underfire
6th Apr 2017, 21:58
Interesting study for those who are interested!
"Abstract. Recent research has shown that a number of existing wireless avionic systems lack encryption and are thus vulnerable to eavesdropping
and message injection attacks. The Aircraft Communications Addressing and Reporting System (ACARS) is no exception to this rule with 99%
of the trac being sent in plaintext. However, a small portion of the trac coming mainly from privately-owned and government aircraft is
encrypted, indicating a stronger requirement for security and privacy by those users. In this paper, we take a closer look at this protected
communication and analyze the cryptographic solution being used. Our results show that the cipher used for this encryption is a mono-alphabetic
substitution cipher, broken with little effort. We assess the impact on privacy and security to its unassuming users by characterizing months
of real-world data, decrypted by breaking the cipher and recovering the keys. Our results show that the decrypted data leaks privacy sensitive
information including existence, intent and status of aircraft owners."
http://fc17.ifca.ai/preproceedings/paper_17.pdf
"Abstract. Recent research has shown that a number of existing wireless avionic systems lack encryption and are thus vulnerable to eavesdropping
and message injection attacks. The Aircraft Communications Addressing and Reporting System (ACARS) is no exception to this rule with 99%
of the trac being sent in plaintext. However, a small portion of the trac coming mainly from privately-owned and government aircraft is
encrypted, indicating a stronger requirement for security and privacy by those users. In this paper, we take a closer look at this protected
communication and analyze the cryptographic solution being used. Our results show that the cipher used for this encryption is a mono-alphabetic
substitution cipher, broken with little effort. We assess the impact on privacy and security to its unassuming users by characterizing months
of real-world data, decrypted by breaking the cipher and recovering the keys. Our results show that the decrypted data leaks privacy sensitive
information including existence, intent and status of aircraft owners."
http://fc17.ifca.ai/preproceedings/paper_17.pdf