All Cops Are Broadcasting: Breaking TETRA After Decades in the Shadows

Breaking decades of secrecy, researchers expose vulnerabilities in the TETRA encryption algorithm, used by law enforcement agencies worldwide, revealing a backdoor and exploitable flaws that can compromise sensitive communications.

Key takeaways
  • The TETRA encryption algorithm suite is used for voice and data encryption, but has been compromised by flaws in its design and implementation.
  • The algorithm uses a random seed, but the seed is easily predictable, allowing for decryption of messages.
  • The TETRA system uses a hierarchical system of encryption, with each level being more secure than the last.
  • However, the encryption used at each level is flawed, and can be easily broken using off-the-shelf hardware.
  • The attacker can recover the entire keystream by capturing and retransmitting a small portion of the encrypted data.
  • The TETRA system also uses a primitive called TA61 for identity encryption, which is vulnerable to attack.
  • The system has been used by law enforcement agencies around the world, including the UK’s police force.
  • The researchers have found multiple vulnerabilities in the TETRA system, including a backdoor that allows unauthorized access to the system.
  • The vulnerabilities have been mitigated by firmware updates, but the system remains vulnerable to attack.
  • The TETRA system has been used in a variety of contexts, including police communications, emergency services, and military communications.
  • The system is widely used, with estimates suggesting that it is used by over 100 countries.
  • The researchers hope to establish a community of cryptanalysts to help analyze and break the TETRA system.