Physical and cryptoanalytical attacks on digital locking systems
نویسنده
چکیده
In many installations, traditional locks have been replaced with new type of locks, which do not rely on mechanical security for guarding the doors. Mechanical locks hold several weaknesses, which are due to bad mechanical engineering, tolerances within cylinders, small number of different combinations etc. As the entry cost is small and learning curve for obtaining basic skills is steep, then there are many hobbyists who are into lock picking. For example, simple lock picking sets are available starting from 5 euros, while more advanced and well made sets are available for less than 100 euros. De facto guide for autodidacts is MIT Guide to Lock Picking [7], which has been available for over two decades. More recent methods as bump keying [8] have made most locks practically insecure against a well-learned adversary. The method of key bumping uses specially carved keys, which on being bumped with rubber hammer forces the pins in the lock against deformations and thus opening the lock. Access right management for traditional locks is based on physical possession of the key. If one needs to revoke the access right, then either the key should be returned or the lock reset. Returning the key does not always imply removing the access right as it may be copied. Even if copying the keys has been made hard (eg. through licensing policies), it merely imposes organisational not physical restrictions. All in all, these problems have lead to the creation of a new type of locks, called digital locks. Their security is based on some cryptographic protocols or in some cases obscurity. In theory, there are several nearly-perfect protocols which have received enough scrutiny so that the locks could be impenetrable. In this review we see, that for a certain product this is not the case. In general, when digital locks are attacked, then attacks are due to using insecure primitives. One has also to consider that embedded hardware runs in very constrained environments the design has to consider the scarce amount of randomness and tightly bounded computing and storage capabilities.
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملWhen Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice
In the past years, various electronic access control systems have been found to be insecure. In consequence, attacks have emerged that permit unauthorized access to secured objects. One of the few remaining, allegedly secure digital locking systems—the system 3060 manufactured and marketed by SimonsVoss—is employed in numerous objects worldwide. Following the trend to analyze the susceptibility...
متن کاملJTAG Security Extension Using Locking Mechanism ( work in progress )
In this paper we address the security problems of systems incorporating JTAG test infrastructure and briefly review the proposed solutions. In the following, we focus on JTAG locking mechanism and indicate some modifications to improve its resistance against possible attacks. Keywords—JTAG; security; locking mechanism;
متن کاملA Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization
This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...
متن کاملA Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization
This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013