Razorback55
Member
- Joined
- Mar 6, 2025
- Messages
- 21
Following the discovery of Chinese backdoors, I propose to make a list of radios with and without backdoors.
forums.radioreference.com
I asked ChatGpt:
Test with a Motorola network:
DSD+ with option -v4
MOTOTRBO network RC4 algo (CAP+ network with RAS), IV is the same every other time !!!!
Possible backdoor in the RC4 Mototrbo
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=DA6A0D98 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=2547A603 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=DA6A0D98 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=2547A603 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=DA6A0D98 Tgt=2001
Could someone test on their own Motorola RC4 and AES radios?
Could someone do the same test on their own Chinese radios in RC4, AES128 and AES256?

Baofeng - DM32 DM-32 256 bit Encryption Channel Setting.
DM32 DM-32 256 bit Encryption Channel Setting. After setting up the 256 bit Encryption details, I tried to use Encryption in a channel setting. When I checked the box for Encryption and entered the Encryption ID, as soon as I left that channel... it reverted to Blank. SOLUTION - Export the...
I asked ChatGpt:
"What is the security of AES-256 in OFB mode with a constant initialization vector?"
Answer:
Using AES-256 in OFB mode (Output Feedback Mode) with a fixed initialization vector (IV) significantly weakens the security of the encryption, even though AES-256 itself is a strong encryption algorithm.
Here's a detailed explanation:
1. How OFB Mode Works (Text Description)
- OFB turns a block cipher like AES into a stream cipher.
- Encryption and decryption are done by XORing the plaintext (or ciphertext) with a keystream that is generated from the IV and the key.
- This keystream is independent of the plaintext itself and follows this pattern:
- First block: keystream_0 = AES_encrypt(key, IV)
- Second block: keystream_1 = AES_encrypt(key, keystream_0)
- Third block: keystream_2 = AES_encrypt(key, keystream_1)
- And so on...
- This same keystream is used to XOR with plaintext to get ciphertext, or with ciphertext to get plaintext.
2. Why a Fixed IV is Insecure
If you reuse the same IV with the same key, then the keystream will always be the same. This leads to several vulnerabilities:
a. Vulnerability of Stream Ciphers
Suppose you encrypt two different plaintext messages, M1 and M2, using the same key and the same IV:
- C1 = M1 XOR keystream
- C2 = M2 XOR keystream
An attacker who intercepts both ciphertexts can compute:
- C1 XOR C2 = (M1 XOR keystream) XOR (M2 XOR keystream)
- This simplifies to: M1 XOR M2
This XOR of plaintexts (M1 XOR M2) can reveal information about both messages, especially if one of them is known or guessable (silence frames).
b. Loss of Semantic Security
When the IV is fixed, encrypting the same message multiple times always produces the same ciphertext. This leaks information and enables pattern recognition.
c. Reveals Structure and Repetitions
Since OFB mode does not use the message content to affect the keystream, using the same IV will result in identical ciphertext patterns for identical plaintext blocks, making repeated content visible to attackers.
3. Best Practice
To maintain security with AES in OFB mode:
- Always use a unique IV for each encryption session.
- The IV does not need to be secret, but it must be unpredictable and never reused with the same key.
- It is common to send the IV along with the ciphertext (e.g., prepend or append it).
Example:
- ciphertext = IV || actual_encrypted_data
4. Conclusion
AES-256 in OFB mode with a fixed IV is not secure. It makes the encryption vulnerable to keystream reuse attacks, plaintext XOR recovery, and ciphertext pattern analysis. The use of a unique IV for each encryption operation is crucial to ensure the confidentiality and security of the data.
Test with a Motorola network:
DSD+ with option -v4
MOTOTRBO network RC4 algo (CAP+ network with RAS), IV is the same every other time !!!!
Possible backdoor in the RC4 Mototrbo
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=DA6A0D98 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=2547A603 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=DA6A0D98 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=2547A603 Tgt=2001
+DMR slot1 BS DATA DCC=7 PI Header ECC/RAS Alg=RC4 KID=1 MI=DA6A0D98 Tgt=2001
Could someone test on their own Motorola RC4 and AES radios?
Could someone do the same test on their own Chinese radios in RC4, AES128 and AES256?
Last edited: