Interactive decryption of DECT phone calls
Proceedings of the fourth ACM conference on Wireless network security
FPGA implementation of an improved attack against the DECT standard cipher
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Hi-index | 0.00 |
We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force architecture to efficiently recalculate all communication-related shared secrets between the DECT base station and handset. The efficiency of our architecture is demonstrated by a highly pipelined, multi-brute-force-component FPGA implementation. It exploits common weak random number generators implemented at the DECT base stations and a weak authentication scheme between the DECT base stations and their handsets.