Abstract
We examine the widespread SimonsVoss digital locking system 3060 G2 that relies on an undisclosed, proprietary protocol to mutually authenticate transponders and locks. For assessing the security of the system, several tasks have to be performed: By decapsulating the used microcontrollers with acid and circumventing their read-out protection with UV-C light, the complete program code and data contained in door lock and transponder are extracted. As a second major step, the multi-pass challenge-response protocol and corresponding cryptographic primitives are recovered via low-level reverse-engineering. The primitives turn out to be based on DES in combination with a proprietary construction.
Our analysis pinpoints various security vulnerabilities that enable practical key-recovery attacks. We present two different approaches for unauthorizedly gaining access to installations. Firstly, an attacker having physical access to a door lock can extract a master key, allowing to mimic transponders, in altogether 30 minutes. A second, purely logical attack exploits an implementation flaw in the protocol and works solely via the wireless interface. As the only prerequisite, a valid ID of a transponder needs to be known (or guessed). After executing a few (partial) protocol runs in the vicinity of a door lock, and some seconds of computation, an adversary obtains all of the transponder’s access rights.
Chapter PDF
Similar content being viewed by others
Keywords
References
Bono, S.C., Green, M., Stubblefield, A., Juels, A., Rubin, A.D., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: Proceedings of the 14th Conference on USENIX Security Symposium, vol. 14, USENIX Association (2005), http://www.usenix.org/events/sec05/tech/bono/bono.pdf
Nohl, K., Evans, D., Starbug, Plötz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 185–194 (2008), http://www.usenix.org/events/sec08/tech/full_papers/nohl/nohl.pdf
Garcia, F.D., van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly Pickpocketing a Mifare Classic Card. In: IEEE Symposium on Security and Privacy, pp. 3–15. IEEE (2009)
Courtois, N.: The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. In: SECRYPT, pp. 331–338. INSTICC (2009)
Kasper, T., Silbermann, M., Paar, C.: All You Can Eat or Breaking a Real-World Contactless Payment System. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 343–350. Springer, Heidelberg (2010)
Courtois, N.T., O’Neil, S., Quisquater, J.-J.: Practical Algebraic Attacks on the Hitag2 Stream Cipher. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 167–176. Springer, Heidelberg (2009)
Verdult, R., Garcia, F.D., Balasch, J.: Gone in 360 seconds: Hijacking with Hitag2. In: USENIX Security Symposium, pp. 237–252. USENIX Association (August 2012), https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final95.pdf
Garcia, F.D., de Koning Gans, G., Verdult, R., Meriac, M.: Dismantling iClass and iClass elite. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 697–715. Springer, Heidelberg (2012)
Plötz, H., Nohl, K.: Legic Prime: Obscurity in Depth (2009), http://events.ccc.de/congress/2009/Fahrplan/attachments/1506_legic-slides.pdf
Bogdanov, A.: Attacks on the KeeLoq Block Cipher and Authentication Systems. In: Workshop on RFID Security, RFIDSec 2008 (2007), rfidsec07.etsit.uma.es/slides/papers/paper-22.pdf
Aerts, W., Biham, E., De Moitie, D., De Mulder, E., Dunkelman, O., Indesteege, S., Keller, N., Preneel, B., Vandenbosch, G., Verbauwhede, I.: A Practical Attack on KeeLoq, pp. 1–22. Springer, New York (2010)
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203–220. Springer, Heidelberg (2008)
SimonsVoss Technologies AG, SimonsVoss posts record sales yet again in 2011, http://www.simons-voss.us/Record-sales-in-2011.1112.0.html?&L=6 (June 7, 2013)
SimonsVoss Technologies AG, References (2012), http://www.simons-voss.com/References.1163.0.html?&L=1 (June 7, 2013)
SimonsVoss Technologies AG, Manual for WAVENET- FUNKNETZWERK 3065 (2011) http://www.simons-voss.de/fileadmin/media/produkte/Handbuch_WaveNet_Funknetzwerk_3065_D.pdf .
SimonsVoss Technologies AG, Direct Networking – WaveNet network knob cap (2012), http://www.simons-voss.com/Direct-networking.631.0.html?&L=1 (June 7, 2013)
SimonsVoss Technologies AG, Digital Locking System 3060 (2006), http://www.simons-voss.com/fileadmin/media/produkte/english/Manual_digital-locking-system_overview_GB.pdf .
Klimov, A., Shamir, A.: A new class of invertible mappings. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 470–483. Springer, Heidelberg (2003)
Microchip Technology Inc., PIC16F882/883/884/886/887 Data Sheet, (2009), http://ww1.microchip.com/downloads/en/devicedoc/41291f.pdf .
NXP Semiconductors, User Manual UM10204 – I2C-bus specification and user manual. Rev. 5 (2012), http://www.nxp.com/documents/user_manual/UM10204.pdf
Beck, F.: Präparationstechniken für die Fehleranalyse an integrierten Halbleiterschaltungen. VCH Verlagsgesellschaft (1988)
Huang, A.: Hacking the PIC 18F1320 (2005), http://www.bunniestudios.com/blog/?page_id=40 (June 7, 2013)
Zonenberg, A.: Microchip PIC12F683 teardown (2011), http://siliconexposed.blogspot.de/2011/03/microchip-pic12f683-teardown.html
Weltronik, EPROM Löschgerät, apparently the company is out of business, only found reference at http://www.weltronik.de/
Hex-Rays, IDA Starter Edition, http://www.hex-rays.com/products/ida/processors.shtml (June 7, 2013)
National Bureau of Standards, Data Encryption Standard, in FIPS-Pub.46, Federal Information Processing Standards Publication (1977)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 International Association for Cryptologic Research
About this paper
Cite this paper
Strobel, D. et al. (2013). Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System. In: Canetti, R., Garay, J.A. (eds) Advances in Cryptology – CRYPTO 2013. CRYPTO 2013. Lecture Notes in Computer Science, vol 8042. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40041-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-40041-4_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40040-7
Online ISBN: 978-3-642-40041-4
eBook Packages: Computer ScienceComputer Science (R0)