this post was submitted on 29 Dec 2025
88 points (100.0% liked)

Funhole

1190 readers
122 users here now

Welcome to Funhole! The first and only hole on SDF exclusively for fun content! Are you a content creator? Then come post your content and join the fun!

founded 2 years ago
MODERATORS
 
top 14 comments
sorted by: hot top controversial new old
[–] elvith@feddit.org 11 points 3 days ago

Summer 2023: All Cops Are Broadcasting - Obtaining the secret TETRA primitives after decades in the shadows

In this talk we will discuss the radio jailbreaking journey that enabled us to perform the first public disclosure and security analysis of the proprietary cryptography used in TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, prisons, emergency services and military operators. Besides governemental applications, TETRA is also widely deployed in industrial environments such as factory campuses, harbor container terminals and airports, as well as critical infrastructure such as SCADA telecontrol of oil rigs, pipelines, transportation and electric and water utilities.

End 2023: All Cops Are Broadcasting - TETRA unlocked after decades in the shadows

This talk will present details of the TETRA:BURST vulnerablities - the result of the first public in-depth security analysis of TETRA (Terrestrial Trunked Radio): a European standard for trunked radio globally used by government agencies, police, military, and critical infrastructure relying on secret cryptographic algorithms which we reverse-engineered and published in August 2023. Adding to our initial disclosure, this talk will present new details on our deanonymization attack and provide additional insights into background and new developments.

End 2024: TETRA Algorithm set B - Can glue mend the burst?

This talk is not TETRA:BURST, but dives into the latest TETRA revision introduced in 2022. Most notably, it contains a new suite of cryptographic ciphers. Of course the cipher available for critical infrastructure and civilian use (TEA7) is intentionally crippled, and of course these ciphers were to be kept secret, but this decision was overruled due to public backlash following our publication last year. In this talk we will present a practical attack on the TEA7 cipher, which while taking a 192-bit key, only offers 56 bits of security. Furthermore, we point out improvements and shortcomings of the new standard, and present an update on TEA3 cryptanalysis, where we previously found a suspicious feature, and draw a parallel with its successor TEA6.

[–] pleasureyoucanmeasure 3 points 2 days ago (1 children)

Thank you for emitting content!

Thank you for resonating with my content!

[–] radish@lemmy.blahaj.zone 10 points 3 days ago (1 children)

Thank you for creating salamander content!

Thank you for engaging with my salamander content!

[–] qrstuv 9 points 3 days ago (1 children)

Thank you for creating cryptable content!

Thank your for engaging with my π/4 Differential Quadrature Phase-Shift Keying modulated content!

[–] lessthanluigi 5 points 3 days ago (1 children)
[–] n0respect@lemmy.world 3 points 2 days ago* (last edited 2 days ago)

As an og fan I'm really glad this show broke out into cult status /offtopic

[–] cathfish@lemmy.world 4 points 2 days ago (1 children)

Thank you for creating shrimp content!

And remembering me how lame is europe.

We need more shrimp content!

Thank your for engaging with europe is lame content!

[–] CanadaPlus 2 points 2 days ago

Wow, the new Bug's Life looks lit!

[–] CubitOom@infosec.pub 4 points 3 days ago (1 children)

Are there any opinions on DM-32UV Encryption to be overhead?

As far as i know, DMR is a way more open standard compared to the Security thru obscurity from Tetra (as Kerckhoff intended), it should be rather save unless someone actually manages to break AES-256 (claims have been made about that recently tho that it could be possible for state Actors in possession of Quantum Computers, if that is fiction or reality is up to the spooks).