Slide 22
Slide 22 text
Attacks on encryption - keystream
Keystream reuse may occur - precomputed table useful for
cracking:
Protocol attacks
P. 22 Security review of LoRaWAN networks - Digital Security
XOR of corresponding encrypted bytes Possibilities for plaintext ASCII digits
02 0 and 2, 1 and 3, 4 and 6, 5 and 7
03 0 and 3, 1 and 2, 4 and 7, 5 and 6
00 all pairs of equal digits
01 0 and 1, 2 and 3, 4 and 5, 6 and 7, 8 and 9
06 0 and 6, 1 and 7, 2 and 4, 3 and 5
07 0 and 7, 1 and 6, 2 and 5, 3 and 4
04 0 and 4, 1 and 5, 2 and 6, 3 and 7
05 0 and 5, 1 and 4, 2 and 7, 3 and 6
08 0 and 8, 1 and 9
09 0 and 9, 1 and 8
0b 2 and 9, 3 and 8
0c 4 and 8, 5 and 9
0a 2 and 8, 3 and 9
0f 6 and 9, 7 and 8
0d 4 and 9, 5 and 8
0e 6 and 8, 7 and 9