Iran GPS Spoofing and the RSA Cipher
John Young
cryptome at earthlink.net
Thu Dec 22 22:17:19 GMT 2011
The article source responds:
[Quote]
PRNG means Pseudo-Random Number Generator. Other sources that discuss
GPS say simply "RNG". Another way of being equally ambiguous would be to
call
it a "keystream."
Any cryptosystem can be used as a source PRNG. The PRNG for M-code GPS
is RSA, tell this cryptographer that. RSA is the RNG keystream, GPS data
is the
plaintext, and the M code signal is the ciphertext. To turn the M code
ciphertext
into GPS plaintext you need to replicate independently the same RNG sequence
used by the satellite to derive the GPS plaintext, to do this you use RSA
in either
symmetric or asymmetric mode (as per red-key or black-key M-code modes,
respectively).
[Unquote]
-----
At 09:04 PM 12/22/2011 +0000, you wrote:
>I do wish people would check their facts sometimes. The linked article
>asserts that "GPS (M-code) is protected against spoofing by the RSA
>cipher" - it is not, it's protected by a keyed PRNG. You don't have to
>be an ace cryptologist to figure this out, you just need to look up
>"GPS signal" on Wikipedia.
>
>
>On 22 Dec 2011, at 16:33, John Young wrote:
>
>> Iran GPS Spoofing and the RSA Cipher
>>
>>
>> http://cryptome.org/0005/iran-rsa-cipher.htm
>>
>>
>
More information about the ukcrypto
mailing list