Conference item
Economy class crypto: Exploring weak cipher usage in avionic communications via ACARS
- Abstract:
- Recent research has shown that a number of existing wireless avionic systems lack encryption and are thus vulnerable to eavesdropping and message injection attacks. The Aircraft Communications Addressing and Reporting System (ACARS) is no exception to this rule with 99% of the traffic being sent in plaintext. However, a small portion of the traffic coming mainly from privately-owned and government aircraft is encrypted, indicating a stronger requirement for security and privacy by those users. In this paper, we take a closer look at this protected communication and analyze the cryptographic solution being used. Our results show that the cipher used for this encryption is a mono-alphabetic substitution cipher, broken with little effort. We assess the impact on privacy and security to its unassuming users by characterizing months of real-world data, decrypted by breaking the cipher and recovering the keys. Our results show that the decrypted data leaks privacy sensitive information including existence, intent and status of aircraft owners.
- Publication status:
- Published
- Peer review status:
- Reviewed (other)
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, pdf, 2.1MB, Terms of use)
-
- Publisher copy:
- 10.1007/978-3-319-70972-7_15
Authors
- Publisher:
- Springer
- Host title:
- International Conference on Financial Cryptography and Data Security: Financial Cryptography and Data Security
- Journal:
- International Conference on Financial Cryptography and Data Security 2017 More from this journal
- Volume:
- 10322
- Pages:
- 285-301
- Series:
- Lecture Notes in Computer Science
- Publication date:
- 2017-12-23
- Acceptance date:
- 2017-01-13
- DOI:
- ISBN:
- 9783319709727
- Pubs id:
-
pubs:691375
- UUID:
-
uuid:e661ea1a-d4d1-42ea-bf17-129663174d72
- Local pid:
-
pubs:691375
- Source identifiers:
-
691375
- Deposit date:
-
2017-04-27
Terms of use
- Copyright holder:
- International Financial Cryptography Association
- Copyright date:
- 2017
- Notes:
- © International Financial Cryptography Association 2017. This is the accepted manuscript version of the article. The final version is available online from Springer at: https://doi.org/10.1007/978-3-319-70972-7_15. This paper was presented at the 21st International Conference on Financial Cryptography and Data Security: Financial Cryptography and Data Security, 3-7 April 2017, Sliema, Malta
If you are the owner of this record, you can report an update to it here: Report update to this record