256-bitowe IV i sekwencja 0xD1E221E1

i56578-swl.blogspot.com 1 miesiąc temu

Just a fast note to observe that bitstreams utilizing (alleged) 256-bit Initialization Vectors (IV) encryption have the same 32-bit/4-byte series repeated 3 times. For example, in the bitstream in Figure 1 (MS-110A transmission) you can clearly see the 256-bit IV sequences, each repeated 8 times.

Fig. 1

But if you reshape the same bitstream into columns of 32 bits the same 32-bit series 0xD1E221E1 emerges (Figure 2).

Fig. 2

I have previously encountered bitstreams with 256-bit IVs [1] but at that time I had not investigated further, focusing only on those sequences. As a counter-proof, I took back and analyzed those signals and - surprise - they besides all present the same series 0xD1E221E1 after the IVs (Figure 3).

Fig. 3
It should besides be said that I have besides encountered the series 0xD1E221E1 3 times previously [2] but, erstwhile I re-analyzed those transmissions, the 256-bit IVs were not found (Figure 4).
Fig. 4

Both for the position of the 4-byte string 0xD1E221E1 (after or WITHOUT the alleged IVs) and for its presence in different streams it is hard to say whether it identifies a sync string for a cipher device or whether it identifies a peculiar datalink protocol. However, in all cases I could analyze, STANAG-4538 (3G-HF) "circuit mode service" is utilized along with MS-110A as the traffic waveform.
Comments and suggestions on this substance are welcome!

[1] https://i56578-swl.blogspot.com/2020/09/s-4538110a-transmissions-using-unid-256.html
[2] http://i56578-swl.blogspot.com/search/label/P%3D32

Idź do oryginalnego materiału