Keeloq cryptographic algorithm is used in many commercial applications to achieve a good level of security in wireless transmissions. It is included in a lot of gate openers and anti-theft car systems. A lot of theoretical cryptanalysis literature is available on this algorithm, however pratical applications of the literature’s finding are very limited. In this study a different approach that employs a side-channel technique for analyzing Keeloq real systems is used. This technique, based on Differential Power Analysis, allows to discover secret information from the transmitter and consequently to duplicate the transmitter device, making Keeloq systems less secure. This work shows successful attacks on HCS30X commercial devices

Studio del protocollo Keeloq e implementazione di un attacco con analisi di potenza

Barbon, Nicola
2011/2012

Abstract

Keeloq cryptographic algorithm is used in many commercial applications to achieve a good level of security in wireless transmissions. It is included in a lot of gate openers and anti-theft car systems. A lot of theoretical cryptanalysis literature is available on this algorithm, however pratical applications of the literature’s finding are very limited. In this study a different approach that employs a side-channel technique for analyzing Keeloq real systems is used. This technique, based on Differential Power Analysis, allows to discover secret information from the transmitter and consequently to duplicate the transmitter device, making Keeloq systems less secure. This work shows successful attacks on HCS30X commercial devices
2011-07-12
104
Keeloq, DPA, Power Analysis
File in questo prodotto:
File Dimensione Formato  
Nicola_Barbon_Tesi_Magistrale.pdf

accesso aperto

Dimensione 2 MB
Formato Adobe PDF
2 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/14761