|
|
|
|
ETSI TETRA TAA TEA1 →
The TEA algorithms are used for the encryption of voice and data
traffic on a TETRA radio network. Each TEA is a stream cipher and uses
an 80-bit key, although the key of TEA1 is internally reduced to 32 bits.
In addition, the
TETRA Authentication Algorithm (TAA) is used for authentication, key derivation and OTAR.
The TAA and TEA algorithms are secret and have never been submitted
for peer-review or in-depth security analysis.
|
-
Not to be confused with Tiny Encryption Algorithm.
➤ Wikipedia
|
In July 2023, Dutch cyber security firm
Midnight Blue revealed that it had
managed to extract, isolate, reconstruct and analyse the TAA, TEA1,
TEA2 and TEA3 algorithms from a working TETRA radio as part of
its RE:TETRA and
TETRA:BURST research projects.
Five vulnerabilities were found, two of which were deemed
critical [2].
The project allows us to take a closer look at the ciphers.
The diagrams below show the structures of the known TEA1, TEA2 and
TEA3 stream ciphers, each of which takes an 80-bit key. They are shown
here without further comments, so that they can be compared more easily.
For a detailed description, click the relevant diagram or read [3].
|
|
|
Any links shown in red are currently unavailable.
If you like the information on this website, why not make a donation?
© Crypto Museum. Created: Wednesday 09 August 2023. Last changed: Saturday, 12 August 2023 - 14:16 CET.
|
|
|
|
|