Tech Tracker: Can Passive Radio Eavesdroppers Listen In On Your Company?

Any wireless device is a potential bug for 900-MHz band scanning.

Mike Fratto, Former Network Computing Editor

July 31, 2008

1 Min Read

DECT TO THE RESCUE?
Digital Enhanced Cordless Telephony phones may provide additional protection. DECT is a telecommunications standard develop by the European Telecommunications Standards Institute that standardizes communications protocols between handsets and base stations. In the United States, DECT uses a dedicated frequency band, 1,920 to1,930 MHz, which is well outside the unlicensed 2.4-GHz and 5.8-GHz spectrums.

DECT provides for better interference management and mobility in addition to security features, including authentication and encryption. The authentication component is used to pair a handset with a base station. For example, today's digital phones pair to base stations using a subaudio tone that identifies which signals the handset or base station should accept. If a signal that doesn't have the correct subaudio tone is received, the device won't listen. DECT takes this a huge step forward by specifying that two devices actually authenticate each other before establishing a communications channel. Optionally, the handset and base station can also encrypt communications (see diagram, p. 51).

DECT authentication and encryption algorithms are available to equipment manufacturers only after they agree not to publically disclose technical details. However, what cryptography experts like Bruce Schneier have told us, and experience with proprietary algorithms and poor implementations like WEP has demonstrated, is that getting cryptography right is hard, and hiding the algorithm provides no protection against reverse engineering.

DECT's authentication and encryption implementations may stop some eavesdropping, but we wouldn't recommend them in situations where secure communications are needed until the implementation details have been analyzed by experienced cryptographers and the cryptographic mechanisms are proven strong.

Read more about:

20082008

About the Author(s)

Mike Fratto

Former Network Computing Editor

Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics and executive editor for Secure Enterprise. He has spoken at several conferences including Interop, MISTI, the Internet Security Conference, as well as to local groups. He served as the chair for Interop's datacenter and storage tracks. He also teaches a network security graduate course at Syracuse University. Prior to Network Computing, Mike was an independent consultant.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights