TU Darmstadt / ULB / TUbiblio

An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario

Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp (2009):
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario.
In: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009), IEEE Computer Society, ISBN 978-0-76-953750-4,
DOI: 10.1109/ICWMC.2009.20, [Conference or Workshop Item]

Abstract

We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force architecture to efficiently recalculate all communication-related shared secrets between the DECT base station and handset. The efficiency of our architecture is demonstrated by a highly pipelined, multi-brute-force-component FPGA implementation. It exploits common weak random number generators implemented at the DECT base stations and a weak authentication scheme between the DECT base stations and their handsets.

Item Type: Conference or Workshop Item
Erschienen: 2009
Creators: Molter, Gregor and Ogata, Kei and Tews, Erik and Weinmann, Ralf-Philipp
Title: An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario
Language: ["languages_typename_1" not defined]
Abstract:

We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force architecture to efficiently recalculate all communication-related shared secrets between the DECT base station and handset. The efficiency of our architecture is demonstrated by a highly pipelined, multi-brute-force-component FPGA implementation. It exploits common weak random number generators implemented at the DECT base stations and a weak authentication scheme between the DECT base stations and their handsets.

Title of Book: 5th IEEE International Conference on Wireless and Mobile Communications (ICWMC 2009)
Publisher: IEEE Computer Society
ISBN: 978-0-76-953750-4
Uncontrolled Keywords: Secure Things;DECT, DECT-GAP, Attacking Scenario, Brute-Force, FPGA
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > Integrated Circuits and Systems
20 Department of Computer Science > Kryptographische Protokolle
20 Department of Computer Science > Theoretical Computer Science - Cryptography and Computer Algebra
LOEWE > LOEWE-Zentren
20 Department of Computer Science
LOEWE
Date Deposited: 31 Dec 2016 00:15
DOI: 10.1109/ICWMC.2009.20
Identification Number: ISS:Molter:2009:AnEfficientF:154
Export:

Optionen (nur für Redakteure)

View Item View Item