mirror of
https://github.com/Kpa-clawbot/meshcore-analyzer.git
synced 2026-04-25 08:42:08 +00:00
Formal analysis of MeshCore's ECB encryption for channel and direct messages. Reviewed by djb and Dijkstra expert personas through 3 revisions. Key findings: - Block 0 has accidental nonce (4-byte timestamp) preventing repetition - Blocks 1+ are pure deterministic ECB with no nonce — vulnerable to frequency analysis for repeated message content - Partial final block attack: zero-padding reduces search space - HMAC key reuse: AES key is first 16 bytes of HMAC key (same material) - Recommended fix: switch to AES-128-CTR mode