WAR10CK's Fr33w0rld

Guild of Technomancers Nirn Cellular Network and DarkPhone.

Description of a mobile network and Crypto Phone

Black Horse Courier
Cyberpunks deploy Tamriel’s first cellular network!
More secure then Earth’s they claim!

The Guild of Technomancers has done it again. We heard their announcement in their Skyrim Branch that they have created the empire’s very first cellular based telecommunications network. This complex mesh net of tower arrays enables long distance communications for text, voice, and data based transmissions. The additional invention of the mobile smartphone has streamlined this system into the mainstream populations.

Now anyone can use the network for all their communication needs.

However one of the primary features is the security of the system.

“The Imperial Celluar Network operates in cipherspace. It uses multiple advanced cryptographic techniques implimented into the most secure encryption algorithms used for networks like this. It will use Off The Record (OTR) encryption to ensure perfect forward secrecy for all connections. All transmissions are End to End encrypted with a 256 bit keystream based cipher. You can download and examine the algorithm specifications and source code in full yourself on the Cryptoanarchy Wiki.

We are also using a special algorithm to randomize the route each call takes to its destination. This should be able to further enhance the system for anonymous and secure communication. It is a special Sphinx Onion Routing Protocol optimised and written specifically for this purpose. The full specs and source are also available for download for on the cryptoanarchy wiki. We provide all the specs and sources for all of our programs for peer review and security purposes. By allowing the security community to examine our stuff we can be sure that it is truely secure." said Crash Override of the Technomancers.

It allows for 3G and 4G connections as the standard connection. The network and service relies on crowd funding, volunteer work, and pay as you go plans to keep running. There are no contracts to sign and all phones are unlocked by default. The Guild of Technomancers said that they would never have subscribers fees or service fees and that the crowd funding along with the Imperial Tax money they are getting to fund this system it is not needed.

Most mobile devices will use the HearthStone Mobile OS which is a Security Enhanced Android OS that comes rooted by default.

“However we will include multiple applications and documentation that will make the Superuser access permission very user friendly to manage. These along with an Open Source Security Suite called SecuriMeow optimised for mobile.

For the Standard Tamriel Cellular Crypto we have decided on the follwing algorithms:
Dragon Stream Cipher with 256 bit keystreams and IVs
Dragon-MAC for efficant call authentication
This encryption will be enforced to be used in all voice, sms, and video calls.

Dragon-MAC is a Message Authentication Code based off of the Dragon Stream Cipher. It was originally designed for sensor networks so with its very small size it should be effortless to implement into the Network Architecture. This will be used to verify that the two ends of a call are valid.
Dragon is a Word Based Stream Cipher developed by the Nirn Crypto Munitions Bureau Skyrim Branch and it made it to the final round of selections for the Skyrim eSTREAM Portfolio but was ultimately not selected. However it is easy to implement in hardware so we can use it in the architecture of the new TCMB Secure Baseband Processor.

We have also decided to have this End-to-End encryption enforced in all cellular architecture with towers and all. There shall be no way to turn it off.

As for baseband level exploits, the newly developed TCMB Secure Baseband Processor with have the following features:
Dragon Cipher and the Dragon-MAC built into the chip itself.
Electronic TEMPEST Shielding will cover the entire die.
The Baseband OS will have tightly enforced Restricted Access to the device hardware with access to nothing except the components required for cellular communications.
The new hardware Baseband Firewall will alert and automatically block any suspicious traffic.

To protect the phone itself we will use the following measures:
An external SDmicro Card sized HSM will provide an air gapped TCMB-FIPS Tamper Proof Secure Cryptoprocessor for much more secure cryptographic operations.
The Spaces Software will provide secure compartmentalization by creating virtual “devices” in the same phone which are completely isolated from each other.
A built in Tamper Proof Secure Cryptoprocessor with encrypted and secure hardware key storage IO will ensure that electronic probing will not leak information.
TEMPEST Shielding will prevent electronic emissions but there will be gaps for the wifi and antenna.
An EFS will be used to store all information on the device.
The device will have 128 GB of internal memory.
The HearthStone Android OS will be the default. But measures have been taken to ensure that it remains secure even if it is rooted.
The processor is 8 cores and security enhanced with built in encryption hardware.
The device will be able to withstand even the heavyist abuse and is totally waterproof.
Any attempts to extract encryption keys will cause them to self-destruct.
Passcode Lock will use a scrambling keypad.
Pattern Lock will use an scrypt salted hash for the key and will be large.
Password Lock will use a secure keyboard.
All screen locks will use an scrypt salted hash for the key.
Full Disk Encryption will be enforced in all devices with no key recovery features to ensure cryptographic deniability.
____________________________________

The Annual NordSec Conference in Skyrim is a Cyber Security and Hacking Conference run by Nord Technomancers. Many people attend each year from all the provinces. But Nords make up the majority of all the attendees.

Currently Darken Rahl has a presentation on Securing and Authenticating Cellular Communications which will be the main focus during this one. Mobile Phone Security is a major concern among many of the people of Tamriel. With the introduction of Baseband Interceptors by the Guild of Technomancers and the recent discovery of their use the following things are being covered in a series of presentations by different people:

Cryptographic Security
Authentication of Communications
Baseband Level Security
Hardware and Software Security
Secure Deployment of Mobile Applications
Secure Operating Systems

Darken Rahl will be presenting the current standard of Mobile Phone Encryption, the Dragon Stream Cipher used in all Mobile Devices by default. The Dragon Stream Cipher can use 128 bit and 256 Keystreams and IVs but not interchangeably. The latest work from the Nirn Crypto Munitions Bureau includes the Dragon-MAC algorithm which can be used to Authenticate Calls, Messages, and Data Connections. This should tackle the problem with the current exploits with spoofing and altering the communications in transit.

Dragon is Word Based Stream Cipher which was developed by the Guild of Technomancers TCMB Branch in Skyrim and submitted to the eSTREAM Portfolio being compiled in Hammerfell. It reached the final round of selections but ultimately did not make the cut. But that did not stop them from implementing it into the Skyrim Cellular Networks during the Civil War which prevented the Thelmor from spying on it. However the other provinces have not switched to this more secure cipher. The RC4 Cipher is still prominently used in most Cellular Networks and it has been broken many times.

The Nord known as Bolrholf Axeblade has been working on a Secure Baseband Processor with an embedded Secure Cryptographic Module. It contains the following security features:

Hardware Embedded Baseband Firewall
Tamper Proof Construction
Compartmentalized Baseband OS with RESTRICTED ACCESS to the phone software and hardware.
SCM >> Built In Hardware Khaos CSPRNG
SCM >> Hardware Embedded Dragon and Dragon-MAC Algorithms
SCM >> Tamper Proof Key Storage Memory
SCM >> Automatic Key Zeroization AKA Self-Destruction
SCM >> Electronic Shielding

He calls it the Dragon Secure Baseband Processor.

By placing a Secure Cryptographic Module in the Baseband Processor this would ensure that the encryption is enforced at the hardware level and cannot be disabled by any interceptor. Also by ensuring the Baseband OS is restricted in what it can access and not access this ensures that it cannot be exploited.

The first devices that will use this new Chip is the Telecomix Nirn DarkPhone. The DarkPhone is a Crypto Phone which uses a highly secure operating system.
______________________________

Post from the CipherCat Wiki Forum >>

Topic: Cellular Network Security Plan
By: Eric Bloodaxe

For the Standard Tamriel Cellular Crypto we have decided on the following algorithms:
Dragon Stream Cipher with 256 bit keystream and IVs
Dragon-MAC for efficient call authentication
This encryption will be enforced to be used in all voice, SMS, and video calls.

Dragon-MAC is a Message Authentication Code based off of the Dragon Stream Cipher. It was originally designed for sensor networks so with its very small size it should be effortless to implement into the Network Architecture. This will be used to verify that the two ends of a call are valid.

Dragon is Word Based Stream Cipher developed by the Nirn Crypto Munitions Bureau Skyrim Branch and it made it to the final round of selections for the eSTREAM Portfolio but was ultimately not selected. However it is easy to implement in hardware in the architecture of the new TCMB Secure Baseband Processor.

We have also decided to have this End-to-End Encryption to be enforced in all cellular architecture with towers and all. There shall be no way to turn it off.

As for baseband level exploits, the newly developed TCMB Dragon Secure Baseband Processor will be used in all DarkPhone Devices. This secure chip includes the following security measures:
1. Hardware Embedded Baseband Firewall which will alert the user of and automatically block all suspicious traffic.
2. Electronic TEMPEST Shielding will cover the entire chip die.
3. The Baseband OS will be compartmentalized with tightly enforced RESTRICTED ACCESS to the phone software and hardware. No components that are not required for cellular communications will allow the Baseband OS to access them.
SCM stands for Secure Cryptographic Module
4. SCM >> Built In Hardware Khaos CSPRNG (Crypto-Secure Pseudo-Random Number Generator)
5. SCM >> Hardware Embedded Dragon and Dragon-MAC Algorithms
6. SCM >> Tamper Proof Key Storage Memory
8. SCM >> Automatic Key Zeroization AKA Self-Destruction

For the DarkPhone device security itself we will use the following measures:
1. An external microSD Card sized HSM (Hardware Security Module) will provide an air gapped TCMB-FIPS Tamper Proof Secure Cryptoprocessor for much more secure cryptographic operations.
2. The Spaces Software will provide secure compartmentalization by creating multiple virtual “Devices” in the same phone that are completely isolated from each other.
3. A built in Tamper Proof Secure Cryptoprocessor with encrypted IO paths and secure hardware key storage will ensure that electronic probing will not leak information. This will be a custom Fabricated ASIC.
4. TEMPEST Shielding will prevent electronic emissions but there will be gaps for the WiFi and antenna.
5. An EFS (Encrypted File System) will be used to store all information on the device.
6. The device will have 128 GB of internal memory.
7. An additional microSD Card slot which can hold up to 1 TB or more expanded memory. NOTE: any card used for this device will also have an Encrypted File System automatically installed onto it by the Secure Crypto Processor. No other device will be able to read its contents without first decrypting the whole EFS.
8. The HearthStone Android OS will be the default but measures have been taken to ensure that the device remains secure even it is rooted.
8a. Such as the Secure Crypto Processor which cannot be bypassed or disabled by any software.
8b. The TCMB Dragon Secure Baseband Processor which is impossible to subvert due to the fact that it contains its own built in Secure Crypto Module.
8c. The SecuriMeow Android Root Manager.
8d. Universal Compatibility for all Android Roms and Distros. Any OS on the device can fully use its cryptographic security.
9. The processor will have 8 cores and be security enhanced with built in encryption hardware.
10. The device will be able to stand even the heaviest abuse and is totally waterproof.
11. Any attempts to extract the encryption keys will cause them to self-destruct.
12. The Passcode Lock will use a scrambling keypad.
13. The Pattern Lock will be large and complex.
14. The Password Lock will use a secure keyboard.
15. All screen locks will use an scrypt salted SHA3-256 hash for the key.
16. Full Disk Encryption will be enforced in all devices with no key recovery features to ensure cryptographic deniability.
17. All Firmware and Driver Software used on the DarkPhone is Open Source. As for the propriatary parts we could not release, Well let’s just say that a dozen swords pointed at the throat followed by a little pressure will do wonders to help convince a person to be quite reasonable.

The EFS Cryptographic Algorithms are as follows:
1. Threefish-1024-XTS
2. Khufu/Khafre-512-XTS
3. Blowfish-448-XTS
4. AES-256-XTS
5. Anubis-256-XTS >> Enabled by Default.
6. LOKI97-256-XTS
7. Serpent-256-XTS
8. Khazad-128-XTS >> Enabled by Default.
9. Lucifer-128-XTS
10. Twofish-256-XTS
Options to run the algorithms in Native Code (NC) Modes or Platfrom Independent Modes are available. NC Modes is enabled by default.

XTS CBC-ESSIV CBC

We have found a destributer for the DarkPhone. A Cyberpunk Employee Owned company called DataDyne. Their Cypherpunk sister company Ciphernetics Technologies has agreed to Manufacture, Market, and sell the DarkPhone.

Msg>>[DragonBBP]Key]>>Cipher>>{CellTower}>>Cipher>>[DragonBBP]Key]>>Msg

Comments

The_WAR10CK

I'm sorry, but we no longer support this web browser. Please upgrade your browser or install Chrome or Firefox to enjoy the full functionality of this site.