2013
DOI: 10.1007/978-3-642-40041-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

Abstract: Abstract. We examine the widespread SimonsVoss digital locking system 3060 G2 that relies on an undisclosed, proprietary protocol to mutually authenticate transponders and locks. For assessing the security of the system, several tasks have to be performed: By decapsulating the used microcontrollers with acid and circumventing their read-out protection with UV-C light, the complete program code and data contained in door lock and transponder are extracted. As a second major step, the multi-pass challenge-respon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…Note that the mathematical attacks of [20] can be fixed with a firmware update that is currently being prepared by SimonsVoss. In contrast, preventing the SCA without replacing all hardware components (locks and transponders) is very difficult in our opinion.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Note that the mathematical attacks of [20] can be fixed with a firmware update that is currently being prepared by SimonsVoss. In contrast, preventing the SCA without replacing all hardware components (locks and transponders) is very difficult in our opinion.…”
Section: Resultsmentioning
confidence: 99%
“…The mathematical properties of the SimonsVoss digital lock and access control system 3060 "G2" are investigated in [20]. Sophisticated mathematical attacks, exploiting weaknesses of the proprietary obfuscation function (see Sect.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The cryptographic security of Generation 2 has recently been analyzed by Strobel et al [3]. The researchers reverseengineered the cryptographic primitives and found out that the random number generator in their locks allowed the derivation of transponder secrets, which can be used to create a valid transponder without having physical access to it.…”
Section: Introductionmentioning
confidence: 99%
“…In contrast to mechanical locking systems, they provide several convenient features such as more flexible access rights management, the possibility to revoke physical keys and the claim that electronic keys cannot be cloned as easily as their mechanical counterparts. While for some electronic locks, mechanical flaws have been found [1], only a few publications analyzed the cryptographic security of electronic locking systems [2,3]. In this paper, we analyzed the electronic security of an electronic locking system which is still widely deployed in the field.…”
mentioning
confidence: 99%