Core Viewpoint - The TETRA encryption standard, widely used for secure communication in various sectors, has been found to have vulnerabilities that could compromise sensitive data transmission [1][2][3]. Group 1: TETRA Standard Overview - TETRA, established by the European Telecommunications Standards Institute in 1995, includes four encryption algorithms (TEA1, TEA2, TEA3, TEA4) that can be selected based on user needs [2][3]. - The algorithms are designed to use an 80-bit key, which is considered secure, but the long-term secrecy of these algorithms has been compromised [2][3]. Group 2: Vulnerabilities Discovered - The Midnight Blue research team identified a "backdoor" in the TEA1 algorithm, allowing a key length reduction to 32 bits, which can be cracked in under a minute using a standard laptop [2][3]. - The vulnerabilities extend to an end-to-end encryption system endorsed by the European Telecommunications Standards Institute, which also has similar weaknesses [1][4]. Group 3: Implications for Users - Users of TETRA and its end-to-end encryption systems may be unaware of the vulnerabilities, potentially leading to significant security risks [1][5]. - The research indicates that the end-to-end encryption may allow manufacturers to choose key lengths, which could result in users receiving weaker security than expected [5].
国际无线电加密算法再现“后门”
Ke Ji Ri Bao·2025-08-14 00:02