Serveur d'exploration sur l'Université de Trèves

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Attacks on the DECT Authentication Mechanisms

Identifieur interne : 000039 ( LNCS/Analysis ); précédent : 000038; suivant : 000040

Attacks on the DECT Authentication Mechanisms

Auteurs : Stefan Lucks [Allemagne] ; Andreas Schuler [Allemagne] ; Erik Tews [Allemagne] ; Ralf-Philipp Weinmann [Luxembourg (pays)] ; Matthias Wenzel [Allemagne]

Source :

RBID : ISTEX:D34B07DA2CAD67B8F22972807F35F543FA1FE089

Abstract

Abstract: Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic algorithms used in DECT are not publicly available. In this paper we reveal one of the two algorithms used by DECT, the DECT Standard Authentication Algorithm (DSAA). We give a very detailed security analysis of the DSAA including some very effective attacks on the building blocks used for DSAA as well as a common implementation error that can practically lead to a total break of DECT security. We also present a low cost attack on the DECT protocol, which allows an attacker to impersonate a base station and therefore listen to and reroute all phone calls made by a handset.

Url:
DOI: 10.1007/978-3-642-00862-7_4


Affiliations:


Links toward previous steps (curation, corpus...)


Links to Exploration step

ISTEX:D34B07DA2CAD67B8F22972807F35F543FA1FE089

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Attacks on the DECT Authentication Mechanisms</title>
<author>
<name sortKey="Lucks, Stefan" sort="Lucks, Stefan" uniqKey="Lucks S" first="Stefan" last="Lucks">Stefan Lucks</name>
</author>
<author>
<name sortKey="Schuler, Andreas" sort="Schuler, Andreas" uniqKey="Schuler A" first="Andreas" last="Schuler">Andreas Schuler</name>
</author>
<author>
<name sortKey="Tews, Erik" sort="Tews, Erik" uniqKey="Tews E" first="Erik" last="Tews">Erik Tews</name>
</author>
<author>
<name sortKey="Weinmann, Ralf Philipp" sort="Weinmann, Ralf Philipp" uniqKey="Weinmann R" first="Ralf-Philipp" last="Weinmann">Ralf-Philipp Weinmann</name>
</author>
<author>
<name sortKey="Wenzel, Matthias" sort="Wenzel, Matthias" uniqKey="Wenzel M" first="Matthias" last="Wenzel">Matthias Wenzel</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:D34B07DA2CAD67B8F22972807F35F543FA1FE089</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-00862-7_4</idno>
<idno type="url">https://api.istex.fr/document/D34B07DA2CAD67B8F22972807F35F543FA1FE089/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001953</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001953</idno>
<idno type="wicri:Area/Istex/Curation">001837</idno>
<idno type="wicri:Area/Istex/Checkpoint">000456</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000456</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Lucks S:attacks:on:the</idno>
<idno type="wicri:Area/Main/Merge">000F83</idno>
<idno type="wicri:Area/Main/Curation">000F09</idno>
<idno type="wicri:Area/Main/Exploration">000F09</idno>
<idno type="wicri:Area/LNCS/Extraction">000039</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Attacks on the DECT Authentication Mechanisms</title>
<author>
<name sortKey="Lucks, Stefan" sort="Lucks, Stefan" uniqKey="Lucks S" first="Stefan" last="Lucks">Stefan Lucks</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Bauhaus-University Weimar</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Schuler, Andreas" sort="Schuler, Andreas" uniqKey="Schuler A" first="Andreas" last="Schuler">Andreas Schuler</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Chaos Computer Club Trier</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Tews, Erik" sort="Tews, Erik" uniqKey="Tews E" first="Erik" last="Tews">Erik Tews</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>FB Informatik, TU Darmstadt</wicri:regionArea>
<wicri:noRegion>TU Darmstadt</wicri:noRegion>
<wicri:noRegion>TU Darmstadt</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Weinmann, Ralf Philipp" sort="Weinmann, Ralf Philipp" uniqKey="Weinmann R" first="Ralf-Philipp" last="Weinmann">Ralf-Philipp Weinmann</name>
<affiliation wicri:level="4">
<country>Luxembourg (pays)</country>
<placeName>
<settlement type="city">Luxembourg</settlement>
</placeName>
<orgName type="university">Université du Luxembourg</orgName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Luxembourg (pays)</country>
</affiliation>
</author>
<author>
<name sortKey="Wenzel, Matthias" sort="Wenzel, Matthias" uniqKey="Wenzel M" first="Matthias" last="Wenzel">Matthias Wenzel</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Chaos Computer Club München</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">D34B07DA2CAD67B8F22972807F35F543FA1FE089</idno>
<idno type="DOI">10.1007/978-3-642-00862-7_4</idno>
<idno type="ChapterID">4</idno>
<idno type="ChapterID">Chap4</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic algorithms used in DECT are not publicly available. In this paper we reveal one of the two algorithms used by DECT, the DECT Standard Authentication Algorithm (DSAA). We give a very detailed security analysis of the DSAA including some very effective attacks on the building blocks used for DSAA as well as a common implementation error that can practically lead to a total break of DECT security. We also present a low cost attack on the DECT protocol, which allows an attacker to impersonate a base station and therefore listen to and reroute all phone calls made by a handset.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
<li>Luxembourg (pays)</li>
</country>
<settlement>
<li>Luxembourg</li>
</settlement>
<orgName>
<li>Université du Luxembourg</li>
</orgName>
</list>
<tree>
<country name="Allemagne">
<noRegion>
<name sortKey="Lucks, Stefan" sort="Lucks, Stefan" uniqKey="Lucks S" first="Stefan" last="Lucks">Stefan Lucks</name>
</noRegion>
<name sortKey="Lucks, Stefan" sort="Lucks, Stefan" uniqKey="Lucks S" first="Stefan" last="Lucks">Stefan Lucks</name>
<name sortKey="Schuler, Andreas" sort="Schuler, Andreas" uniqKey="Schuler A" first="Andreas" last="Schuler">Andreas Schuler</name>
<name sortKey="Schuler, Andreas" sort="Schuler, Andreas" uniqKey="Schuler A" first="Andreas" last="Schuler">Andreas Schuler</name>
<name sortKey="Tews, Erik" sort="Tews, Erik" uniqKey="Tews E" first="Erik" last="Tews">Erik Tews</name>
<name sortKey="Tews, Erik" sort="Tews, Erik" uniqKey="Tews E" first="Erik" last="Tews">Erik Tews</name>
<name sortKey="Wenzel, Matthias" sort="Wenzel, Matthias" uniqKey="Wenzel M" first="Matthias" last="Wenzel">Matthias Wenzel</name>
<name sortKey="Wenzel, Matthias" sort="Wenzel, Matthias" uniqKey="Wenzel M" first="Matthias" last="Wenzel">Matthias Wenzel</name>
</country>
<country name="Luxembourg (pays)">
<noRegion>
<name sortKey="Weinmann, Ralf Philipp" sort="Weinmann, Ralf Philipp" uniqKey="Weinmann R" first="Ralf-Philipp" last="Weinmann">Ralf-Philipp Weinmann</name>
</noRegion>
<name sortKey="Weinmann, Ralf Philipp" sort="Weinmann, Ralf Philipp" uniqKey="Weinmann R" first="Ralf-Philipp" last="Weinmann">Ralf-Philipp Weinmann</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Rhénanie/explor/UnivTrevesV1/Data/LNCS/Analysis
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000039 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/LNCS/Analysis/biblio.hfd -nk 000039 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Rhénanie
   |area=    UnivTrevesV1
   |flux=    LNCS
   |étape=   Analysis
   |type=    RBID
   |clé=     ISTEX:D34B07DA2CAD67B8F22972807F35F543FA1FE089
   |texte=   Attacks on the DECT Authentication Mechanisms
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Sat Jul 22 16:29:01 2017. Site generation: Wed Feb 28 14:55:37 2024