I dont, simply because they havent published them for peer-review and
they have made poor crypto before. But I just want to hear a quick
opinion from the newsgroups most regular and respected contributors. :)
--
My computer security & privacy related homepage
http://www.markusjansson.net
Use HushTools or GnuPG/PGP to encrypt any email
before sending it to me to protect our privacy.
With no information to go on, there is no reason to
consider them secure, nor to be certain that they are
insecure. Going purely by historical statistics, one
would a priori assume a system is vulnerable, and the
burden of proof to the contrary would rest with its
promoters.
>I dont, simply because they havent published them for peer-review
Well, in that case, I don't know what they are, so I wouldn't be able to
tell you if they are secure or not.
John Savard
http://home.ecn.ab.ca/~jsavard/index.html
I haven't seen the Tetra algorithms, which means
I'm allowed to comment on them... and please bear
in mind that these are personal comments, not in
any sense on behalf of my employer.
Based on its age and provenance, I would expect
that the TETRA algorithms are multiple-LFSR
nonlinear filter algorithms. The were designed
well before the current algebraic attacks
(Courtois, Armknecht(?sp), Pieprzyk, etc.) and I
think they have a high chance of being
academically broken by this kind of attack.
That said, TETRA restarts the stream frequently,
and unless there's something wrong with its
initialization (possible but unlikely), you'll
never get the data you need to do the
cryptanalysis. So it's probably secure in
practice. But it might not be.
In any case, if you want to send stuff securely
through it, application-layer security (like TLS)
is the only way to go, in any of these systems.
Greg.
--
Greg Rose
232B EC8F 44C6 C853 D68F E107 E6BF CD2F 1081 A37C
Qualcomm Australia: http://www.qualcomm.com.au