By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: Encryption Made for Police and Military Radios May Be Easily Cracked
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release

The Sims Board Game Nobody Asked for Was Quietly Released at Target Last Month

News Room News Room 8 August 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > Encryption Made for Police and Military Radios May Be Easily Cracked
News

Encryption Made for Police and Military Radios May Be Easily Cracked

News Room
Last updated: 7 August 2025 21:56
By News Room 4 Min Read
Share
SHARE

For this reason, Murgatroyd noted that purchasers of TETRA-based radios are free to deploy other solutions for end-to-end encryption on their radios, but he acknowledges that the one produced by the TCCA and endorsed by ETSI “is widely used as far as we can tell.”

Although TETRA-based radio devices are not used by police and military in the US, the majority of police forces around the world do use them. These include police forces in Belgium and Scandinavian countries, as well as East European countries like Serbia, Moldova, Bulgaria, and Macedonia, and in the Middle East in Iran, Iraq, Lebanon, and Syria. The Ministries of Defense in Bulgaria, Kazakhstan, and Syria also use them, as do the Polish military counterintelligence agency, the Finnish defense forces, and Lebanon and Saudi Arabia’s intelligence services. It’s not clear, however, how many of these also deploy end-to-end decryption with their radios.

The TETRA standard includes four encryption algorithms—TEA1, TEA2, TEA3 and TEA4—that can be used by radio manufacturers in different products, depending on the intended customer and usage. The algorithms have different levels of security based on whether the radios will be sold in or outside Europe. TEA2, for example, is restricted for use in radios used by police, emergency services, military, and intelligence agencies in Europe. TEA3 is available for police and emergency services radios used outside Europe but only in countries deemed “friendly” to the EU. Only TEA1 is available for radios used by public safety agencies, police agencies, and militaries in countries deemed not friendly to Europe, such as Iran. But it’s also used in critical infrastructure in the US and other countries for machine-to-machine communication in industrial control settings such as pipelines, railways, and electric grids.

All four TETRA encryption algorithms use 80-bit keys to secure communication. But the Dutch researchers revealed in 2023 that TEA1 has a feature that causes its key to get reduced to just 32 bits, which allowed the researchers to crack it in less than a minute.

In the case of the E2EE, the researchers found that the implementation they examined starts with a key that is more secure than ones used in the TETRA algorithms, but it gets reduced to 56 bits, which would potentially let someone decrypt voice and data communications. They also found a second vulnerability that would let someone send fraudulent messages or replay legitimate ones to spread misinformation or confusion to personnel using the radios.

The ability to inject voice traffic and replay messages affects all users of the TCCA end-to-end encryption scheme, according to the researchers. They say this is the result of flaws in the TCCA E2EE protocol design rather than a particular implementation. They also say that “law enforcement end users” have confirmed to them that this flaw is in radios produced by vendors other than Sepura.

But the researchers say only a subset of end-to-end encryption users are likely affected by the reduced-key vulnerability because it depends how the encryption was implemented in radios sold to various countries.

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Microsoft is cautiously onboarding Grok 4 following Hitler concerns

News Room News Room 8 August 2025
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

Leak Reveals the Workaday Lives of North Korean IT Scammers

The tables show the potential target jobs for IT workers. One sheet, which seemingly includes…

8 August 2025

US military finds a good use for Tesla Cybertruck: missile target practice

Elon Musk has long bragged that the Tesla Cybertruck is a uniquely impervious vehicle thanks…

8 August 2025

Take-Two net bookings rise “significantly above guidance range” to $1.42bn in Q1 2026

Take-Two Interactive has released its financial results for its first fiscal quarter, recording a 16%…

8 August 2025
News

Review: Framework Desktop

In 3DMark Steel Nomad, a popular graphics benchmark, the Framework Desktop performed 13 percent faster than on the ROG Flow Z13. That’s with both systems set at the Best Performance…

News Room 8 August 2025

Your may also like!

News

Age Verification Is Sweeping Gaming. Is It Ready for the Age of AI Fakes?

News Room 7 August 2025
News

The 6 biggest changes coming to ChatGPT

News Room 7 August 2025
Gaming

Kojima’s OD ‘Still in Development’ Despite Xbox Game Cancellations

News Room 7 August 2025
News

The Best Colored Noise for Sleep

News Room 7 August 2025

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?