Article Details

Scrape Timestamp (UTC): 2023-11-14 08:02:47.018

Source: https://www.theregister.com/2023/11/14/tetra_encryption_algorithms_open_sourced/

Original Article Text

Click to Toggle View

Bug hunters on your marks: TETRA radio encryption algorithms to enter public domain. Emergency comms standard had five nasty flaws but will be opened to academic research. A set of encryption algorithms used to secure emergency radio communications will enter the public domain after an about-face by the European Telecommunications Standards Institute (ETSI). The algorithms are used by TETRA – short for the Terrestrial Trunked Radio protocol – and they are operated by governments, law enforcement, military and emergency services organizations in Europe, the UK, and other countries. In mid-2023, Netherlands-based security firm Midnight Blue disclosed five vulnerabilities affecting all TETRA radio networks that could allow criminals to decrypt and intercept communications in real time. The bugs — and the secrecy of the algos themselves — sparked outrage in the security community, which pointed out that proprietary encryption algorithms mean third-party researchers couldn’t test code, making it harder to detect bugs and defend networks. The technical committee in charge of the TETRA standard met in October to discuss making the secret algorithms public. They then voted unanimously to open source all TETRA Air Interface cryptographic algorithms. "The meeting was very well attended and had a wide spread of the TETRA community including operators, users, manufacturers and governments," ETSI committee chairman Brian Murgatroyd is quoted as saying in a statement. "Following publication of the algorithms, we are open to academic research for independent reviews." The standards org hasn’t set a date for making the algorithms accessible, ETSI spokesperson Claire Boyer told The Register. TETRA includes an original set of Air Interface cryptographic algorithms: TEA 1, 2, 3, and 4. Some of these were disclosed by the Midnight Blue research team, which found the five vulnerabilities and released technical details of the flaws at the annual Black Hat and DEF CON security conferences in August 2023. The researchers said they waited a year and a half to disclose details — instead of the standard six-month wait — due to the sensitive nature of the networks and the complexity of fixes for the flaws, which were named TETRA:BURST. In 2022 ETSI added three new and supposedly quantum-proof algorithms to the TETRA family, dubbed TEA 5, 6, and 7. The algos are intended to address the threat that, in the worryingly near future, quantum computers will be able to break existing encryption schemes, thus rendering data and comms protected by legacy encryption insecure. According to ETSI, this entire set of new and old algorithms will enter the public domain, along with TAA1 (the original authentication and key management specification) and TAA2 (the new authentication and key management specification).

Daily Brief Summary

NATION STATE ACTIVITY // ETSI to Release TETRA Radio Encryption Algorithms for Research

ETSI plans to make TETRA radio encryption algorithms public, allowing academic research and vulnerability testing.

TETRA is used by government, law enforcement, and emergency services across Europe and the UK for secure communications.

Security firm Midnight Blue revealed five critical vulnerabilities that could let attackers intercept TETRA communications.

The decision to open source TETRA cryptographic algorithms followed unanimous agreement by the technical committee overseeing the standard.

Opening the encryption algorithms to the public domain aims to increase security by enabling independent reviews and bug fixes.

TEA 1, 2, 3, and 4 are the original set of TETRA Air Interface cryptographic algorithms, with three new quantum-resistant algorithms, TEA 5, 6, and 7, added in 2022.

Researchers delayed the disclosure of vulnerabilities for 1.5 years due to the sensitive nature of TETRA networks and the complexity of implementing fixes.

The move to publish the algorithms does not yet have a set date, but aims to enhance security measures against the future threat of quantum computing decryption.