Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Satellite Phone Encryption Calls Can be Cracked in Fractions of a Second
#1
[Image: Decrypting-Satellite-Phone-Calls.png]

Security researchers have discovered a new method to decrypt satellite phone communications encrypted with the GMR-2 cipher in "real time" -- that too in mere fractions of a second in some cases.

The new attack method has been discovered by two Chinese security researchers and is based on previous research by German academicians in 2012, showing that the phone's encryption can be cracked so quickly that attackers can listen in on calls in real time.


The research, disclosed in a paper published last week by the security researchers in the International Association for Cryptologic Research, focused on the GMR-2 encryption algorithm that is commonly being used in most modern satellite phones, including British satellite telecom Inmarsat, to encrypt voice calls in order to prevent eavesdropping.

Unlike previous 2012 research by German researchers who tried to recover the encryption key with the help of 'plaintext' attacks, the Chinese researchers attempted to "reverse the encryption procedure to deduce the encryption-key from the output keystream directly."

The attack method requires hitting a 3.3GHz satellite stream thousands of times with an inversion attack, which eventually produces the 64-bit encryption key and makes it easier to hunt for the decryption key, allowing attackers to decrypt communications and listen in to a conversation.

Full Article
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer mrtrout 0 301 03-16-2024 , 04:20 PM
Last Post: mrtrout
  Europol Credits Sweeping Arrests to Cracked Sky ECC Comms Bjyda 0 991 03-13-2021 , 11:39 PM
Last Post: Bjyda
  Security Notice: Emerging Ransomware, AllCry, cracked by 360 mrtrout 1 1,757 11-22-2017 , 09:17 AM
Last Post: Jeanjean

Forum Jump:


Users browsing this thread: 1 Guest(s)