Rocket City Rock Crawlers Homepage
Forum Home Forum Home > General > General 4x4 Discussion
  New Posts New Posts RSS Feed - "Keeloq" still broken....
  FAQ FAQ  Forum Search   Events   Register Register  Login Login

"Keeloq" still broken....

 Post Reply Post Reply
Author
Message
alabamatoy View Drop Down
Admin Group
Admin Group
Avatar
I dont work here anymore...

Joined: 16 February 2004
Location: Signal Mountain
Status: Offline
Points: 9442
Post Options Post Options   Thanks (0) Thanks(0)   Quote alabamatoy Quote  Post ReplyReply Direct Link To This Post Topic: "Keeloq" still broken....
    Posted: 04 April 2008 at 4:12am

I love it when subjects of interest come together, like information system security and cars.....Keeloq, from Schneier's blog:

That's the key entry system used by Chrysler, Daewoo, Fiat, General Motors, Honda, Toyota, Lexus, Volvo, Volkswagen, Jaguar, and probably others. It's broken:

The KeeLoq encryption algorithm is widely used for security relevant applications, e.g., in the form of passive Radio Frequency Identification (RFID) transponders for car immobilizers and in various access control and Remote Keyless Entry (RKE) systems, e.g., for opening car doors and garage doors.

We present the first successful DPA (Differential Power Analysis) attacks on numerous commercially available products employing KeeLoq. These so-called side-channel attacks are based on measuring and evaluating the power consumption of a KeeLoq device during its operation. Using our techniques, an attacker can reveal not only the secret key of remote controls in less than one hour, but also the manufacturer key of the corresponding receivers in less than one day. Knowing the manufacturer key allows for creating an arbitrary number of valid new keys and generating new remote controls.

We further propose a new eavesdropping attack for which monitoring of two ciphertexts, sent from a remote control employing KeeLoq code hopping (car key, garage door opener, etc.), is sufficient to recover the device key of the remote control. Hence, using the methods described by us, an attacker can clone a remote control from a distance and gain access to a target that is protected by the claimed to be "highly secure" KeeLoq algorithm.

We consider our attacks to be of serious practical interest, as commercial KeeLoq access control systems can be overcome with modest effort.

I've written about this before, but the above link has much better data.

Bruce Schneier's blog has some cool stuff...

"If you didnt buy your 1st gen 4Runner new, then YOU are a newbie!!"

BRC Life Member
Back to Top
 Post Reply Post Reply
  Share Topic   

Forum Jump Forum Permissions View Drop Down

Forum Software by Web Wiz Forums® version 12.01
Copyright ©2001-2018 Web Wiz Ltd.

This page was generated in 0.025 seconds.