The Big E Break?

bert-rob

Member
Joined
Aug 11, 2015
Messages
13
Reaction score
2
Location
marmora, ontario, canada
I believe that they have made 4 new tea codes tea5, tea6 tea7 and tea8 those are listed in a Motorola brosure for a new tetra terminal i believe it was called the 600 series mobile
 

trentbob

W3BUX- Bucks County, PA
Premium Subscriber
Joined
Feb 22, 2007
Messages
6,866
Reaction score
8,077
Why do you say that?
I just saw this now, sorry for not getting back to you.

Huge multimedia conglomerate of publishers and publisher of Wired both print and internet.

I would certainly think their risk assessment department and house counsel wouldn't publish this in wired. They're in charge of so many of the largest Publications now and I figured they would play on the safe side.
 

doriboni

Member
Joined
Oct 31, 2023
Messages
117
Reaction score
44

The press is always late, it reports a piece of information (wrongly) that was published in December 2024.

It is not a 128-bit key that is compressed into 56 bits, but a 192-bit key that is compressed into 56 bits and this concerns TEA7 encryption.


In this talk we will present a practical attack on the TEA7 cipher, which while taking a 192-bit key, only offers 56 bits of security.

Moreover it is not hidden because ETSI had indicated it: TEA1 and TEA7 are intended for European companies and they are not allowed to have real encryption stronger than 64 bits, because of the Wassenaar Agreement.

Even if you're not in Europe, if you have Tetra encryption, check which algorithm you have, it's probably going to be TEA1 (32 real bits instead of 80 bits) or TEA7 (56 real bits instead of 192 bits).



This suggests that Chinese AES256 radios may be much less reliable than FIPS 140-2 compliant hardware radios that you can only buy with special authorization documents.
 
Last edited:

doriboni

Member
Joined
Oct 31, 2023
Messages
117
Reaction score
44
No. Currently, there is not enough time OR energy remaining in the entire universe to brute force a PROPER, RANDOM AES256 bit key.

Hardly any algorithm is broken by brute force. The German Enigma (3-rotor Wehrmacht Enigma) with billions of billions of possible combinations (2,780,000,000,000,000,000,000,000 keys), was broken without making a full brute force (only on the choice of rotors and the positions of the rotors : only 1,054,560 keys to test per day. Then all the messages of the day are decrypted).
If the AES256 is broken, it won't be with brute force either.
All the attacks that exist in the scientific literature always use something other than brute force (linear cryptanalysis, differential etc...)

It should be remembered that the AES256 only uses 14 rounds (to mix the data and the key).
A newer NSA algorithm: SIMON, uses 72 rounds for 256-bit keys.
Of course, SIMON is simpler than the AES256 but the current trend is clearly to increase the number of rounds because the 14 rounds of the AES256 (published 25 years ago) are no longer necessarily enough.
 
Last edited:

KK4JUG

Member
Premium Subscriber
Joined
Dec 13, 2014
Messages
4,548
Reaction score
3,167
Location
GA
I made the original post but I'm outta here. This has gotten waaaaay above my pay grade. :)
 

YalekW

Signal Analyzer & Identification specialist
Joined
Jun 16, 2012
Messages
154
Reaction score
42
While I do know this wont have anything to do with this post specifically, but....
Its funny that wireshark can decrypt any sort of TLS traffic client side.
Why? Logging all the keys. Includes: Pre shared secret, and all other keys, in real time. Not sure if this (would) relate to it or not. Im not an expert on decryption honestly.
 

doriboni

Member
Joined
Oct 31, 2023
Messages
117
Reaction score
44
the number of rounds because the 14 rounds of the AES256 (published 25 years ago) are no longer necessarily enough.
I am obviously talking about a foreign government (Russia, China...) and not a simple citizen.

That's why the US government uses AES256 to prevent its own citizens from listening to the police, FBI or other agencies.
But that to protect its secrets from foreign governments, it does not use AES256 but its own algorithms: BATON, SAVILLE ...
 
Last edited:

Trilliumaire

Member
Premium Subscriber
Joined
Aug 14, 2025
Messages
46
Reaction score
19
Location
Evergreen, CO
Quantum computers will crack the rest of these radio encryption protocols by 2030.

Oh well.

¯\_(ツ)_/¯

Oh, and don't forget that everything transmitted today/now can be cracked. Just record the transmissions with an ADC and wait till 2030 to see what was said.

Time to roll out MDPC I guess.
 
Last edited:

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
7,393
Reaction score
2,335
Location
Sector 001


This suggests that Chinese AES256 radios may be much less reliable than FIPS 140-2 compliant hardware radios that you can only buy with special authorization documents.
Of course the 'Chinese AES256' Radios are less reliable than a FIPS140-2 compliant hardware based radio.

Even Motorola offerings in the DMR space are of questionable key security. They are not keyloaded. The key variables are entered in CPS, and plaintext viewable until you close the codeplug. While the keys are not viewable when you read the radio, they are not securely stored in any fashion. I don't believe there is any way to zeroize their radios either.
 

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
7,393
Reaction score
2,335
Location
Sector 001
FIPS 140-2 compliant hardware radios that you can only buy with special authorization documents.
I've bought several Astro25 radios, all with AES256, with out any 'special authorization documents'

AES256 isn't an 'American' algorithm, it was designed by 2 Dutch citizens, and was adopted by NIST.
 

kayn1n32008

ØÆSØ Say it, say 'ENCRYPTION'
Joined
Sep 20, 2008
Messages
7,393
Reaction score
2,335
Location
Sector 001
Quantum computers will crack the rest of these radio encryption protocols by 2030.

Oh well.

¯\_(ツ)_/¯
Lol, of course current algorithms will eventually be broken. No different than what happened with DES56 ARC4 and other algorithms. Nobody was, is or has suggested that algorithms like AES128/192/256 would remain undefeated forever. Cryptologists are already designing quantum resistant algorithms. It's a dance that will continue on indefinetly, until humans case to exist.
 

doriboni

Member
Joined
Oct 31, 2023
Messages
117
Reaction score
44
I've bought several Astro25 radios, all with AES256, with out any 'special authorization documents'

AES256 isn't an 'American' algorithm, it was designed by 2 Dutch citizens, and was adopted by NIST.

I imported two HF radios from Codan out of Australia. They had AES256.
I had to fill out paperwork and receive approval from the Australian DOD.
 

mmckenna

I ♥ Ø
Joined
Jul 27, 2005
Messages
27,185
Reaction score
32,584
Location
United States

You missed the part where I was importing the radios from Australia. It wasn't a restriction, just a requirement to fill out specific paperwork that had to do with how the radios would be used.

@kayn1n32008 was purchasing his within North America. I've purchased a LOT of radios at work that include encryption and didn't need to fill out any paper work or jump through any hoops.

Big difference.
 
Top