One-Way Cryptography

  • Sandy Clark
  • Travis Goodspeed
  • Perry Metzger
  • Zachary Wasserman
  • Kevin Xu
  • Matt Blaze
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7114)

A (Perhaps Typical) One-Way Protocol

In a forthcoming paper [2], we examine the security of the APCO Project 25 (“P25”)[3] two-way digital voice radio system. P25 is a suite of digital protocols and standards designed for use in narrowband short-range (VHF and UHF) land-mobile wireless two-way communications systems. The system is used by law enforcement, national security, public safety, and other government users in the United States and several other countries.

Because two-way radio traffic is easily intercepted, P25 includes a number of security features, including encryption of voice and data under a variety of cipher algorithms and keying schemes. It is regarded as being sufficiently secure to carry highly sensitive traffic, including confidential law enforcement criminal surveillance operations and to support classified national security investigations, and is extensively used for these purpose by the various U.S. federal agencies that conduct such activities.

Keywords

Security Protocol Clear Mode USENIX Security Symposium Cipher Algorithm Voice Transmission 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Brostoff, S., Angela Sasse, M.: Safe and sound: a safety-critical approach to security. In: Proceedings of the 2001 Workshop on New Security Paradigms, NSPW 2001, pp. 41–50. ACM, New York (2001)Google Scholar
  2. 2.
    Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu, K., Blaze, M.: Why (Special Agent) Johnny (Still) Can’t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System. In: Proc. USENIX Security Symposium (2011)Google Scholar
  3. 3.
    Telecommunications Industry Association. Project 25-DataOverview-NewTechStandards. Technical Report TIA-102.BAEA-AGoogle Scholar
  4. 4.
    Whitten, A., Tygar, J.D.: Why Johnny Can’t Encrypt. In: Proceedings of the 8th USENIX Security Symposium (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Sandy Clark
    • 1
  • Travis Goodspeed
    • 1
  • Perry Metzger
    • 1
  • Zachary Wasserman
    • 1
  • Kevin Xu
    • 1
  • Matt Blaze
    • 1
  1. 1.University of PennsylvaniaPhiladelphiaUSA

Personalised recommendations