A new remote keyless entry system resistant to power analysis attacks

In CRYPTO 2008, it has been shown that power-analysis attacks can completely break real-word remote keyless entry (RKE) systems based on the KeeLoq code-hopping scheme. A successful key-recovery involves a couple of security and privacy risks for the consumers as well as for the manufacturers. In th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Moradi, A., Kasper, T.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In CRYPTO 2008, it has been shown that power-analysis attacks can completely break real-word remote keyless entry (RKE) systems based on the KeeLoq code-hopping scheme. A successful key-recovery involves a couple of security and privacy risks for the consumers as well as for the manufacturers. In this paper, we introduce a new RKE system that is inherently resistant against side-channel attacks, independent of the implementation platform. For our approach, a pseudo random number generator (PRNG) as introduced in ASIACCS 2008 is extended to prevent template attacks, and embedded into a secure remote-control application. We verify the effectiveness of the proposed scheme by implementing it on a microcontroller and evaluate its physical security, thereby demonstrating that a practical key-recovery by means of power-analysis is not feasible.
DOI:10.1109/ICICS.2009.5397727