2009
DOI: 10.1007/978-3-642-02384-2_25
|View full text |Cite
|
Sign up to set email alerts
|

Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…The practical impact of this attack is tolerable, since it is comparable to duplicating a mechanical key, given physical access. The recovery of the manufacturer key (contained in all receivers of one manufacturer) is feasible with only one power measurement, without knowing neither plaintext nor ciphertext [KKMP09].…”
Section: Keeloqmentioning
confidence: 99%
“…The practical impact of this attack is tolerable, since it is comparable to duplicating a mechanical key, given physical access. The recovery of the manufacturer key (contained in all receivers of one manufacturer) is feasible with only one power measurement, without knowing neither plaintext nor ciphertext [KKMP09].…”
Section: Keeloqmentioning
confidence: 99%
“…Most notably the Mifare Classic, which has been thoroughly broken in the last few years [NESP08], [dKGHG08], [GdKGM + 08], [GvRVWS09], [Cou09]. Other prominent examples include KeeLoq [Bog07], [KKMP09], Megamos [VGE13] and Hitag2 [COQ09], [SNC09], [vN11], [SHXZ11], [VGB12] used in car keys, CryptoRF [GvRVWS10], [BKZ11], [BGV + 12] used in access control and payment systems and the A5/1 [Gol97], DECT [LST + 09] and GMR [DHW + 12] ciphers used in cordless/GSM phones. HID proposes iClass as a migration option for systems using Mifare Classic, boosting that iClass provides "improved security, performance and data integrity" 1 .…”
Section: Research Context and Related Workmentioning
confidence: 99%
“…In this case, referred to as single power analysis (SPA), the attacks consist indeed in the analysis of simple vertical variations. In [21], Kasper et al show how to break KeeLoq with SPA. Also, elliptic curve cryptography is especially vulnerable to both timing attacks and SPA, because the "double" and "add" operations in the inner iteration loop notably execute differently.…”
Section: B Typical Attacksmentioning
confidence: 99%