Two Intercepted Messages are Sufficient
Prof. Paar's team applied the newest code breaking technologies for developing several attacks. With the most devastating attack, car keys (or building keys) can be cloned from a distance of several 100 meters. "Eavesdropping on as little as two messages enables illegitimate parties to duplicate your key and to open your garage or unlock your car", says Prof. Paar. With another malicious attack, a garage door or a car door can be remotely manipulated so that legitimate keys do not work any more. As a consequence, access to the car or the building is not possible any more.
Newest Code Breaking Techniques
A KeeLoq system consists of an active Radio Frequency Identification (RFID) transponders (e.g., embedded in a car key) and a receiver (e.g., embedded in the car door). Both the receiver and transponder use KeeLoq as encryption method for securing the over-the-air communication. The attack by the Bochum team allows recovering the secret cryptographic keys embedded in both the receiver and the responder. The attack is based on measuring the electric power consumption of the receiver. Applying what is called side-channel analysis methods to the power traces, the researchers were able to extract the manufacturer key from the receivers. The attack - which combines side-channel cryptanalysis with specific properties of the KeeLoq algorithm - can be applied to all known variants in which KeeLoq is used in real world systems. The practicality of the attack has been confirmed by attacking actual systems which are using KeeLoq.
KeeLoq: widely used since the mid-1990s.
KeeLoq has been used for access control since the mid-1990s. By some estimates, it is the most popular of such systems in Europe and the US. Besides the frequent use of KeeLoq for garage door openers and other building access applications, it is also known that several automotive manufacturers like Toyota/Lexus base their anti-theft protection on assumed secure devices featuring KeeLoq.
IT Security Research in Bochum
Prof. Paar's group is part of the Horst Görtz Institute for IT Security (HGI), one of the largest university-based security research centres in Europe. Prof. Paar's group is internationally renowned for their work in securing and analysing embedded security systems. Ruhr University Bochum has the most comprehensive offerings in IT security education (Bachelor, Master, distance learning) in Germany.
Prof. Dr.-Ing. Christof Paar, Communication Security Group, Faculty of Electrical Engineering and Information Science, Ruhr University of Bochum, D-44780 Bochum, Germany, E-Mail: email@example.com, Phone: +49 234 32 22994
Web linksMore information about the KeeLoq attack
Dr. Josef König | idw
Safe glide at total engine failure with ELA-inside
27.02.2017 | FernUniversität in Hagen
Deep Learning predicts hematopoietic stem cell development
21.02.2017 | Helmholtz Zentrum München - Deutsches Forschungszentrum für Gesundheit und Umwelt
On January 15, 2009, Chesley B. Sullenberger was celebrated world-wide: after the two engines had failed due to bird strike, he and his flight crew succeeded after a glide flight with an Airbus A320 in ditching on the Hudson River. All 155 people on board were saved.
On January 15, 2009, Chesley B. Sullenberger was celebrated world-wide: after the two engines had failed due to bird strike, he and his flight crew succeeded...
In the field of nanoscience, an international team of physicists with participants from Konstanz has achieved a breakthrough in understanding heat transport
Cells need to repair damaged DNA in our genes to prevent the development of cancer and other diseases. Our cells therefore activate and send “repair-proteins”...
The Fraunhofer IWS Dresden and Technische Universität Dresden inaugurated their jointly operated Center for Additive Manufacturing Dresden (AMCD) with a festive ceremony on February 7, 2017. Scientists from various disciplines perform research on materials, additive manufacturing processes and innovative technologies, which build up components in a layer by layer process. This technology opens up new horizons for component design and combinations of functions. For example during fabrication, electrical conductors and sensors are already able to be additively manufactured into components. They provide information about stress conditions of a product during operation.
The 3D-printing technology, or additive manufacturing as it is often called, has long made the step out of scientific research laboratories into industrial...
Nature does amazing things with limited design materials. Grass, for example, can support its own weight, resist strong wind loads, and recover after being...
13.02.2017 | Event News
10.02.2017 | Event News
09.02.2017 | Event News
28.02.2017 | Physics and Astronomy
28.02.2017 | Materials Sciences
28.02.2017 | Health and Medicine