Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer

R Verdult, FD Garcia, B Ege - Supplement to the Proceedings of 22nd …, 2015 - usenix.org
The Megamos Crypto transponder is used in one of the most widely deployed electronic
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …

[PDF][PDF] Gone in 360 seconds: Hijacking with Hitag2

R Verdult, FD Garcia, J Balasch - 21st USENIX Security Symposium …, 2012 - usenix.org
An electronic vehicle immobilizer is an anti-theft device which prevents the engine of the
vehicle from starting unless the corresponding transponder is present. Such a transponder is …

[PDF][PDF] Tutorial: Proxmark, the swiss army knife for RFID security research

This paper gives a hands-on introduction to the Proxmark, a versatile tool for RFID security
research. It can be used to analyze and reverse engineer RFID protocols deployed in …

Dismantling iclass and iclass elite

FD Garcia, G de Koning Gans, R Verdult… - … Security–ESORICS 2012 …, 2012 - Springer
With more than 300 million cards sold, HID iClass is one of the most popular contactless
smart cards on the market. It is widely used for access control, secure login and payment …

[PDF][PDF] The (in) security of proprietary cryptography

R Verdult - 2015 - repository.ubn.ru.nl
Proprietary cryptography is a term used to describe custom encryption techniques that are
kept secret by its designers to add additional security. It is questionable if such an approach …

A toolbox for RFID protocol analysis

R Verdult, G de Koning Gans… - 2012 Fourth International …, 2012 - ieeexplore.ieee.org
Many RFID tags and contact less smart cards use proprietary security mechanisms for
authentication and confidentiality. There are several examples in the literature showing that …

Wirelessly lockpicking a smart card reader

FD Garcia, G de Koning Gans, R Verdult - International journal of …, 2014 - Springer
With more than 300 million cards sold, HID iClass is one of the most popular contactless
smart cards on the market. It is widely used for access control, secure login and payment …

[PDF][PDF] Introduction to cryptanalysis: attacking stream ciphers

R Verdult - Institute for Computing and Information Sciences …, 2001 - cs.ru.nl
This article contains an elementary introduction to the cryptanalysis of stream ciphers.
Initially, a few historical examples are given to explain the core aspects of cryptography and …

Cryptanalysis of INCrypt32 in HID's iCLASS Systems

CK Kim, EG Jung, DH Lee, CH Jung… - IEICE Transactions on …, 2013 - search.ieice.org
The cryptographic algorithm called INCrypt32 is a MAC algorithm to authenticate
participants, RFID cards and readers, in HID Global's iCLASS systems. HID's iCLASS cards …

Don't push it: breaking iButton security

C Brandt, M Kasper - … Symposium on Foundations and Practice of Security, 2013 - Springer
Maxims iButtons are small portable (steel) tokens that can be attached to objects (eg, keys,
fobs) and are deployed in various applications from access control to devices and buildings …