Keeloq cryptographic algorithm is used in many commercial applications to achieve a good level of security in wireless transmissions. It is included in a lot of gate openers and anti-theft car systems. A lot of theoretical cryptanalysis literature is available on this algorithm, however pratical applications of the literature’s finding are very limited. In this study a different approach that employs a side-channel technique for analyzing Keeloq real systems is used. This technique, based on Differential Power Analysis, allows to discover secret information from the transmitter and consequently to duplicate the transmitter device, making Keeloq systems less secure. This work shows successful attacks on HCS30X commercial devices
Studio del protocollo Keeloq e implementazione di un attacco con analisi di potenza
Barbon, Nicola
2011/2012
Abstract
Keeloq cryptographic algorithm is used in many commercial applications to achieve a good level of security in wireless transmissions. It is included in a lot of gate openers and anti-theft car systems. A lot of theoretical cryptanalysis literature is available on this algorithm, however pratical applications of the literature’s finding are very limited. In this study a different approach that employs a side-channel technique for analyzing Keeloq real systems is used. This technique, based on Differential Power Analysis, allows to discover secret information from the transmitter and consequently to duplicate the transmitter device, making Keeloq systems less secure. This work shows successful attacks on HCS30X commercial devicesFile | Dimensione | Formato | |
---|---|---|---|
Nicola_Barbon_Tesi_Magistrale.pdf
accesso aperto
Dimensione
2 MB
Formato
Adobe PDF
|
2 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/14761