NATO Keys are distributed to every NATO member through distribution agencies. A good chunk of them (and the algorithms and cipher equipment) are produced by the US and shared (with some limitations) with NATO. I don't know the scope of algorithm sharing but I believe there are some limitations for NATO access to US-shared algorithms.
It's probably a case of 'nobody cares too much'. The standardization process is very long and the industry probably had already put them into their equipments.
ALE is not used that much and from what I can gather manual frequency establishment is often preferred. I'm not sure what the actual operational impact of this DoS would be, and if some spoofing is possible, but the actual communication is encrypted by different protocols depending on the type of comms (RATT, IP-like, Voice) so actually deciphering comms wouldn't be possible.
exe34|1 year ago
ahartmetz|1 year ago
pm3003|1 year ago
It's probably a case of 'nobody cares too much'. The standardization process is very long and the industry probably had already put them into their equipments.
ALE is not used that much and from what I can gather manual frequency establishment is often preferred. I'm not sure what the actual operational impact of this DoS would be, and if some spoofing is possible, but the actual communication is encrypted by different protocols depending on the type of comms (RATT, IP-like, Voice) so actually deciphering comms wouldn't be possible.
See Jerry Proc's website (https://jproc.ca/crypto/) for background knowledge.
Dalewyn|1 year ago
That is to say, if you want to crack NATO communiques your first step is to not call them up and ask for the goods.
Whether this is ethically good or not is tangential and an exercise left to each reader.