Högskolan i Skövde

his.sePublications
Change search
Link to record
Permanent link

Direct link
Dansarie, Marcus, doktorandORCID iD iconorcid.org/0000-0001-9246-0263
Alternative names
Publications (9 of 9) Show all publications
Dansarie, M., Andersson, K. E. & Silfverskiöld, S. (2025). Crowd Assessment of the Military Utility of Future Technologies. Scandinavian Journal of Military Studies, 8(1), 200-219
Open this publication in new window or tab >>Crowd Assessment of the Military Utility of Future Technologies
2025 (English)In: Scandinavian Journal of Military Studies, E-ISSN 2596-3856, Vol. 8, no 1, p. 200-219Article in journal (Refereed) Published
Abstract [en]

Effective development of military capability in peacetime requires the ability to predict the implications of future technologies. To this end, technology forecasting is greatly important. This study adopts a design science approach to explore whether crowdsourcing and the anonymous, asynchronous involvement of experts through a web-based application could enhance the validity of an already-established method for military utility assessment of future technologies (MUAFT). A dedicated application was developed, designed to facilitate the development of assessments by engaging online participants. The modified method, consisting of the application and updated procedures, is demonstrated to effectively support asynchronous assessments while preserving the anonymity of participants. The modifications are thus likely to leverage the possibilities of crowdsourcing and to increase the overall validity of the method. While the demonstrated method shows promise, several areas for improvement have been identified, particularly regarding the application’s usability. To comprehensively evaluate the method’s validity and reliability, real-world assessments of future technologies involving large and diverse groups of experts and students are recommended.

Place, publisher, year, edition, pages
Scandinavian Military Studies, 2025
Keywords
technology forecast, MUAFT, military utility, crowd forecasting, Delphi method, capability development
National Category
War, Crisis, and Security Studies
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-25162 (URN)10.31374/sjms.339 (DOI)2-s2.0-105007037589 (Scopus ID)
Funder
Swedish Armed Forces
Note

CC BY 4.0

CORRESPONDING AUTHOR: Kent Erik Andersson, Department of Systems Science for Defence and Security, Swedish Defence University, SE. kent.andersson@fhs.se

This research received grants from the Swedish Armed Forces.

Available from: 2025-05-22 Created: 2025-05-22 Last updated: 2025-09-29Bibliographically approved
Dansarie, M. & Nohlberg, M. (2025). User adoption of TETRA mobile radio communication networks: an information security perspective. Information and Computer Security, 33(5), 766-784
Open this publication in new window or tab >>User adoption of TETRA mobile radio communication networks: an information security perspective
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, no 5, p. 766-784Article in journal (Refereed) Published
Abstract [en]

Purpose – Digital mobile radio communication networks are used for coordinating operations in manyimportant sectors, including critical infrastructures and large industries. Despite this, there is a dearth ofknowledge about how their information security is managed. The most commonly used standard for suchnetworks is TETRA. Given the critical role of TETRA networks, this study aims to clarify how they are used,how their users manage information security and the implications of vulnerabilities in the standard.

Design/methodology/approach – The study is based on semi-structured interviews with representativesfrom 11 organizations in Sweden that own and operate TETRA networks, representing 32% of registered usersin the country and a wide range of users and applications. Thematic analysis was used to analyze the data.

Findings – Management of TETRA networks is generally outsourced, leaving TETRA network owners withscant knowledge of the state of security in their networks. Although organizations have high demands onavailability and integrity, the use of encryption and authentication is rare. Instead, users generally rely on theprotocol’s complexity and obscurity for security. Because organizations’ core operations are often dependenton functioning TETRA networks, attacks can have severe consequences.

Originality/value – Previous research on security in digital mobile radio communication networks hasfocused on technical vulnerabilities in standards. This study is the first, to the best of the authors’ knowledge,to investigate users’ approaches to information security, the potential consequences of attacks and theimplications of known security issues in this context.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
Keywords
Digital mobile radio communication networks, TETRA, Information security
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-25198 (URN)10.1108/ics-12-2024-0318 (DOI)001500100900001 ()2-s2.0-105007982813 (Scopus ID)
Note

CC BY 4.0

Received: December 03 2024 | Revision Received: March 21 2025 | Accepted: April 30 2025

Corresponding author: Marcus Dansarie can be contacted at: marcus.dansarie@fhs.se

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2025-10-27Bibliographically approved
Dansarie, M. (2024). Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review. IEEE Access, 12, 91101-91126
Open this publication in new window or tab >>Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 91101-91126Article, review/survey (Refereed) Published
Abstract [en]

For applications where general-purpose communication systems, such as mobile telephony, do not satisfy user requirements, special-purpose digital wireless communication standards have been developed. Since these systems often support critical infrastructures, security issues can have far-reaching consequences. To study the extent of research on security issues in specialized communication standards, a systematic literature review was performed, using snowballing to maximize coverage. The found publications cover security issues in radio communication systems for three major areas: civil transportation, public safety and security, and telephony and satellite communication systems. The main results from the included publications are summarized. This is followed by an analysis that presents five common themes among the security issues: lack of encryption, lack of authentication, broken encryption, protocol vulnerabilities, and implementation vulnerabilities. Research tools and methods used across the different technology fields are systematized, showing that software-defined radio and open-source software appear to be enablers of research on the communication standards covered by the review. The systematization also reveals that the application of research methods to different standards is spotty. Finally, numerous open research directions are pointed out, including the need for more holistic research that goes beyond just finding technical flaws in single standards.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Critical infrastructure, cybersecurity, radio communication systems, security, standards, systematic review.
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-24218 (URN)10.1109/access.2024.3420091 (DOI)001263417100001 ()2-s2.0-85197047158 (Scopus ID)
Note

CC BY-NC-ND 4.0

Available from: 2024-07-05 Created: 2024-07-05 Last updated: 2025-09-29Bibliographically approved
Ávila Zúñiga Nordfjeld, A., Dansarie, M., Liwång, H., Dalaklis, D. & Mejia, M. Q. (2023). Proposing a Mathematical Dynamic Model to Develop a National Maritime Security Assessment and Build a National Maritime Security Plan. Journal of Maritime Research, 20(3), 123-132
Open this publication in new window or tab >>Proposing a Mathematical Dynamic Model to Develop a National Maritime Security Assessment and Build a National Maritime Security Plan
Show others...
2023 (English)In: Journal of Maritime Research, ISSN 1697-4840, E-ISSN 1697-9133, Vol. 20, no 3, p. 123-132Article in journal (Refereed) Published
Abstract [en]

A proper assessment of maritime security risks at the national level is crucial to a national maritime security plan (NMSP) in order to secure the concerned country’s ports, vessels and territorial sea. Thus, the importance of implementing a national maritime security assessment (NMSA) to counter security threats and ensure the continuity of national and international trade. The most important set of international regulations concerning maritime security is the International Ship and Port Facility Security (ISPS) Code, which includes revision, approval and control of compliance of the Port Facility Security Plan (PFSP), which shall be based upon the Port Facility Security Assessment (PFSA). This paper proposes a mathematical dynamic model that calculates in real time the residual risk for the whole country and each of its ports by adapting and expanding the formula and procedures established in the Code, which since it has already been implemented around the world, gives the opportunity to take advantage of this quantitative solution to administrate maritime security risks on a nation-wide basis and create an effective national maritime security plan, which would allow the concerned authorities to improve situational awareness and adapt to security changes through a better planning of human, economic and material resources to deter security threats. The model was tested with the use of five encoded categories as countries, each of them with three ports, which encompassed three port facilities. The results indicate that this methodology is easy to implement and widespread use of that model could strength robustness in national security.

Place, publisher, year, edition, pages
Universidad de Cantabria, 2023
Keywords
International Ship and Port Facility Security (ISPS) Code, maritime & port security, National Maritime Security Assessment (NMSA), National Maritime Security Plan (NMSP), national security
National Category
Transport Systems and Logistics Other Legal Research Criminology Other Geographic Studies
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-23548 (URN)2-s2.0-85181911962 (Scopus ID)
Note

© SEECMAR | All rights reserved

Correspondence Address: A. Ávila-Zúñiga-nordfjeld; Swedish Defence University, Department of Systems Science for Defence and Security, Stockholm, Sweden; email: Adriana.Nordfjeld@fhs.se

Available from: 2024-01-19 Created: 2024-01-19 Last updated: 2025-09-29Bibliographically approved
Dansarie, M., Derbez, P., Leander, G. & Stennes, L. (2022). Breaking HALFLOOP-24. Paper presented at Fast Software Encryption (FSE) 2023, Beijing, China, March 20-24, 2023. IACR Transactions on Symmetric Cryptology (3), 217-238
Open this publication in new window or tab >>Breaking HALFLOOP-24
2022 (English)In: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, no 3, p. 217-238Article in journal (Refereed) Published
Abstract [en]

HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We present the first public cryptanalysis of HALFLOOP-24 and show that HALFLOOP-24, despite its key size of 128 bits, is far from providing 128 bit security. More precisely, we give attacks for ciphertext-only, known-plaintext, chosen-plaintext and chosen-ciphertext scenarios. In terms of their complexities, most of them can be considered practical. However, in the real world, the amount of available data is too low for our attacks to work. Our strongest attack, a boomerang key-recovery, finds the first round key with less than 210 encryption and decryption queries. In conclusion, we strongly advise against using HALFLOOP-24.

Place, publisher, year, edition, pages
Bochum: Ruhr-Universität Bochum, 2022
Keywords
HF Radio, ALE, HALFLOOP, Boomerang
National Category
Other Mathematics
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-21813 (URN)10.46586/tosc.v2022.i3.217-238 (DOI)000869410400008 ()2-s2.0-85137670245 (Scopus ID)
Conference
Fast Software Encryption (FSE) 2023, Beijing, China, March 20-24, 2023
Funder
German Research Foundation (DFG), EXC 2092 CASA - 390781972
Note

CC BY 4.0

This work was funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy - EXC 2092 CASA - 390781972.

Available from: 2022-09-13 Created: 2022-09-13 Last updated: 2025-09-29Bibliographically approved
Dansarie, M. (2021). Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment. IACR Transactions on Symmetric Cryptology, 2021(3), 36-53
Open this publication in new window or tab >>Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment
2021 (English)In: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2021, no 3, p. 36-53Article in journal (Refereed) Published
Abstract [en]

The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.

Place, publisher, year, edition, pages
Ruhr University Bochum, 2021
Keywords
automatic link establishment, ALE, SoDark, cryptanalysis, block cipher
National Category
Other Mathematics
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-20578 (URN)10.46586/tosc.v2021.i3.36-53 (DOI)000700710300002 ()2-s2.0-85119900230 (Scopus ID)
Note

CC BY 4.0

Available from: 2021-09-20 Created: 2021-09-20 Last updated: 2025-09-29
Dansarie, M. (2021). sboxgates: A program for finding low gate count implementations of S-boxes. Journal of Open Source Software, 6(62), 1-3, Article ID 2946.
Open this publication in new window or tab >>sboxgates: A program for finding low gate count implementations of S-boxes
2021 (English)In: Journal of Open Source Software, E-ISSN 2475-9066, Vol. 6, no 62, p. 1-3, article id 2946Article in journal (Refereed) Published
Abstract [en]

S-boxes are often the only nonlinear components in modern block ciphers. They are commonly selected to comply with very specific criteria in order to make a cipher secure against, for example, linear and differential attacks. An M x N S-box can be thought of as a lookup table that relates an M-bit input value to an N-bit output value, or as a set of N boolean functions of M variables (Schneier, 1996).

Although cipher specifications generally describe S-boxes using their lookup tables, they can also be described as boolean functions or logic gate circuits. sboxgates, which is presented here, finds equivalent logic gate circuits for S-boxes, given their lookup table specification. Generated circuits are output in a human-readable XML format. The software can convert the output files into C or CUDA (a parallel computing platform for Nvidia GPUs) source code. The generated circuits can also be converted to the DOT graph description language for visualization with Graphviz (Ellson et al., 2002).

Place, publisher, year, edition, pages
Open Journals, 2021
National Category
Computational Mathematics
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-19851 (URN)10.21105/joss.02946 (DOI)
Note

CC BY 4.0

Available from: 2021-06-16 Created: 2021-06-16 Last updated: 2025-09-29Bibliographically approved
Fox Franke, D., Sibold, D., Teichel, K., Dansarie, M. & Sundblad, R. (2020). Network Time Security for the Network Time Protocol. IETF RFC editor: Internet Engineering Task Force
Open this publication in new window or tab >>Network Time Security for the Network Time Protocol
Show others...
2020 (English)Report (Refereed)
Abstract [en]

This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).

NTS is structured as a suite of two loosely coupled sub-protocols. The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTS Extension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.

Place, publisher, year, edition, pages
IETF RFC editor: Internet Engineering Task Force, 2020. p. 33
Series
Request for comments, ISSN 2070-1721 ; 8915
National Category
Computer Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-19571 (URN)10.17487/RFC8915 (DOI)
Note

Category: Standards Track

Published: September 2020 

Available from: 2021-03-31 Created: 2021-03-31 Last updated: 2025-09-29Bibliographically approved
Dansarie, M. (2020). Teknisk utveckling och hybridkrigföring. Kungl Krigsvetenskapsakademiens Handlingar och Tidskrift (1), 162-165
Open this publication in new window or tab >>Teknisk utveckling och hybridkrigföring
2020 (Swedish)In: Kungl Krigsvetenskapsakademiens Handlingar och Tidskrift, ISSN 0023-5369, no 1, p. 162-165Article in journal (Other academic) Published
Place, publisher, year, edition, pages
Stockholm: Kungl Krigsvetenskapsakademien, 2020
National Category
Other Engineering and Technologies
Identifiers
urn:nbn:se:his:diva-19572 (URN)
Available from: 2021-03-31 Created: 2021-03-31 Last updated: 2025-09-29Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9246-0263

Search in DiVA

Show all publications