How It Works
1. User Setup
- Connect the HID keyboard.
- Input the custom SHA-256 interruption vector (not stored, only used in RAM).
- Configure the destination IP and port of the target device.
2. Sending a Message
- The system encrypts the message using SHA-256 hashing with the user-defined vector.
- The encrypted message is sent via Ethernet using the W5500 module.
3. Receiving & Decryption
- The recipient device receives the encrypted message.
- If the same interruption vector is manually entered, the message is decrypted successfully.
- If the incorrect vector is used, the message remains unreadable.
Why is it Impossible to Decrypt?
- No stored encryption keys: Each session requires a manually entered vector, meaning even if a device is captured, past messages cannot be retrieved.
- Custom communication protocol: Without knowing the exact system architecture, attackers cannot decipher the encryption method or data structure.
- SHA-256 strength: Even with brute force, SHA-256 remains computationally infeasible to break.
Conclusion
This project is perfect for individuals or organizations needing absolute privacy in communications. Whether for personal security, journalistic protection, or sensitive military applications, our STM32F103-based system ensures that messages remain confidential and beyond the reach of any third-party eavesdropping.
rmingon
Richard Myers
Bertrand Selva
J’ai exploré une approche similaire : encapsuler aussi les messages dans un environnement sécurisé, en l’occurrence un Pi Pico tournant en bare-metal. Même si les échanges se font en LoRa :
https://hackaday.io/project/202946-pi-pico-lora-text-messenger
Un jour, ce genre de bidouille sera peut-être interdit :)