Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer
نویسندگان
چکیده
The Megamos Crypto transponder is used in one of the most widely deployed electronic vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and Volvo cars. Such an immobilizer is an antitheft device which prevents the engine of the vehicle from starting when the corresponding transponder is not present. This transponder is a passive RFID tag which is embedded in the key of the vehicle. In this paper we have reverse-engineered all proprietary security mechanisms of the transponder, including the cipher and the authentication protocol which we publish here in full detail. This article reveals several weaknesses in the design of the cipher, the authentication protocol and also in their implementation. We exploit these weaknesses in three practical attacks that recover the 96bit transponder secret key. These three attacks only require wireless communication with the system. Our first attack exploits weaknesses in the cipher design and in the authentication protocol. We show that having access to only two eavesdropped authentication traces is enough to recover the 96-bit secret key with a computational complexity of 256 cipher ticks (equivalent to 2 encryptions). Our second attack exploits a weakness in the key-update mechanism of the transponder. This attack recovers the secret key after 3× 2 authentication attempts with the transponder and negligible computational complexity. We have executed this attack in practice on several vehicles. We were able to recover the key and start the engine with a transponder emulating device. Executing this attack from beginning to end takes only 30 minutes. Our third attack exploits the fact that some car manufacturers set weak cryptographic keys in their vehicles. We propose a time-memory trade-off which recovers such a weak key after a few minutes of computation on a standard laptop.
منابع مشابه
The (in)security of proprietary cryptography
Proprietary cryptography is a term used to describe custom encryption techniques that are kept secret by its designers to add additional security. It is questionable if such an approach increases the cryptographic strength of the underlying mathematical algorithms. The security of proprietary encryption techniques relies entirely on the competence of the semi-conductor companies, which keep the...
متن کاملGone in 360 Seconds: Hijacking with Hitag2
An electronic vehicle immobilizer is an anti-theft device which prevents the engine of the vehicle from starting unless the corresponding transponder is present. Such a transponder is a passive RFID tag which is embedded in the car key and wirelessly authenticates to the vehicle. It prevents a perpetrator from hot-wiring the vehicle or starting the car by forcing the mechanical lock. Having suc...
متن کاملUICE: A High-Performance Cryptographic Module for SoC and RFID Applications
In order to overcome proprietary algorithms with respect to the system manufacturers, a free cryptographic module, the Universal Immobilizer Crypto Engine (UICE), will be proposed. This UICE algorithm is tailored to 8-bit microprocessor architectures and is therefore very fast in software and hardware. The dedicated hardware implementation leads to a small gate count, because the registers for ...
متن کاملReducing costly falls of total knee replacement patients.
The objective of this study was to determine whether the use of a knee immobilizer brace reduces patient falls associated with the recent use of femoral nerve blocks for pain control after total knee arthroplasty (TKA). The authors conducted a retrospective study to investigate fall rates before and after the introduction of an immobilizer brace. The demographics of patients and total cost of c...
متن کاملMulti-Criteria Evaluation of End-of-Life Vehicles’ Dismantling Scenarios with Respect to Technical Performance and Sustainability Issues
Three scenarios of dismantling and shredding operations of end-of-life vehicles (ELVs) were compared in this study with respect to technical and sustainability criteria, according to the level of dismantling applied to the vehicles. The scenarios differed from each other in the extent of the dismantling operations. They were implemented experimentally at the industrial scale on representative s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013