Attacks on the DECT Authentication Mechanisms
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario
ICWMC '09 Proceedings of the 2009 Fifth International Conference on Wireless and Mobile Communications
Cryptanalysis of the DECT standard cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
FPGA implementation of an improved attack against the DECT standard cipher
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
ACM WiSec 2011 poster and demo session
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
DECT is a widely deployed standard mostly used for short range wireless phones. So far, no method has been published which is able to recover the audio signal in a call that is encrypted and lasts only for a few minutes. In this paper, we present a method that recovers the audio signal sent from the phone to its base station in an encrypted call. To do so, we use a replay-attack against the phone to recover the key streams, which were used to encrypt the call. The method is applicable to short calls too, where not enough keystreams are available to recover the ciphers key using a key recovery attack on DSC. The method is fast and practical and can be executed at very low cost.