Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
The Megamos Crypto transponder is used in one of the most widely deployed electronic
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …
[PDF][PDF] Gone in 360 seconds: Hijacking with Hitag2
An electronic vehicle immobilizer is an anti-theft device which prevents the engine of the
vehicle from starting unless the corresponding transponder is present. Such a transponder is …
vehicle from starting unless the corresponding transponder is present. Such a transponder is …
[PDF][PDF] Tutorial: Proxmark, the swiss army knife for RFID security research
This paper gives a hands-on introduction to the Proxmark, a versatile tool for RFID security
research. It can be used to analyze and reverse engineer RFID protocols deployed in …
research. It can be used to analyze and reverse engineer RFID protocols deployed in …
Dismantling iclass and iclass elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless
smart cards on the market. It is widely used for access control, secure login and payment …
smart cards on the market. It is widely used for access control, secure login and payment …
[PDF][PDF] The (in) security of proprietary cryptography
R Verdult - 2015 - repository.ubn.ru.nl
Proprietary cryptography is a term used to describe custom encryption techniques that are
kept secret by its designers to add additional security. It is questionable if such an approach …
kept secret by its designers to add additional security. It is questionable if such an approach …
A toolbox for RFID protocol analysis
Many RFID tags and contact less smart cards use proprietary security mechanisms for
authentication and confidentiality. There are several examples in the literature showing that …
authentication and confidentiality. There are several examples in the literature showing that …
Wirelessly lockpicking a smart card reader
With more than 300 million cards sold, HID iClass is one of the most popular contactless
smart cards on the market. It is widely used for access control, secure login and payment …
smart cards on the market. It is widely used for access control, secure login and payment …
[PDF][PDF] Introduction to cryptanalysis: attacking stream ciphers
R Verdult - Institute for Computing and Information Sciences …, 2001 - cs.ru.nl
This article contains an elementary introduction to the cryptanalysis of stream ciphers.
Initially, a few historical examples are given to explain the core aspects of cryptography and …
Initially, a few historical examples are given to explain the core aspects of cryptography and …
Cryptanalysis of INCrypt32 in HID's iCLASS Systems
CK Kim, EG Jung, DH Lee, CH Jung… - IEICE Transactions on …, 2013 - search.ieice.org
The cryptographic algorithm called INCrypt32 is a MAC algorithm to authenticate
participants, RFID cards and readers, in HID Global's iCLASS systems. HID's iCLASS cards …
participants, RFID cards and readers, in HID Global's iCLASS systems. HID's iCLASS cards …
Don't push it: breaking iButton security
C Brandt, M Kasper - … Symposium on Foundations and Practice of Security, 2013 - Springer
Maxims iButtons are small portable (steel) tokens that can be attached to objects (eg, keys,
fobs) and are deployed in various applications from access control to devices and buildings …
fobs) and are deployed in various applications from access control to devices and buildings …