Content deleted Content added
Notedorgel (talk | contribs) →External links: Update broken link Tags: Mobile edit Mobile web edit |
|||
(39 intermediate revisions by 29 users not shown) | |||
Line 1:
{{short description|Changing keyless entry code for extra security}}
{{redirect|
A '''rolling code''' (or sometimes called a '''hopping code''') is used in [[keyless entry]] systems to prevent a simple form of [[replay attack]]
== Techniques ==
Line 9 ⟶ 10:
* Receiver compares 'next' to its calculated 'next' code.
* A typical implementation compares within the next 256 codes in case receiver missed some transmitted keypresses.
[[HMAC-based one-time password]] employed widely in [[multi-factor authentication]] uses similar approach, but with pre-shared secret key and [[HMAC]] instead of PRNG and pre-shared [[random seed]].
== Application in RF remote control ==
A rolling code transmitter is useful in a security system for
== Rolling code vs. fixed code RF remote control ==
Remote controls send
== KeeLoq ==
Line 22 ⟶ 25:
{{main|KeeLoq}}
The Microchip HCS301 was once the most widely used system on garage and gate remote control and receivers. The chip uses the KeeLoq algorithm. The HCS301 KeeLoq system transmits 66 data bits
* 34 bits are not encrypted
* 32 bits are encrypted (the rolling code)
As detailed at [[KeeLoq]], the algorithm has been shown to be vulnerable to a variety of attacks, and has been completely [[Broken (cryptography)|broken]].
==
A rolling code transmitted by radio signal that can be intercepted can be vulnerable to falsification. In 2015, it was reported that [[Samy Kamkar]] had built an inexpensive electronic device about the size of a wallet that could be concealed on or near a locked vehicle to capture a single keyless entry code to be used at a later time to unlock the vehicle. The device transmits a jamming signal to block the vehicle's reception of rolling code signals from the owner's fob, while recording these signals from both of his two attempts needed to unlock the vehicle. The recorded first code is forwarded (replayed) to the vehicle only when the owner makes the second attempt, while the recorded second code is retained for future use. Kamkar stated that this vulnerability had been widely known for years to be present in many vehicle types, but was previously undemonstrated.<ref name="RollinCode">{{cite news | title=A hacker made a $30 gadget that can unlock many cars that have keyless entry | url=http://www.techinsider.io/samy-kamkar-keyless-entry-car-hack-2015-8
== References ==
Line 34 ⟶ 39:
==External links==
* [http://auto.howstuffworks.com/remote-entry1.htm How Remote Entry Works]; cites successful attack on KeeLoq.
* Atmel Inc.'s application note [
[[Category:Radio electronics]]
|