Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.

  • Kairos@lemmy.today
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    7 days ago

    found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It’s not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them.

    STOP DOING THIS. Just like… Stop doing it. I thought this would be a MITM handshake thing but no. Use your brain. 128 bits of entropy minimum. 56 bits is a million CPU seconds at 1Billion gesses a second.