A Tempest attack against poorly designed and shielded hardware. So not an AES crack at all.
"At present, there is no known practical attack that would allow someone without knowledge of the key to read data encrypted by AES when correctly implemented."See: "Known Attacks"
Advanced Encryption Standard - Wikipedia
Brilliant minds have been trying for what, two decades now to crack AES? To date, no proposed attacks against properly fully implemented AES.The point is that it is always the sucker's bet to say never when it comes to cryptography. The more "unbreakable" the code, the more it attracts attempts. Will it be cracked before something better comes along? I have no idea.
And then humans can clone keys from a keyed device to another. Not exactly secure and still not cracking AES.However, most compromises of encrypted radio traffic will come through some form of access to the keys. That route is likely to always be the weakness. Humans can be the weakest link. Now, a hardened, completely automated AI system creating and deploying keys would be, in my estimation, the most secure way to do it.
However, most compromises of encrypted radio traffic will come through some form of access to the keys.
That route is likely to always be the weakness. Humans can be the weakest link.
Now, a hardened, completely automated AI system creating and deploying keys would be, in my estimation, the most secure way to do it.
It’s called OTAR.
When a radio is programmed, it is also touched with a KVL for an initial key. Once loaded, you rekey the radio using OTAR, new, current use keys are loaded into the radio from a KMF.
Unless the radio is zeroized, either by the other radio operator, by tampering with the encryption hardware or by removing its power source(assuming infinite key retention is not allowed) you never need to touch the radio again with a keyfill device, even to rekey the radio for new encryption keys. Other than the initial encryption key, there is no other hardware way to obtain the key.
You didn't state a point. Not going to bother to guess what it is.You missed the whole point. I wasn't trying to dispute that it hadn't been cracked.
Perhaps you are too ready to jump and not read for content...
You didn't state a point. Not going to bother to guess what it is.
The point is that it is always the sucker's bet to say never when it comes to cryptography. The more "unbreakable" the code, the more it attracts attempts. Will it be cracked before something better comes along? I have no idea.
I literally stated my point...
(Emphasis added)
I literally stated my point...
(Emphasis added)
The point of that post was that he said I did not state my point.I would suggest you read up about AES, and read and understand both the process for selection of the AES cipher, and the testing it has been subjected too.
Sent from my iPhone using Tapatalk
The point of that post was that he said I did not state my point.
That was address to your point. To bet that AES will be cracked is a fools bet.
AES will likely be defeated because of its method of implementation, or the human factor. It won’t be defeated by brute force.
The way manufacturers have implemented AES256 in 2way radio(HARDWARE not software) does not lend itself to easy defeat. The KV’s are not able to be read out of the UCM/MACE/encryption module one loaded, and are designed to zeroized when tampered with.
AES 128, 192 and 256 has been under intense scrutiny by the cryptographic community for almost 20 years and has not been successfully defeated yet.
People need to stop letting the scanner whackers believe that it is even remotely possible to defeat properly deployed AES256 used in modern public safety radio systems.
The article in this post is not defeating the algorithm, they are exploiting a severe weakness in the way it is implemented with in the device itself. The device itself is giving away the key.
The point is that it is always the sucker's bet to say never when it comes to cryptography. The more "unbreakable" the code, the more it attracts attempts. Will it be cracked before something better comes along? I have no idea.
However, most compromises of encrypted radio traffic will come through some form of access to the keys. That route is likely to always be the weakness. Humans can be the weakest link. Now, a hardened, completely automated AI system creating and deploying keys would be, in my estimation, the most secure way to do it.
You missed the whole point. I wasn't trying to dispute that it hadn't been cracked.
Perhaps you are too ready to jump and not read for content...
at the end of the day, attempting to defeat encryption violates Federal law and just about every state law. All this mantra aside, with the transition to LTE/5G, LMR itself will be declining in use, especially in large cities. Encryption is "built in" and the nature of the network really make third party interception both improbable and nearly impossible, without the use of sophisticated equipment and expertise. The writing is on the wall. But this doesn't mean scanning is dead. Plenty of good stuff to listen to: aircraft comms, railroads, commercial stuff, amateur radio, GMRS, etc.