Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Trump Is Undermining Trust in Official Economic Statistics. China Shows Where That Path Can Lead

    August 8, 2025

    WIRED Tested Dozens of Blenders. The Best Has Lasted a Decade

    August 8, 2025

    8BitDo Pro 3 review: a super customizable controller that’s frustratingly limited on Switch 2 

    August 8, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Encryption Made for Police and Military Radios May Be Easily Cracked
    Security

    Encryption Made for Police and Military Radios May Be Easily Cracked

    News RoomBy News RoomAugust 8, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    For this reason, Murgatroyd noted that purchasers of TETRA-based radios are free to deploy other solutions for end-to-end encryption on their radios, but he acknowledges that the one produced by the TCCA and endorsed by ETSI “is widely used as far as we can tell.”

    Although TETRA-based radio devices are not used by police and military in the US, the majority of police forces around the world do use them. These include police forces in Belgium and Scandinavian countries, as well as East European countries like Serbia, Moldova, Bulgaria, and Macedonia, and in the Middle East in Iran, Iraq, Lebanon, and Syria. The Ministries of Defense in Bulgaria, Kazakhstan, and Syria also use them, as do the Polish military counterintelligence agency, the Finnish defense forces, and Lebanon and Saudi Arabia’s intelligence services. It’s not clear, however, how many of these also deploy end-to-end decryption with their radios.

    The TETRA standard includes four encryption algorithms—TEA1, TEA2, TEA3 and TEA4—that can be used by radio manufacturers in different products, depending on the intended customer and usage. The algorithms have different levels of security based on whether the radios will be sold in or outside Europe. TEA2, for example, is restricted for use in radios used by police, emergency services, military, and intelligence agencies in Europe. TEA3 is available for police and emergency services radios used outside Europe but only in countries deemed “friendly” to the EU. Only TEA1 is available for radios used by public safety agencies, police agencies, and militaries in countries deemed not friendly to Europe, such as Iran. But it’s also used in critical infrastructure in the US and other countries for machine-to-machine communication in industrial control settings such as pipelines, railways, and electric grids.

    All four TETRA encryption algorithms use 80-bit keys to secure communication. But the Dutch researchers revealed in 2023 that TEA1 has a feature that causes its key to get reduced to just 32 bits, which allowed the researchers to crack it in less than a minute.

    In the case of the E2EE, the researchers found that the implementation they examined starts with a key that is more secure than ones used in the TETRA algorithms, but it gets reduced to 56 bits, which would potentially let someone decrypt voice and data communications. They also found a second vulnerability that would let someone send fraudulent messages or replay legitimate ones to spread misinformation or confusion to personnel using the radios.

    The ability to inject voice traffic and replay messages affects all users of the TCCA end-to-end encryption scheme, according to the researchers. They say this is the result of flaws in the TCCA E2EE protocol design rather than a particular implementation. They also say that “law enforcement end users” have confirmed to them that this flaw is in radios produced by vendors other than Sepura.

    But the researchers say only a subset of end-to-end encryption users are likely affected by the reduced-key vulnerability because it depends how the encryption was implemented in radios sold to various countries.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleWhat’s All This Stuff on My Ebike? We Answer Your Component Questions Here
    Next Article The Google Finance page is getting an AI makeover

    Related Posts

    A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT

    August 7, 2025

    The US Military Is Raking in Millions From On-Base Slot Machines

    August 6, 2025

    Google Will Use AI to Guess People’s Ages Based on Search History

    August 6, 2025

    The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware

    August 6, 2025

    The Age-Checked Internet Has Arrived

    August 4, 2025

    The FBI’s Jeffrey Epstein Prison Video Had Nearly 3 Minutes Cut Out

    August 2, 2025
    Our Picks

    WIRED Tested Dozens of Blenders. The Best Has Lasted a Decade

    August 8, 2025

    8BitDo Pro 3 review: a super customizable controller that’s frustratingly limited on Switch 2 

    August 8, 2025

    This three-pack of fast Wi-Fi 7 routers is under $200 for the first time

    August 8, 2025

    The Framework Desktop Doesn’t Need to Start a Revolution to Prove Itself

    August 8, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    The Google Finance page is getting an AI makeover

    By News RoomAugust 8, 2025

    Google’s apparent quest to bring AI features across all of its apps has just extended…

    Encryption Made for Police and Military Radios May Be Easily Cracked

    August 8, 2025

    What’s All This Stuff on My Ebike? We Answer Your Component Questions Here

    August 8, 2025

    Sony insists Xperia phones are ‘very important’ to it

    August 8, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.