BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.cccv.de//congress/2024/fahrplan//J8CYTJ
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-38c3-9G97SZ@cfp.cccv.de
DTSTART;TZID=CET:20241229T173500
DTEND;TZID=CET:20241229T181500
DESCRIPTION:In August 2023\, we published the TETRA:BURST vulnerabilities -
  the result of the first public in-depth security analysis of TETRA (Terre
 strial Trunked Radio): a European standard for trunked radio globally used
  by government agencies\, police\, military\, and critical infrastructure.
  Authentication and encryption within TETRA were handled by proprietary cr
 yptographic cipher-suites\, which had remained secret for over two decades
  through restrictive NDAs until our reverse-engineering and publication.\n
 \n\nThis talk is not TETRA:BURST\, but dives into the latest TETRA revisio
 n introduced in 2022. Most notably\, it contains a new suite of cryptograp
 hic ciphers. Of course the cipher available for critical infrastructure an
 d civilian use (TEA7) is intentionally crippled\, and of course these ciph
 ers were to be kept secret\, but this decision was overruled due to public
  backlash following our publication last year. In this talk we will presen
 t a practical attack on the TEA7 cipher\, which while taking a 192-bit key
 \, only offers 56 bits of security. Furthermore\, we point out improvement
 s and shortcomings of the new standard\, and present an update on TEA3 cry
 ptanalysis\, where we previously found a suspicious feature\, and draw a p
 arallel with its successor TEA6.\n\nAll in all\, in this short and relativ
 ely crypto-forward talk\, we assess with all-new material whether the new 
 TETRA standard is fit for its intended purpose. This crucial technology se
 eks to once again take a very central role in our society for decades to c
 ome\, and its cryptographic resilience is of fundamental importance - for 
 emergency networks\, but possibly even more for our critical infrastructur
 e and associated processes.
DTSTAMP:20241227T122144Z
LOCATION:Saal ZIGZAG
SUMMARY:TETRA Algorithm set B - Can glue mend the burst? - Wouter Bokslag\,
  Jos Wetzels
URL:https://fahrplan.events.ccc.de/congress/2024/fahrplan/talk/9G97SZ/
END:VEVENT
END:VCALENDAR
