Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking NATO Radio Encryption Through HALFLOOP-24 Algorithm Analysis

media.ccc.de via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a detailed security analysis presented at the 38C3 conference that reveals critical vulnerabilities in HALFLOOP-24, a military-grade encryption algorithm used by NATO and US forces for high-frequency radio communications. Learn about the fundamentals of symmetric key cryptography, high-frequency radio operations, and automatic link establishment protocols before diving into the technical specifics of how researchers discovered that just two hours of intercepted radio traffic is sufficient to compromise the encryption key. Understand how the downscaling of the Advanced Encryption Standard (AES) led to fatal flaws in HALFLOOP's tweak handling, enabling differential cryptanalysis attacks that can bypass significant portions of the encryption process. Examine the implications of these vulnerabilities, which not only compromise the confidentiality of ALE handshake messages but also enable efficient denial-of-service attacks, as documented in research papers "Breaking HALFLOOP-24" and "Destroying HALFLOOP-24."

Syllabus

38C3 - Breaking NATO Radio Encryption

Taught by

media.ccc.de

Reviews

Start your review of Breaking NATO Radio Encryption Through HALFLOOP-24 Algorithm Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.