone with a camera. Now, an LEO in a public place still has no expectation of privacy... and yet some states still have laws on the books prohibiting this... and some prosecutors are dumb enough to pursue charges... and our current SCOTUS may be dumb enough to uphold the convictions...

Re: New P25 Security Vulnerability Article

Posted: Tue Sep 13, 2011 3:56 am
by MattSR
Thats very true Jeff - two different sets of rules..

If anyone is interested, here are the silence vectors that are the known plaintext which enables the keystream recovery and brute force attack:-

These are the 4 vectors are the start of the transmission and are the ones that are ideal for the RC4 stream cipher:-

Image

And heres the two frames that are always at the end and are perfect for the DES-OFB key recovery (since OFB is a block chaining cipher it gives the two consecutive DES input and output blocks)

Image

For those with a sharp eye, you will notice some trellis errors in there that were the result of a bug and a bad signal. This has now been fixed.

Cheers,
Matt

Re: New P25 Security Vulnerability Article

Posted: Sun Sep 18, 2011 8:50 pm
by com501
Interesting.

This only works of course, if the user of the encrypted radio assumes his traffic is secure.....

Nice work, though.

I'm gonna work on this as a demo for the boss....