Johnny (Still) Can't Encrypt: a Security Analysis of the APCO Project 25
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
DMR and Digital Voice Modes
DMR and Digital Voice Modes Presented by N7MOT – Lenny Gemar Amateur radio began with spark gap transmitters, evolving to Morse code and analog voice communications, all originally in the Low Frequency (LF) and High Frequency (HF) bands. Since those early days, many new modes, both analog and digital have been developed. These modes now span from the Very Low Frequencies (VLF) to the Extra High Frequencies (EHF). This presentation is designed to acquaint amateur radio operators with the Digital Mobile Radio or DMR format of digital audio communications, used primarily in the VHF and UHF bands. We’ll briefly discuss the other four Common Air Interface formats (CAI) before diving into the specifics of DMR. DMR and Digital Voice Modes – 8/14/2017 Page 1 of 20 DMR and Digital Voice Modes Digital Voice Modes used in Amateur Radio Interconnected Systems • DDD-D---StarStar ––– Digital Smart Technologies for Amateur Radio (FDMA) • WiresWires----X/SystemX/System Fusion --- Wide-coverage Internet Repeater Enhancement System (FDMA) • NXDN (IDAS/NEXEDGE) ––– Icom/Kenwood Collaboration (FDMA) • DMR ––– Digital Mobile Radio (TDMA 2-TS) • P25 (Phase 1) – Project 25 or APCO P25 (Phase 1 FDMA, Phase 2 TDMA 2-TS) • TETRA --- Terrestrial Trunked Radio, formerly known as Trans-European Trunked Radio (TDMA 4-TS) No known U.S./Canada amateur deployments. DMR and Digital Voice Modes – 8/14/2017 Page 2 of 20 DMR and Digital Voice Modes Digital Voice Modes used in Amateur Radio Interconnected Systems. Repeaters in service as reported by RepeaterBook.com on 8/14/2017 @ 12:00 PDT for the U.S. and Canada. -
Project 25 and Interoperability in Land Mobile Radio
WHITE PAPER 2014 PROJECT 25 AND INTEROPERABILITY IN LAND MOBILE RADIO • The Project 25 standard is unique in that it is a USER driven standard. • Multiple vendors support the P25 standard. • Motorola Solutions equipment interoperates with other vendors equipment. • Customers can and do have a mix of vendor’s equipment. • As technology and customer needs move forward, so too, does P25, which is an open and continually evolving standard. WHITE PAPER PROJECT 25 AND INTEROPERABILITY IN LAND MOBILE RADIO P25: A UNIQUE USER DRIVEN STANDARD Public safety agencies are challenged with keeping communities safe and protecting the lives of their officers, both in normal day-to-day operations as well as when a disaster strikes. Often, it requires agencies to work not only within their jurisdictions or agencies but also across multiple jurisdictions and agencies. Interoperable wireless communications is critical to coordinating joint and immediate response. The public safety community and mission critical land mobile communication providers have been working hand-in-hand for many years and have developed the Project 25 (P25) standards for interoperable mission critical communications. WHAT IS THE PROJECT 25 STANDARD AND WHO MANAGES IT? According to the Project 25 Interest Group (PTIG), “Project 25 is the standard for the design and manufacture of interoperable digital two-way wireless communications products. Developed in North America with state, local and federal representatives and Telecommunications Industry Association (TIA) governance, P25 has gained worldwide acceptance for public safety, security, public service, and commercial applications.” PTIG continues, “The published P25 standards suite is administered by the Telecommunications Industry Association (TIA Mobile and Personal Private Radio Standards Committee TR-8). -
Technical Specification for Land Mobile Radio Equipment
SKMM WTS LMR Rev. 1.01:2007 TECHNICAL SPECIFICATION FOR LAND MOBILE RADIO EQUIPMENT Suruhanjaya Komunikasi dan Multimedia Malaysia Off Pesiaran Multimedia, 63000 Cyberjaya, Selangor Darul Ehsan, Malaysia Copyright of SKMM, 2007 SKMM WTS LMR Rev. 1.01:2007 FOREWORD This Technical Specification was developed under the authority of the Malaysian Communications and Multimedia Commission (SKMM) under the Communications and Multimedia Act 1998 (CMA 98) and the relevant provisions on technical regulation of Part VII of the CMA 98. It is based on recognised International Standards documents. This Technical Specification specifies the specification to conform for approval of telecommunications devices. NOTICE This Specification is subject to review and revision i SKMM WTS LMR Rev. 1.01:2007 CONTENTS Page Foreword................................................................................................................... i 1 Scope........................................................................................................................ 1 2 Normative references ............................................................................................... 1 3 Abbreviations............................................................................................................ 1 4 Requirements ........................................................................................................... 2 4.1 General requirements............................................................................................... 2 4.2 -
The Crossing of Heaven
The Crossing of Heaven Memoirs of a Mathematician Bearbeitet von Karl Gustafson, Ioannis Antoniou 1. Auflage 2012. Buch. xvi, 176 S. Hardcover ISBN 978 3 642 22557 4 Format (B x L): 15,5 x 23,5 cm Gewicht: 456 g Weitere Fachgebiete > Mathematik > Numerik und Wissenschaftliches Rechnen > Angewandte Mathematik, Mathematische Modelle Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 4. Computers and Espionage ...and the world’s first spy satellite... It was 1959 and the Cold War was escalating steadily, moving from a state of palpable sustained tension toward the overt threat to global peace to be posed by the 1962 Cuban Missile Crisis – the closest the world has ever come to nuclear war. Quite by chance, I found myself thrust into this vortex, involved in top-level espionage work. I would soon write the software for the world’s first spy satellite. It was a summer romance, in fact, that that led me unwittingly to this particular role in history. In 1958 I had fallen for a stunning young woman from the Washington, D.C., area, who had come out to Boulder for summer school. So while the world was consumed by the escalating political and ideological tensions, nuclear arms competition, and Space Race, I was increasingly consumed by thoughts of Phyllis. -
Security Weaknesses in the APCO Project 25 Two-Way Radio System
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science 11-18-2010 Security Weaknesses in the APCO Project 25 Two-Way Radio System Sandy Clark University of Pennsylvania Perry Metzger University of Pennsylvania Zachary Wasserman University of Pennsylvania Kevin Xu University of Pennsylvania Matthew A. Blaze University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/cis_reports Part of the Computer Sciences Commons Recommended Citation Sandy Clark, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matthew A. Blaze, "Security Weaknesses in the APCO Project 25 Two-Way Radio System", . November 2010. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-10-34. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/944 For more information, please contact [email protected]. Security Weaknesses in the APCO Project 25 Two-Way Radio System Abstract APCO Project 25 (“P25”) is a suite of wireless communications protocols designed for public safety two- way (voice) radio systems. The protocols include security options in which voice and data traffic can be cryptographically protected from eavesdropping. This report analyzes the security of P25 systems against passive and active attacks. We find a number of protocol, implementation, and user interface weaknesses that can leak information to a passive eavesdropper and that facilitate active attacks. In particular, P25 systems are highly susceptible to active traffic analysis attacks, in which radio user locations are surreptitiously determined, and selective jamming attacks, in which an attacker can jam specific kinds of traffic (such as encrypted messages or key management traffic). -
A Software Based APCO Project 25 Data Transmission Base Station for Local Police Headquarters
University of New Hampshire University of New Hampshire Scholars' Repository Master's Theses and Capstones Student Scholarship Fall 2007 A software based APCO Project 25 data transmission base station for local police headquarters Eric Rene Ramsey University of New Hampshire, Durham Follow this and additional works at: https://scholars.unh.edu/thesis Recommended Citation Ramsey, Eric Rene, "A software based APCO Project 25 data transmission base station for local police headquarters" (2007). Master's Theses and Capstones. 308. https://scholars.unh.edu/thesis/308 This Thesis is brought to you for free and open access by the Student Scholarship at University of New Hampshire Scholars' Repository. It has been accepted for inclusion in Master's Theses and Capstones by an authorized administrator of University of New Hampshire Scholars' Repository. For more information, please contact [email protected]. A SOFTWARE BASED APCO PROJECT 25 DATA TRANSMISSION BASE STATION FOR LOCAL POLICE HEADQUARTERS BY ERIC RENE RAMSEY B.S., University of New Hampshire, 2005 THESIS Submitted to the University of New Hampshire in Partial Fulfillment of the Requirements for the Degree of Master of Science in Electrical Engineering September, 2007 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UMI Number: 1447900 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. -
EFJ Catalog 2004
Sandown Wireless USA 2004 Catalog Mobiles VHF UHF 800 MHz ANALOG/DIGITAL MOBILE RADIO I APCO Project 25 Compatible – Trunked and Conventional5300 SERIES I SMARTNET® and SmartZone® I Analog FM I Encryption For over 80 years, EFJohnson has been at the forefront of the communi- cations industry. Our subscriber radios are used throughout the world by military, police, fire, paramedics, and homeland security profes- sionals. The 5300 Series Analog/ Digital Mobile Radio provides Project 25 Forward Compatibility is provided Field Programmable Capability compatibility along with SMARTNET®/ via a scalable design that allows new provides National Telecommunications SmartZone® capability to meet the features and applications to be inte- and Information Administration (NTIA) needs of federal, state, and local grated into the existing radio platform. agencies the ability to reprogram government users, as well as business, conventional frequencies, CTCSS, DCS, Encrypted Communications for industrial and public safety applications. and talkgroups into the radio’s memory. Switching between SMARTNET/ wideband legacy systems and narrow- ™ 10-Character Alphanumeric Display SmartZone Project 25 and conventional band operation. DES and DES-XL provides a backlit visual display of the analog equipment is simple – just turn enable secure voice communications in radio’s channel or talkgroup on the front the channel knob. wideband channels; Project 25 DES-OFB and AES encryption provide secure of the radio. Tilt viewing angle allows Multiple Protocol Compatibility: communication in narrowband channels. for easy viewing anywhere in the – Project 25 CAI (Common Air vehicle and in any light condition. Interface) enables users to commu- Multiple System Select is an 100-Watt Option allows extra power nicate with other Project 25 compatible advanced feature that enables the user for VHF communication systems. -
Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK{ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Promotor: Proefschrift voorgedragen tot Prof. Dr. ir. Bart Preneel het behalen van het doctoraat in de ingenieurswetenschappen door Souradyuti Paul November 2006 KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK{ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition Jury: Proefschrift voorgedragen tot Prof. Dr. ir. Etienne Aernoudt, voorzitter het behalen van het doctoraat Prof. Dr. ir. Bart Preneel, promotor in de ingenieurswetenschappen Prof. Dr. ir. Andr´eBarb´e door Prof. Dr. ir. Marc Van Barel Prof. Dr. ir. Joos Vandewalle Souradyuti Paul Prof. Dr. Lars Knudsen (Technical University, Denmark) U.D.C. 681.3*D46 November 2006 ⃝c Katholieke Universiteit Leuven { Faculteit Ingenieurswetenschappen Arenbergkasteel, B-3001 Heverlee (Belgium) Alle rechten voorbehouden. Niets uit deze uitgave mag vermenigvuldigd en/of openbaar gemaakt worden door middel van druk, fotocopie, microfilm, elektron- isch of op welke andere wijze ook zonder voorafgaande schriftelijke toestemming van de uitgever. All rights reserved. No part of the publication may be reproduced in any form by print, photoprint, microfilm or any other means without written permission from the publisher. D/2006/7515/88 ISBN 978-90-5682-754-0 To my parents for their unyielding ambition to see me educated and Prof. Bimal Roy for making cryptology possible in my life ... My Gratitude It feels awkward to claim the thesis to be singularly mine as a great number of people, directly or indirectly, participated in the process to make it see the light of day. -
Security Evaluation of the K2 Stream Cipher
Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 . -
8200.1D United States Standard Flight Inspection Manual
DEPARTMENT OF THE ARMY TECHNICAL MANUAL TM 95-225 DEPARTMENT OF THE NAVY MANUAL NAVAIR 16-1-520 DEPARTMENT OF THE AIR FORCE MANUAL AFMAN 11-225 FEDERAL AVIATION ADMINISTRATION ORDER 8200.1D UNITED STATES STANDARD FLIGHT INSPECTION MANUAL April 2015 DEPARTMENTS OF THE ARMY, THE NAVY, AND THE AIR FORCE AND THE FEDERAL AVIATION ADMINISTRATION DISTRIBUTION: Electronic Initiated By: AJW-331 RECORD OF CHANGES DIRECTIVE NO. 8200.1D CHANGE SUPPLEMENTS OPTIONAL CHANGE SUPPLEMENTS OPTIONAL TO TO BASIC BASIC The material contained herein was formerly issued as the United States Standard Flight Inspection Manual, dated December 1956. The second edition incorporated the technical material contained in the United States Standard Flight Inspection Manual and revisions thereto and was issued as the United States Standard Facilities Flight Check Manual, dated December 1960. The third edition superseded the second edition of the United States Standard Facilities Flight Check Manual; Department of Army Technical Manual TM-11-2557-25; Department of Navy Manual NAVWEP 16-1-520; Department of the Air Force Manual AFM 55-6; United States Coast Guard Manual CG-317. FAA Order 8200.1A was a revision of the third edition of the United States Standard Flight Inspection Manual, FAA OA P 8200.1; Department of the Army Technical Manual TM 95-225; Department of the Navy Manual NAVAIR 16-1-520; Department of the Air Force Manual AFMAN 11-225; United States Coast Guard Manual CG-317. FAA Order 8200.1B, dated January 2, 2003, was a revision of FAA Order 8200.1A. FAA Order 8200.1C, dated October 1, 2005, was a revision of FAA Order 8200.1B. -
Methods of Radio Direction Finding As an Aid to Navigation
FWD : MWB Letter 1-6 DP PA RT*«ENT OF COMMERCE Circular BUREAU OF STANDARDS No. 56 WASHINGTON (March 27, 1923.)* 4 METHODS OF RADIO DIRECTION F$JDJipG AS AN AID TO NAVIGATION; THE RELATIVE ADVANTAGES OB£&fmTING THE DIRECTION FINDER ON SHORg$tgJFcN SHIPBOARD By F. W, Dunmo:^, Associate Physicist Now that the great value of the radio direction finder as an aid to navigation is being generally recognized, consider- able importance attaches to the question whether Its proper location is on shipboard, in the hands of the navigator, or on shore. The essential part of a radio direction finding equipment or '‘radio compass'' consists of a coil of wire usually wound on a frame from four to five feet square, so mounted as to be rotatable about a vertical axis. Suitable radio receiving apparatus is connected to this coil for the reception of the radio beacon signals. The construction and operation of the direction finder have been discussed in detail in Bureau of Standards Scientific Paper No. 438, by F.A.Kolster and F.W. Dunmore, to which the reader may refer for further . informa- tion.* The present paper is concerned primarily with a com- parison of the relative advantages of the location of the •direction finder on shore and on shipboard, The two methods may be briefly described as follows; 1. Direction Finder on Shore. --This method, usually con- sists in the use of two or more radio direction finder station installations on shore, each of these compass stations being connected by wire to a controlling transmitting station. -
Analysis of Lightweight Stream Ciphers
ANALYSIS OF LIGHTWEIGHT STREAM CIPHERS THÈSE NO 4040 (2008) PRÉSENTÉE LE 18 AVRIL 2008 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Simon FISCHER M.Sc. in physics, Université de Berne de nationalité suisse et originaire de Olten (SO) acceptée sur proposition du jury: Prof. M. A. Shokrollahi, président du jury Prof. S. Vaudenay, Dr W. Meier, directeurs de thèse Prof. C. Carlet, rapporteur Prof. A. Lenstra, rapporteur Dr M. Robshaw, rapporteur Suisse 2008 F¨ur Philomena Abstract Stream ciphers are fast cryptographic primitives to provide confidentiality of electronically transmitted data. They can be very suitable in environments with restricted resources, such as mobile devices or embedded systems. Practical examples are cell phones, RFID transponders, smart cards or devices in sensor networks. Besides efficiency, security is the most important property of a stream cipher. In this thesis, we address cryptanalysis of modern lightweight stream ciphers. We derive and improve cryptanalytic methods for dif- ferent building blocks and present dedicated attacks on specific proposals, including some eSTREAM candidates. As a result, we elaborate on the design criteria for the develop- ment of secure and efficient stream ciphers. The best-known building block is the linear feedback shift register (LFSR), which can be combined with a nonlinear Boolean output function. A powerful type of attacks against LFSR-based stream ciphers are the recent algebraic attacks, these exploit the specific structure by deriving low degree equations for recovering the secret key.