Filters








119 Hits in 0.9 sec

A Practical Attack on KeeLoq

Wim Aerts, Eli Biham, Dieter De Moitié, Elke De Mulder, Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller, Bart Preneel, Guy A. E. Vandenbosch, Ingrid Verbauwhede
<span title="2010-11-03">2010</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
This paper presents a practical key recovery attack against KeeLoq that requires 2 16 known plaintexts and has a time complexity of 2 44.5 KeeLoq encryptions.  ...  An attacker can acquire chosen plaintexts in practice, and one of the two suggested key derivation schemes for KeeLoq allows to recover the master secret from a single key.  ...  Our Attacks on KeeLoq This section describes our attacks on KeeLoq. We combine a slide attack with a novel meet-in-the-middle approach to recover the key from a slid pair.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-010-9091-9">doi:10.1007/s00145-010-9091-9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/flijxmx5cnbblgo335l6n6oiry">fatcat:flijxmx5cnbblgo335l6n6oiry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171127041921/https://core.ac.uk/download/pdf/34432532.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/eb/08eb7f86d3e06cd6910c6ce804e1333be4e72a5e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-010-9091-9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Practical Attack on KeeLoq [chapter]

Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel
<i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5fby7eyrnbdfrnfd5ib4lkc2gu" style="color: black;">Advances in Cryptology – EUROCRYPT 2008</a> </i> &nbsp;
This paper presents a practical key recovery attack against KeeLoq that requires 2 16 known plaintexts and has a time complexity of 2 44.5 KeeLoq encryptions.  ...  An attacker can acquire chosen plaintexts in practice, and one of the two suggested key derivation schemes for KeeLoq allows to recover the master secret from a single key.  ...  Our Attacks on KeeLoq This section describes our attacks on KeeLoq. We combine a slide attack with a novel meet-in-the-middle approach to recover the key from a slid pair.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-78967-3_1">doi:10.1007/978-3-540-78967-3_1</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/eurocrypt/IndesteegeKDBP08.html">dblp:conf/eurocrypt/IndesteegeKDBP08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e6hjhnaxdna4tdj2jqsmowt3wm">fatcat:e6hjhnaxdna4tdj2jqsmowt3wm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171127041921/https://core.ac.uk/download/pdf/34432532.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/08/eb/08eb7f86d3e06cd6910c6ce804e1333be4e72a5e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-78967-3_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The Analysis and Improvement of KEELOQ Algorithm

Dan Li, Wenjun Xiao, Ziyi You, Yi Wang
<span title="">2017</span> <i title="International Academy Publishing (IAP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7wdo44rafbg5rfskrbd6snu7yy" style="color: black;">International Journal of Computer and Electrical Engineering</a> </i> &nbsp;
The KEELOQ algorithm is a block cipher algorithm designed by South Africa Willem Smit in the 1980s,in this thesis, based on the summary of the previous attack researches and the detailed rationale of KEELOQ  ...  , improved the safety performance, finally, made an experiments on the paper decode to keeloq, the experimental results show that the algorithm is more safe and more reliable.  ...  In 2012, Nicolas T [5] et al put forward the self similar attacks on block cipher and applied to the KEELOQ algorithm, they point out that only need to select two clear, can decode the KEELOQ algorithm  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17706/ijcee.2017.9.2.439-444">doi:10.17706/ijcee.2017.9.2.439-444</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uowzkcl2cvaidh3dftnxkvat5a">fatcat:uowzkcl2cvaidh3dftnxkvat5a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721074644/http://www.ijcee.org/vol9/950-E1639.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/b3/e2b3d31afa6caff801caddf31c22415e2aeb5cc0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17706/ijcee.2017.9.2.439-444"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

KeeLoq and Side-Channel Analysis-Evolution of an Attack

Christof Paar, Thomas Eisenbarth, Markus Kasper, Timo Kasper, Amir Moradi
<span title="">2009</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jsrjjgovnbfh5f7ls6jltkhj5a" style="color: black;">2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)</a> </i> &nbsp;
In the second phase, we were able to use differential power analysis attacks successfully on numerous commercially available products employing KeeLoq code hopping.  ...  As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in a few minutes.  ...  As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in a few minutes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/fdtc.2009.44">doi:10.1109/fdtc.2009.44</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/fdtc/PaarEKKM09.html">dblp:conf/fdtc/PaarEKKM09</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lstazfvxlvegrao4qd5mbsvbzm">fatcat:lstazfvxlvegrao4qd5mbsvbzm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809111754/http://www.ei.rub.de/media/crypto/veroeffentlichungen/2010/09/07/fdtc_2009_invited_talk_cpaar.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3d/2c/3d2c615e77bce31f497324a4212d58c8ac1b821a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/fdtc.2009.44"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq [chapter]

Nicolas T. Courtois, Gregory V. Bard
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Only certain attacks are considered as really "practical" attacks on KeeLoq: the brute force, and several other attacks which require up to 2 16 known plaintexts and are then much faster than brute force  ...  The fastest of these attacks is an attack by Courtois, Bard and Wagner from [10] that has a very low complexity of about 2 28 KeeLoq encryptions on average.  ...  Some of these attacks are considered as "practical" attacks [1] though brute force is really the simplest attack to handle in practice. KeeLoq has unusually small block length: 32 bits.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-28368-0_6">doi:10.1007/978-3-642-28368-0_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h4vkdj5utffxpchphtkt3kd6zq">fatcat:h4vkdj5utffxpchphtkt3kd6zq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922054631/http://discovery.ucl.ac.uk/20437/2/keyloq2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/47/43/474363aea59cc4640daf47ce6723584957ddad2d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-28368-0_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A new remote keyless entry system resistant to power analysis attacks

Amir Moradi, Timo Kasper
<span title="">2009</span> <i title="IEEE"> 2009 7th International Conference on Information, Communications and Signal Processing (ICICS) </i> &nbsp;
In CRYPTO 2008, it has been shown that poweranalysis attacks can completely break real-word remote keyless entry (RKE) systems based on the KEELOQ code-hopping scheme.  ...  We verify the effectiveness of the proposed scheme by implementing it on a microcontroller and evaluate its physical security, thereby demonstrating that a practical key-recovery by means of power-analysis  ...  The mathematical attacks rely on known pairs of plain-and ciphertexts and are hence only practical for KEELOQ challenge-and-response protocols, e.g., [13] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icics.2009.5397727">doi:10.1109/icics.2009.5397727</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kw56ud354bdqtcecjqderk4sqm">fatcat:kw56ud354bdqtcecjqderk4sqm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170811074441/http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2010/09/05/nrke.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/ac/5caccb7d9a7435b0e3661ff63cedfb8f534ad911.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icics.2009.5397727"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Algebraic Side-Channel Analysis in the Presence of Errors [chapter]

Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We call our new attack methodology Tolerant Algebraic Side-Channel Analysis (TASCA). We show practical attacks on two real ciphers: Keeloq and AES.  ...  Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not applicable since they  ...  Parts of the research described in this paper have been supported by the Austrian Science Fund (FWF) under grant number P22241-N23 ("Investigation of Implementation Attacks").  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-15031-9_29">doi:10.1007/978-3-642-15031-9_29</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ysterkscqzd4lfh5wyby3wkazu">fatcat:ysterkscqzd4lfh5wyby3wkazu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110401082102/http://www.eng.tau.ac.il/~yash/TASCA.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1f/22/1f22fabf3d96230f9eef9ce9d0da74b5668b03cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-15031-9_29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Security of Wireless Embedded Devices in the Real World [chapter]

Timo Kasper, David Oswald, Christof Paar
<span title="">2012</span> <i title="Vieweg+Teubner Verlag"> ISSE 2011 Securing Electronic Business Processes </i> &nbsp;
., electronic passports, the remote keyless entry system KeeLoq, a Mifare Classic based contactless payment system, and a public transport system relying on Mifare DESfire cards we demonstrate that it  ...  The survey presented in this paper focuses on those devices that employ cryptographic mechanisms as a protection against ill-intended usage or unauthorizedly accessing secured data.  ...  All the described attacks have been verified on several commercial KeeLoq products.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-8348-8652-1_16">doi:10.1007/978-3-8348-8652-1_16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/btgggkxq6jexph7c6zpwlglf3e">fatcat:btgggkxq6jexph7c6zpwlglf3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160506132152/http://www.emsec.rub.de/media/crypto/veroeffentlichungen/2011/11/29/preprint_version_ISSE_wireless.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/43/5c/435c24140fd7b8a7f5ccdff0d68d786027d57649.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-8348-8652-1_16"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Compiler Optimizations as a Countermeasure against Side-Channel Analysis in MSP430-Based Devices

Pedro Malagón, Juan-Mariano de Goyeneche, Marina Zapater, José M. Moya, Zorana Banković
<span title="2012-06-08">2012</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/taedaf6aozg7vitz5dpgkojane" style="color: black;">Sensors</a> </i> &nbsp;
Physical access to devices cannot be restricted, so attackers consider them a target of their malicious attacks in order to obtain access to the network.  ...  MSP430, a 16-bit microcontroller, is used in WSN platforms, as the TelosB.  ...  Their attack works on all known car and building access control systems that rely on the KeeLoq cipher.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s120607994">doi:10.3390/s120607994</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/22969383">pmid:22969383</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC3436012/">pmcid:PMC3436012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/23g5qmwcrbc3peetqdacybixzm">fatcat:23g5qmwcrbc3peetqdacybixzm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20121103173504/http://www.mdpi.com:80/1424-8220/12/6/7994/pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/d6/17d60babbbb1974739873dbde8becc1a63fdafaf.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/s120607994"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3436012" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

Sweet Dreams and Nightmares: Security in the Internet of Things [chapter]

Timo Kasper, David Oswald, Christof Paar
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Since a large number of the devices in the field are in the hands of potential adversaries, implementation attacks (such as side-channel analysis and reverse engineering) can play a critical role for the  ...  overall security of a system.  ...  However, mathematical attacks cannot break the most widespread "Rolling-Code" KeeLoq systems in practice: In this mode of operation, the unidirectional remote controls generate dynamic codes based on encrypting  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-43826-8_1">doi:10.1007/978-3-662-43826-8_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cdqybar3qjbhzntemo4swanlke">fatcat:cdqybar3qjbhzntemo4swanlke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503113930/https://link.springer.com/content/pdf/10.1007%2F978-3-662-43826-8_1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/9d/779d2d02977a67f2a55948b6b6a67e85a6abc999.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-43826-8_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Stream/block ciphers, difference equations and algebraic attacks [article]

Roberto La Scala, Sharwan K. Tiwari
<span title="2021-08-23">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We illustrate such algebraic attacks in practice by means of the ciphers Bivium and Keeloq.  ...  We call this class "difference ciphers" and we show that ciphers of application interest, as for example systems of LFSRs with a combiner, Trivium and Keeloq, belong to the class.  ...  Attacking KeeLoq We present now an illustrative example of an algebraic attack to a concrete difference block cipher.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2003.14215v2">arXiv:2003.14215v2</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kesf7divqbh4tdm6u7h6e3lqra">fatcat:kesf7divqbh4tdm6u7h6e3lqra</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210829180150/https://arxiv.org/pdf/2003.14215v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d0/4d/d04dc4bfd7ddb279974153b73080f20b8b2ed12c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2003.14215v2" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys [article]

Jos Wetzels
<span title="2014-05-28">2014</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
We will first present a general overview of the technology and its evolution before moving on to an overview and discussion of the various known security weaknesses and attacks against such systems and  ...  KeeLoq cryptanalytical attack overview [28] .  ...  However, with the discovery of the first differential power analysis (DPA) attack on KeeLoq [45] , the situation changed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1405.7424v1">arXiv:1405.7424v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2hf322j26vdkvcplyeck6jgpoq">fatcat:2hf322j26vdkvcplyeck6jgpoq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200913090401/https://arxiv.org/ftp/arxiv/papers/1405/1405.7424.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e0/68/e068628dc8090ebb86500a7cf2314441bddf37f3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1405.7424v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Side-channel cryptographic attacks using pseudo-boolean optimization

Yossef Oren, Avishai Wool
<span title="2015-12-07">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ldxybeeoybgrrpc5b5v6mqdwty" style="color: black;">Constraints</a> </i> &nbsp;
To carry out such an attack, the attacker provides the solver with a set of equations describing the mathematical relationship between a known plaintext and a known ciphertext, and then attempts to solve  ...  These ciphers are designed such that it is computationally very difficult to recover the secret key if only pairs of plaintexts and ciphertexts are provided to the attacker.  ...  On one hand, the Keeloq cipher seems easier to analyze because of its weak diffusion property -the key bits are shifted into the Keeloq cipher state one bit at a time, whereas in 8-bit AES they are introduced  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10601-015-9237-3">doi:10.1007/s10601-015-9237-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gq7nlscmjnhd3fyxssiugwsiaq">fatcat:gq7nlscmjnhd3fyxssiugwsiaq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160818132026/http://iss.oy.ne.ro/TASCA-Constraints.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4e/2b/4e2b5f450c0b8e3fb1979e46975d5977cc3c456a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s10601-015-9237-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Lightweight Cryptography for IoT: A State-of-the-Art [article]

Vishal A. Thakor, M.A. Razzaque, Muhammad R. A. Khandaker
<span title="2020-06-24">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for almost all industries due to its wide range of applications from various domains.  ...  This new security threats could be minimized by lightweight cryptography, a sub-branch of cryptography, especially derived for resource-constrained devices such as RFID tags, smart cards, wireless sensors  ...  A slide attack and a novel meet-in-the-middle attack (direct algebraic attacks can break up to 128 rounds of KeeLoq) were reported in [137] - [139] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2006.13813v1">arXiv:2006.13813v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tydoekhuvrhjtek64z77zw34ti">fatcat:tydoekhuvrhjtek64z77zw34ti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200627130400/https://arxiv.org/ftp/arxiv/papers/2006/2006.13813.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/17/90/1790c2a064e2699548455f6950959b4795281cb3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2006.13813v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Vehicle remote keyless entry systems and engine immobilisers: Do not believe the insurer that this technology is perfect

Stephen Mason
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6aynyx2i45cmrgrdqsfa7jb2za" style="color: black;">Computer Law and Security Review</a> </i> &nbsp;
ABSTRACT In the 1990s, governments put pressure on motor vehicle manufacturers to provide better security for vehicles. Thieves could steal cars and lorries with relative ease.  ...  , Orr Dunkelman, Eli Biham and Bart Preneel, 'A Practical Attack on KeeLoq', in Nigel Smart, editor, Advances in Cryptology -EUROCRYPT 2008, Lecture Notes in Computer Science, Volume 4965, (Springer-Verlag  ...  An sms attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.clsr.2012.01.004">doi:10.1016/j.clsr.2012.01.004</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qaiowhkrrba4zjoeudfq255wlu">fatcat:qaiowhkrrba4zjoeudfq255wlu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721060830/http://sas-space.sas.ac.uk/5701/1/Stephen_Mason_Vehicle_remote_keyless_entry_systems.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/16/68/166865e978aad3bf52fb517d29ebde2e258824c4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.clsr.2012.01.004"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 119 results