We seek to understand and document all radio transmissions, legal and otherwise, as part of the radio listening hobby. We do not encourage any radio operations contrary to regulations. Always consult with the appropriate authorities if you have questions concerning what is permissible in your locale.

Author Topic: Exploring Weak Cipher Usage in Avionic Communications via ACARS  (Read 1453 times)

Offline skeezix

  • Global Moderator
  • Marconi Class DXer
  • *****
  • Posts: 5553
  • Minneapolis, MN
  • What does 'RNO stand for?
    • View Profile
http://fc17.ifca.ai/preproceedings/paper_17.pdf

Quote
Abstract.
Recent research has shown that a number of existing wireless avionic systems lack encryption and are thus vulnerable to eavesdropping and message injection attacks. The Aircraft Communications Addressing and Reporting System (ACARS) is no exception to this rule with 99% of the tra c being sent in plaintext. However, a small portion of the tra c coming mainly from privately-owned and government aircraft is encrypted, indicating a stronger requirement for security and privacy by those users. In this paper, we take a closer look at this protected communication and analyze the cryptographic solution being used. Our results show that the cipher used for this encryption is a mono-alphabetic substitution cipher, broken with little e↵ort. We assess the impact on privacy and security to its unassuming users by characterizing months of real-world data, decrypted by breaking the cipher and recovering the keys. Our results show that the decrypted data leaks privacy sensitive information including existence, intent and status of aircraft owners.
Minneapolis, MN

Fansome

  • Guest
Re: Exploring Weak Cipher Usage in Avionic Communications via ACARS
« Reply #1 on: June 28, 2017, 0657 UTC »
David Kahn's "The Code Breakers".

Offline sat_dxer

  • DX Legend
  • ******
  • Posts: 2333
    • View Profile
Re: Exploring Weak Cipher Usage in Avionic Communications via ACARS
« Reply #2 on: June 28, 2017, 1414 UTC »
"attacker who is passive with respect to the medium but actively decrypts messages...An attacker of this capability could achieve their aims for a relatively low
financial outlay...an attacker will be able to collect ACARS messages from aircraft...We consider a typical attacker...attacker would be able to deploy...attacker as defined in our threat model...which might be valuable to an attacker"

Written by computer swots with a public policy agenda
« Last Edit: June 28, 2017, 1501 UTC by sat_dxer »
Most times & frequencies posted are only an approximation.
Wishing the 1980's PopComm was still around.

Offline Pigmeat

  • Marconi Class DXer
  • ********
  • Posts: 6684
    • View Profile
Re: Exploring Weak Cipher Usage in Avionic Communications via ACARS
« Reply #3 on: June 29, 2017, 2106 UTC »
David Kahn's "The Code Breakers".

You can't cipher, but you can read? How did you get out of sixth grade and into CalTech? That rich Uncle of yours probably had something to do with it.

BTW, did he ever have that "long talk" with you?

 

HFUnderground Mug
HFUnderground Mug
by MitchellTimeDesigns