Black Hat USA 2025 | 2 Cops 2 Broadcasting: TETRA End-To-End Under Scrutiny
Why It Matters
Compromised Tetra end‑to‑end encryption threatens the confidentiality of emergency and critical‑infrastructure communications, forcing agencies to reassess reliance on proprietary radio standards.
Key Takeaways
- •Tetra end‑to‑end encryption layer contains critical, exploitable flaws.
- •Researchers achieved arbitrary code execution on commercial radios via physical access.
- •Weak algorithm 0x87 reduces key entropy to 56 bits, enabling brute force.
- •Proprietary specifications and NDAs hinder security audits and public scrutiny.
- •Vulnerabilities could affect police, military, and critical infrastructure worldwide.
Summary
Midnight Blue, a Dutch cyber‑security consultancy, presented at Black Hat USA 2025 a deep dive into the end‑to‑end encryption layer of the Tetra terrestrial trunked radio standard. Tetra, widely adopted for police, military and SCADA communications, has long kept its cryptographic algorithms under NDA, but the team’s latest research lifts the veil on the most sensitive part of the protocol.
Building on their 2023 reverse‑engineering of the air‑interface cipher, the researchers uncovered a suite of new flaws: a back‑door TA1 cipher offering only 32‑bit security, a keystream‑recovery attack that breaks confidentiality, and, critically, an export‑grade algorithm (0x87) that collapses a 128‑bit traffic key to merely 56 bits of effective entropy. They also demonstrated arbitrary code execution on commercial radios using a previously disclosed firmware vulnerability, allowing full control and extraction of end‑to‑end keys in seconds.
The team highlighted how the secrecy surrounding Tetra’s specifications hampers security review. A 2003 internal TCCA document, inadvertently posted online, and a series of Chinese and Russian academic papers revealed that the same restricted material is already circulating in academia, despite NDAs. Their live demo showed malicious voice frames injected into an encrypted call, proving that an attacker can manipulate traffic without detection.
If exploited, these weaknesses could compromise mission‑critical communications for law‑enforcement, intelligence agencies and critical‑infrastructure operators across Europe, Latin America, the Middle East and South Asia. The findings pressure vendors and standards bodies to abandon proprietary, opaque cryptography in favor of transparent, auditable algorithms, and they underscore the urgency of deploying truly robust end‑to‑end protection.
Comments
Want to join the conversation?
Loading comments...