gr-linux-crypto, a universal cryptographic module for GNU Radio

I've built gr-linux-crypto, a universal cryptographic module for GNU Radio that interfaces directly with Linux kernel crypto APIs and hardware security modules.

Key features: - Universal design - provides crypto blocks for any GNU Radio flowgraph - Hardware acceleration via Linux kernel crypto API (AES-NI) - Nitrokey hardware security module support - Multiple algorithms: AES-128/256-GCM, ChaCha20-Poly1305, Brainpool ECC - Real-time performance: <12μs latency suitable for streaming applications

Security validation: - Validated against industry-standard security test vectors (Google Wycheproof) - 18.4+ billion fuzzing executions (AFL++ functional + LibFuzzer coverage) - zero crashes - Formal verification completed (CBMC - memory safety proven, 23/23 checks passed) - Side-channel analysis passed (dudect - constant-time verified) - Built on certified cryptographic libraries (OpenSSL, Python cryptography)

TESTING STATUS: - Extensively tested as standalone crypto library - GNU Radio block framework implemented - NOT yet tested with actual SDR hardware (USRP, HackRF, etc.) - Software simulation and unit tests only so far - Looking for community testing with real hardware

Designed for amateur radio, experimental, and research use.

Use cases could include amateur radio (M17 encrypted voice), IoT security, software-defined radio applications, or any real-time encrypted data streams.

The module wraps certified crypto libraries (OpenSSL, Python cryptography) while providing GNU Radio-native block interfaces. Not FIPS-140 certified itself, suitable for experimental and non-critical applications.

Looking for: - Security review and feedback on testing methodology - Testing with actual GNU Radio hardware setups - Feedback on block design and integration

GitHub: https://github.com/Supermagnum/gr-linux-crypto- Full Test Results: https://github.com/Supermagnum/gr-linux-crypto-/blob/master/tests/TEST_RESULTS.md

If you're interested in encrypted digital modes and have hardware to test with, I'd love your feedback!

submitted by /u/erilaz123
[link] [comments]

from hacking: security in practice https://ift.tt/z1HAf58

Comments