Skip to main content

2015 | OriginalPaper | Buchkapitel

Improved Cryptanalysis of the DECT Standard Cipher

verfasst von : Iwen Coisel, Ignacio Sanchez

Erschienen in: Cryptographic Hardware and Embedded Systems -- CHES 2015

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The DECT Standard Cipher (DSC) is a 64-bit key stream cipher used in the Digital Enhanced Cordless Telecommunications (DECT) standard to protect the confidentiality of the communications. In this paper we present an improved cryptanalysis approach which is more effective than the Nohl-Tews-Weinmann (NTW) attack and requires four times less plaintext material. Under the best conditions, our known plaintext attack requires only 3 min of communication compared to 10 min for the NTW attack. Our approach is able to quickly recover the secret key with a success rate of more than 50 % by analysing \(2^{13}\) keystreams and performing an exhaustive search over \(2^{31}\) keys. Additionally, the attack was successfully conducted against real intercepted DECT traffic where the plaintext was only 90 % accurate. To the best of our knowledge, the approach we present in this paper is the most effective cryptanalysis published so far against the DSC cipher.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The number of DECT devices sold reaches 820 million with a proliferation of 100 million new devices per year.
 
2
The internal detail and reference implementation of the DSC algorithm is only available under non-disclosure agreements.
 
Literatur
1.
Zurück zum Zitat Coisel, I., Sanchez, I.: Practical interception of DECT encrypted voice communication in unified communications environments. In: IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, pp. 115–122. IEEE (2014) Coisel, I., Sanchez, I.: Practical interception of DECT encrypted voice communication in unified communications environments. In: IEEE Joint Intelligence and Security Informatics Conference, JISIC 2014, pp. 115–122. IEEE (2014)
3.
Zurück zum Zitat Lucks, S., Schuler, A., Tews, E., Weinmann, R.-P., Wenzel, M.: Attacks on the DECT authentication mechanisms. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 48–65. Springer, Heidelberg (2009) CrossRef Lucks, S., Schuler, A., Tews, E., Weinmann, R.-P., Wenzel, M.: Attacks on the DECT authentication mechanisms. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 48–65. Springer, Heidelberg (2009) CrossRef
4.
Zurück zum Zitat Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 1–18. Springer, Heidelberg (2004) CrossRef Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 1–18. Springer, Heidelberg (2004) CrossRef
5.
Zurück zum Zitat McHardy, P., Schuler, A., Tews, E.: Interactive decryption of DECT phone calls. In: Proceedings of the fourth ACM Conference on Wireless Network Security, pp. 71–78. ACM (2011) McHardy, P., Schuler, A., Tews, E.: Interactive decryption of DECT phone calls. In: Proceedings of the fourth ACM Conference on Wireless Network Security, pp. 71–78. ACM (2011)
6.
Zurück zum Zitat Nohl, K., Tews, E., Weinmann, R.-P.: Cryptanalysis of the DECT standard cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 1–18. Springer, Heidelberg (2010) CrossRef Nohl, K., Tews, E., Weinmann, R.-P.: Cryptanalysis of the DECT standard cipher. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 1–18. Springer, Heidelberg (2010) CrossRef
7.
Zurück zum Zitat Sanchez, I., Baldini, G., Shaw, D., Giuliani, R.: Experimental Passive Eavesdropping of Digital enhanced cordless telecommunication voice communications through low-cost software defined radios. Secur. Commun. Netw. 8(3), 403–417 (2014)CrossRef Sanchez, I., Baldini, G., Shaw, D., Giuliani, R.: Experimental Passive Eavesdropping of Digital enhanced cordless telecommunication voice communications through low-cost software defined radios. Secur. Commun. Netw. 8(3), 403–417 (2014)CrossRef
8.
Zurück zum Zitat Weiner, M., Tews, E., Heinz, B., Heyszl, J.: FPGA implementation of an improved attack against the DECT standard cipher. In: Proceedings of the 13th International Conference on Information Security and Cryptology, ICISC 2010, pp. 177–188. Springer-Verlag (2011) Weiner, M., Tews, E., Heinz, B., Heyszl, J.: FPGA implementation of an improved attack against the DECT standard cipher. In: Proceedings of the 13th International Conference on Information Security and Cryptology, ICISC 2010, pp. 177–188. Springer-Verlag (2011)
Metadaten
Titel
Improved Cryptanalysis of the DECT Standard Cipher
verfasst von
Iwen Coisel
Ignacio Sanchez
Copyright-Jahr
2015
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-48324-4_14

Premium Partner