vulcan-cryptanalysis
vulcan-cryptanalysis
vulcan-cryptanalysis
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
known how vulnerable this cipher actually was. We strongly suspect that many<br />
other proprietary ciphers are similarly weak and we warn against their use.<br />
Third, we wish to assist budding cryptographers and reverse-engineers in<br />
learning the basic skills. Vulcan, being both simple and weak, offers an excellent<br />
learning opportunity for a beginning cryptographer. We believe that breaking<br />
a Vulcan-encrypted message would be a suitable homework assignment for<br />
students enrolled in an undergraduate cryptography course. Other suitable assignments<br />
might include investigating ways of making simple changes to Vulcan<br />
in order to improve its cryptographic strength.<br />
Fourth, we undertook this effort for sheer enjoyment. This project required<br />
us to learn many new skills and overcome many technical difficulties. Nothing<br />
beats the satisfaction gained from solving a giant puzzle. Nothing more<br />
thoroughly whets the appetite for knowledge than a secret.<br />
We imagine that Motorola would prefer that this paper did not exist, and<br />
we would not be surprised if they seek to remove it from the public eye, presumably<br />
under the feeble justification that our work threatens the security of<br />
their customers. No doubt the real reason they might object to our work is to<br />
avoid embarrassment resulting from the disclosure that DVP is far from secure.<br />
In spite of these imagined protests, we are completely confident that no harm<br />
will come to any end users for the simple reason that Vulcan and DVP are long<br />
obsolete and have not been used to protect sensitive communications in decades.<br />
For these same reasons, we are equally confident that no harm will be done to<br />
any active NSA signal intelligence efforts. Furthermore, we are confident that<br />
we have broken no laws in the course of our work, and we believe that this paper<br />
is both legally and technically legitimate.<br />
We want to make it perfectly clear that we do not wish to disparage Motorola<br />
with our comment that Vulcan is weak; quite the contrary, in its era DVP<br />
was revolutionary. We commend Motorola for developing the first digitally<br />
encrypted two-way radio available to non-military customers at a time when<br />
simple analog frequency inversion scrambling was considered “high tech”.<br />
Furthermore, we wish to allay any concerns that our revelations will in any<br />
way harm Motorola’s intellectual property. Had this paper been published in<br />
1976, such a concern would have been legitimate, but in 2014 the technology<br />
underlying Vulcan and DVP is not only long obsolete, but absolutely archaic.<br />
None of Motorola’s competitors have anything to gain, or even learn, from our<br />
disclosures.<br />
1.5 Technique<br />
We were surprised at how easy it was for us to learn the details of Vulcan.<br />
Although the Vulcan cipher is implemented in a custom CMOS integrated circuit,<br />
techniques for reverse-engineering ICs are well known. We do not know<br />
why the myth still persists that reverse-engineering hardware is more difficult<br />
than reverse-engineering software. We caution that secrets cannot be hidden in<br />
silicon or software; only a fool believes otherwise.<br />
5