{"id":65,"date":"2013-04-05T17:39:36","date_gmt":"2013-04-05T15:39:36","guid":{"rendered":"http:\/\/kasper-oswald.de\/us\/?page_id=65"},"modified":"2016-08-23T09:46:36","modified_gmt":"2016-08-23T07:46:36","slug":"keeloq-and-electronic-access-control","status":"publish","type":"page","link":"https:\/\/kasper-oswald.de\/gb\/research\/keeloq-and-electronic-access-control\/","title":{"rendered":"KeeLoq and Electronic Access Control"},"content":{"rendered":"<div class=\"row\"><div class=\"column element12\"><div class=\"content typography\"><p>In real estate and vehicles there is an increasing demand for the comfort of wireless technology. Transponders, contactless smartcards and remote door openers are widely employed to replace conventional mechanical key locking systems. Our scientific analyses show, that the mechatronic locking systems &#8211; although using mature mechanical security technology &#8211; often suffer from vulnerabilities within the electronic system, the employed cryptography or conceptual weaknesses. The protection mechanisms can then often be thwarted by means of rather simple and efficient methods, such that adversaries may, e.g., copy electronic keys or deactivate alarm systems.<\/p>\n<p>At the example of the KeeLoq&copy; system &#8211; a system widely employed for garage door remotes \u2013 and many other remote keyless entry systems, history has shown that the employed protection mechanisms fail to resist determined attackers. Due to the usage of radio interfaces the impact of successful attacks are much more severe than in conventional mechanical systems, as there is no need for an attacker to have physical access to the targeted system.<\/p>\n<h1>Publications<\/h1>\n<p><strong>On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme<\/strong>. Tho\u00admas Ei\u00adsen\u00adbarth, Timo Kas\u00adper, Amir Mo\u00adra\u00addi, Chris\u00adtof Paar, Mahmoud Sal\u00adma\u00adsi\u00adz\u00adadeh, Mo\u00adham\u00admad T. Man\u00adzu\u00adri Shal\u00adma\u00adni. 28th In\u00adter\u00adna\u00adtio\u00adnal Cryp\u00adto\u00adlo\u00adgy Con\u00adfe\u00adrence &#8212; CRYP\u00adTO 2008. Santa Bar\u00adba\u00adra, Ca\u00adli\u00adfor\u00adnia, USA. <a title=\"KeeLoq\" href=\"http:\/\/emsec.rub.de\/media\/crypto\/veroeffentlichungen\/2010\/09\/11\/crypto2008_keeloq.pdf\">PDF<\/a><\/p>\n<p><strong>Breaking KeeLoq in a Flash<\/strong>. Mar\u00adkus Kas\u00adper, Timo Kas\u00adper, Amir Mo\u00adra\u00addi, Chris\u00adtof Paar. 2nd In\u00adter\u00adna\u00adtio\u00adnal Con\u00adfe\u00adrence on Cryp\u00adto\u00adlo\u00adgy in Af\u00adri\u00adca, Pro\u00adgress in Cryp\u00adto\u00adlo\u00adgy &#8211; AF\u00adRI\u00adCA\u00adCRYPT 2009. Gam\u00admarth, Tu\u00adni\u00adsia. <a title=\"KeeLoq in a Flash\" href=\"http:\/\/emsec.rub.de\/media\/crypto\/veroeffentlichungen\/2010\/09\/07\/africacrypt2009_keeloq.pdf\">PDF<\/a><\/p>\n<p><strong>A New Remote Keyless Entry System Resistant to Power Analysis Attacks<\/strong>. Amir Mo\u00adra\u00addi, Timo Kas\u00adper. 7th In\u00adter\u00adna\u00adtio\u00adnal Con\u00adfe\u00adrence on In\u00adfor\u00adma\u00adti\u00adon, Com\u00admu\u00adni\u00adca\u00adti\u00adons and Si\u00adgnal Pro\u00adces\u00adsing, ICICS 2009. Macau, China. <a title=\"A New Remote Keyless Entry System\" href=\"http:\/\/emsec.rub.de\/media\/crypto\/veroeffentlichungen\/2010\/09\/05\/nrke.pdf\">PDF<\/a><\/p>\n<p><strong>Cryptanalysis of KeeLoq with COPACOBANA<\/strong>. Mar\u00adtin No\u00advot\u00adny, Timo Kas\u00adper. Spe\u00adcial-pur\u00adpo\u00adse Hard\u00adware for At\u00adta\u00adcking Cryp\u00adto\u00adgra\u00adphic Sys\u00adtems SHARCS 2009. Lausan\u00adne, Swit\u00adz\u00ader\u00adland. <a title=\"Cryptanalysis of KeeLoq with COPACOBANA\" href=\"http:\/\/emsec.rub.de\/media\/crypto\/veroeffentlichungen\/2010\/09\/05\/novotny_kasper_sharcs2009_final.pdf\">PDF<\/a><\/p>\n<p><strong>Sicherheit moderner Funkt\u00fcr\u00f6ffnersysteme<\/strong>. Thomas Eisenbarth, Timo Kasper, Christof Paar.<br \/>\nDatenschutz und Datensicherheit &#8211; <a title=\"Keeloq_DuD_seite\" href=\"http:\/\/www.springerlink.com\/content\/1614-0702\/32\/8\/\">DuD<\/a> Volume 32 Ausgabe 8 &#8211; August 2008. <a title=\"KeeLoq_DuD\" href=\"https:\/\/www.emsec.rub.de\/media\/crypto\/veroeffentlichungen\/2011\/12\/02\/DuD_keeloq.pdf\">PDF (German)<\/a><\/p>\n<p><strong>Torschlusspanik: Sicherheitsl\u00fccken durch Seitenkanalattacken<\/strong>. Thomas Eisenbarth, Timo Kasper, Christof Paar. iX Magazin f\u00fcr professionelle Informationstechnik <a title=\"Torschlusspanik\" href=\"https:\/\/www.heise.de\/artikel-archiv\/ix\/2008\/09\/121_Torschlusspanik\">Ausgabe 9\/2008 (German)<\/a><\/p>\n<\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":8,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/pages\/65"}],"collection":[{"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/comments?post=65"}],"version-history":[{"count":7,"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/pages\/65\/revisions"}],"predecessor-version":[{"id":189,"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/pages\/65\/revisions\/189"}],"up":[{"embeddable":true,"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/pages\/8"}],"wp:attachment":[{"href":"https:\/\/kasper-oswald.de\/gb\/wp-json\/wp\/v2\/media?parent=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}