Content deleted Content added
Note more sophisticated version of replay attack that does work Tags: Visual edit Mobile edit Mobile web edit Advanced mobile edit |
Notedorgel (talk | contribs) →External links: Update broken link Tags: Mobile edit Mobile web edit |
||
(4 intermediate revisions by 3 users not shown) | |||
Line 15:
== Application in RF remote control ==
A rolling code transmitter is useful in a security system for
== Rolling code vs. fixed code RF remote control ==
Line 25:
{{main|KeeLoq}}
The Microchip HCS301 was once the most widely used system on garage and gate remote control and receivers. The chip uses the KeeLoq algorithm. The HCS301 KeeLoq system transmits 66 data bits
* 34 bits are not encrypted
* 32 bits are encrypted (the rolling code)
As detailed at [[KeeLoq]], the algorithm has been shown to be vulnerable to a variety of attacks, and has been completely [[Broken (cryptography)|broken]].
== Rolljam vulnerability ==
Line 37 ⟶ 39:
==External links==
* [http://auto.howstuffworks.com/remote-entry1.htm How Remote Entry Works]; cites successful attack on KeeLoq.
* Atmel Inc.'s application note [
[[Category:Radio electronics]]
|