38C3 - Breaking NATO Radio Encryption

Поделиться
HTML-код
  • Опубликовано: 22 янв 2025

Комментарии • 34

  • @der.Schtefan
    @der.Schtefan День назад +67

    There is nothing more German than explaining your own joke, even after half the room did actually laugh.

    • @jomanaminneed
      @jomanaminneed День назад

      the only thing even more german happens when a jew doesnt laugh at the germans joke

    • @stoertebecker5
      @stoertebecker5 День назад

      In fact there is: making a video about if something is legal to own / do. Only Germans care enough about that

  • @RandomGeometryDashStuff
    @RandomGeometryDashStuff День назад

    35:23 What does red bold text mean?
    I thought it means if you change δ (mentioned at 31:42) values of red texts changes, values of black texts don't change.
    But at 35:23 rk₇ changed from red to black, why?

  • @Babenhausener
    @Babenhausener День назад +4

    Warum der reupload?

    • @SALTINBANK
      @SALTINBANK День назад +5

      Warum das radio kapput ist ?

    • @o.o-v3g
      @o.o-v3g День назад

      @SALTINBANK :)

    • @mediacccde
      @mediacccde  День назад +29

      Das ist kein Reupload. Wir laden die Videos bei denen es Audio-Probleme gab erst hier hoch, sobald wir diese behoben haben, weil das hier eben ohne Re-Upload nicht geht. Anderen Kanälen war das leider egal, sie haben sich bei media.ccc.de bedient, wo wir die Videos als Preview mit Tonstörungen veröffentlicht haben.

  • @matthiaskatze1932
    @matthiaskatze1932 18 часов назад

    Oha. Wirklich krass dass die Nato so was halbgares verwendet. Die Engländer mussten für Enigma mehr Aufwand betreiben.

  • @micmanders
    @micmanders День назад +1

    Hmmm….I feel that the direction finding and movement of the radios gives you more valuable info….even to know if voice/data might be encrypted as well. Callsign and ALE Key-Up phase may not be the most spectacular thing to know in my limited view of evesdropping the whole scene…..but only my thoughts….

    • @potatoonastick2239
      @potatoonastick2239 День назад +2

      No directionality in HF radio due to the reflection in the upper atmosphere

    • @riaganbogenspanner
      @riaganbogenspanner День назад +1

      If you got the key, you can listen to all messages. Not only the ALE but ALL communication.

    • @micmanders
      @micmanders День назад +1

      @@riaganbogenspanner Oh! That is something different then! Thanks for clarification. ALE makes me curious since ages…maybe I will try it out soon, but clear comms of course :-)

  • @bendunselman
    @bendunselman 20 часов назад

    Are neural nets like for instance generative adverserial nets (or deeplearning AI technology in general) useable/applicable instead of brute force attacks?

  • @jfbeam
    @jfbeam День назад +9

    Wait a minute. If your attack depends on knowing the plaintext, and you have a way of getting that, I'd have to say that's a bigger problem. (break in security) Recovering the key would allow you to listen to the entire network, not just the one endpoint you can see unencrypted. Why not just use AES? I don't even know anyone with a security clearance that would know that. :-) For a standard from 2017, I can't see why they wouldn't -- AES can be done in hardware quickly, cheaply, and using low power. Maybe they were still living in the "export restricted" world. (even then, the standards were public... once you double pinky swear you're not in an restricted country.) Maybe they needed something that could work on older radio hardware that couldn't do AES. (but it's still just as complex as AES.) Government and military tech moves rather slowly, so who knows, but I'd bet there's a contractor somewhere who made a fortune coming up with this.

    • @hanfo420
      @hanfo420 День назад +9

      I would recommend watching the video (again).

    • @der.Schtefan
      @der.Schtefan День назад +12

      Getting known plaintext, or guessing a large part of it, is quite common. Either because you just triggered an event that causes a message to be sent, or you are guessing weather reports, or Typcial greetings. I recommend reading up about how Enigma got broken in WW2. But this also used to be an attack vector in HTTPS when it came to session cookies, etc

    • @jfbeam
      @jfbeam День назад

      @@der.Schtefan I'm aware of german foolishness. (and there was much of it.) But I'll say it again: _if you're in a position to know the plaintext, that's your first problem._ (and will remain a problem no matter what cipher is used.)

    • @randomgeocacher
      @randomgeocacher День назад +10

      If you analyze most real word protocol, attacker typically know parts of the plaintext. Message oracles, padding oracles, formatting oracles, etc. are common plaintext leaks. And those plaintext errors are protocol errors. Next imagine all the operator errors. But yeah, in an ideal world the plaintext is always unpredictable, with no know plaintexts or oracles; but in real world we usually want to send something more humanly meaningful than meaningless random noice.

    • @DantalionNl
      @DantalionNl День назад +3

      @@jfbeam You clearly fundamentally do not understand under what context we reason about cryptographic security. Yes avoiding leaking plaintext is important, but for the robustness of the cipher we have to include that the attacker can get arbitrary plaintexts.

  • @El_Locoroco
    @El_Locoroco День назад +6

    WTF?

  • @AmauryJacquot
    @AmauryJacquot День назад

    halfloop is obviously half-baked 🤣
    the russians must be laughing all the way to moscow

  • @TricTrac3
    @TricTrac3 День назад +1

    🫡

  • @attribute-4677
    @attribute-4677 День назад +3

    @15:30 You cannot “easily” brute force 56 bits. Even with a modern GPU, it takes at least a year, and that’s vanilla DES with ECB and no entropy analysis, much less CBC, OFB or other modes with multiple rounds.

    • @jacobscheit4128
      @jacobscheit4128 День назад +9

      Not true, a Custom Silicon Can do that by now very fast. 1-2 Hours. And the Type of Special Hardware is Not Hard to get but Not cheap.

    • @hanfo420
      @hanfo420 День назад +8

      It’s called an FPGA 🤫

    • @jfbeam
      @jfbeam День назад +7

      @ Custom chips aren't necessary. There are several projects doing this with off-the-shelf Xilinx FPGA's. Yes, your single desktop GPU isn't going to be very useful. A few thousand of them (which is a _small_ AI cluster these days) certainly can.

    • @xj0ex39
      @xj0ex39 День назад +1

      Git Gud scrubs -your printer

    • @der.Schtefan
      @der.Schtefan День назад +4

      Dude, just get 365 cloud GPUs, with a stolen credit card, done.