Selected Areas in Cryptography -- SAC 2013

  • Wu H
  • Preneel B
N/ACitations
Citations of this article
35Readers
Mendeley users who have this article in their library.

Abstract

In the past years, various electronic access control systems have been found to be insecure. In consequence, attacks have emerged that permit unauthorized access to secured objects. One of the few remaining, allegedly secure digital locking systems-the system 3060 manufactured and marketed by SimonsVoss-is employed in numerous objects worldwide. Following the trend to analyze the susceptibility of real-world products towards implementation attacks, we illustrate our approach to understand the unknown embedded system and its components. Detailed investigations are performed in a step-by-step process, including the analysis of the communication between transponder and lock, reverse-engineering of the hardware, bypassing the read-out protection of a microcontroller, and reverse-engineering the extracted program code. Piecing all parts together, the security mechanisms of the system can be completely circumvented by means of implementation attacks. We present an EM side-channel attack for extracting the secret system key from a door lock. This ultimately gives access to all doors of an entire installation. Our technique targets a proprietary function (used in combination with a DES for key derivation), probably originally implemented as an obscurity-based countermeasure to prevent attacks. © 2014 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Wu, H., & Preneel, B. (2014). Selected Areas in Cryptography -- SAC 2013, 8282, 185–201. Retrieved from http://link.springer.com/10.1007/978-3-662-43414-7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free