Content deleted Content added
Avoid the implication that the systems are completely secure, especially given lack of a citation Tags: Visual edit Mobile edit Mobile web edit Advanced mobile edit |
Notedorgel (talk | contribs) →External links: Update broken link Tags: Mobile edit Mobile web edit |
||
(3 intermediate revisions by 3 users not shown) | |||
Line 15:
== Application in RF remote control ==
A rolling code transmitter is useful in a security system for improving the security of [[radio frequency]] (RF) transmission, comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and seeing that they pass a set of algorithmic checks, a signal is generated to actuate an electric motor to open or close a movable component.{{citation-needed|date=November 2023}}
== Rolling code vs. fixed code RF remote control ==
Line 25:
{{main|KeeLoq}}
The Microchip HCS301 was once the most widely used system on garage and gate remote control and receivers. The chip uses the KeeLoq algorithm. The HCS301 KeeLoq system transmits 66 data bits
* 34 bits are not encrypted
* 32 bits are encrypted (the rolling code)
As detailed at [[KeeLoq]], the algorithm has been shown to be vulnerable to a variety of attacks, and has been completely [[Broken (cryptography)|broken]].
== Rolljam vulnerability ==
Line 37 ⟶ 39:
==External links==
* [http://auto.howstuffworks.com/remote-entry1.htm How Remote Entry Works]; cites successful attack on KeeLoq.
* Atmel Inc.'s application note [
[[Category:Radio electronics]]
|