13.09.2014 Views

vulcan-cryptanalysis

vulcan-cryptanalysis

vulcan-cryptanalysis

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

known how vulnerable this cipher actually was. We strongly suspect that many<br />

other proprietary ciphers are similarly weak and we warn against their use.<br />

Third, we wish to assist budding cryptographers and reverse-engineers in<br />

learning the basic skills. Vulcan, being both simple and weak, offers an excellent<br />

learning opportunity for a beginning cryptographer. We believe that breaking<br />

a Vulcan-encrypted message would be a suitable homework assignment for<br />

students enrolled in an undergraduate cryptography course. Other suitable assignments<br />

might include investigating ways of making simple changes to Vulcan<br />

in order to improve its cryptographic strength.<br />

Fourth, we undertook this effort for sheer enjoyment. This project required<br />

us to learn many new skills and overcome many technical difficulties. Nothing<br />

beats the satisfaction gained from solving a giant puzzle. Nothing more<br />

thoroughly whets the appetite for knowledge than a secret.<br />

We imagine that Motorola would prefer that this paper did not exist, and<br />

we would not be surprised if they seek to remove it from the public eye, presumably<br />

under the feeble justification that our work threatens the security of<br />

their customers. No doubt the real reason they might object to our work is to<br />

avoid embarrassment resulting from the disclosure that DVP is far from secure.<br />

In spite of these imagined protests, we are completely confident that no harm<br />

will come to any end users for the simple reason that Vulcan and DVP are long<br />

obsolete and have not been used to protect sensitive communications in decades.<br />

For these same reasons, we are equally confident that no harm will be done to<br />

any active NSA signal intelligence efforts. Furthermore, we are confident that<br />

we have broken no laws in the course of our work, and we believe that this paper<br />

is both legally and technically legitimate.<br />

We want to make it perfectly clear that we do not wish to disparage Motorola<br />

with our comment that Vulcan is weak; quite the contrary, in its era DVP<br />

was revolutionary. We commend Motorola for developing the first digitally<br />

encrypted two-way radio available to non-military customers at a time when<br />

simple analog frequency inversion scrambling was considered “high tech”.<br />

Furthermore, we wish to allay any concerns that our revelations will in any<br />

way harm Motorola’s intellectual property. Had this paper been published in<br />

1976, such a concern would have been legitimate, but in 2014 the technology<br />

underlying Vulcan and DVP is not only long obsolete, but absolutely archaic.<br />

None of Motorola’s competitors have anything to gain, or even learn, from our<br />

disclosures.<br />

1.5 Technique<br />

We were surprised at how easy it was for us to learn the details of Vulcan.<br />

Although the Vulcan cipher is implemented in a custom CMOS integrated circuit,<br />

techniques for reverse-engineering ICs are well known. We do not know<br />

why the myth still persists that reverse-engineering hardware is more difficult<br />

than reverse-engineering software. We caution that secrets cannot be hidden in<br />

silicon or software; only a fool believes otherwise.<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!