The alarm is not opened by a code grabber?

0 like 0 dislike
10 views
I read the forums. Encryption. Secret development. Industrial espionage. What is all this?

I don't see why not just store 100500 disposable keys in the signaling and the key FOB.

Comes to mind a simple algorithm. Keychain starts a session. The signaling prompts for a password room 27836297. Keychain says the password and the command. All. Incomplete session completed in a few seconds. Each password is requested only once.

Opening such a code grabber would be impossible even theoretically. Why not to do it?

And what kind of signaling is still advise to put?
asked by | 10 views

7 Answers

0 like 0 dislike
1. The algorithm requires two-way communication. In a simple signaling (which shall be opened by the grabber) the data flow is unidirectional: the key FOB transmitter in the base unit receiver.
\r
1.1 If we have a two-way channel that prevents use of normal cryptographic authentication protocols? Logic podskazyvet that modern signaling and done. A specific model will not name, very interesting. Manufacturers somehow hiding information about its protocols.
\r
2. Passwords need not just in order but randomly (but making sure there was no repetition). Otherwise the following attack:
— The victim takes the car with the alarm. Keychain starts a session. The signaling prompts for a password number 100500. Keychain says the password and the command. Remember the number of.
— The victim gets in the car and go, follow it.
The victim puts the car on the alarm. Keychain starts a session. Put the hindrance, the base hears nothing.
Pretend to be a base and the required password number 100501. Keychain says the password and the command. Recordable.
The victim sees that nothing happened, and then he presses the button. Keychain starts a session. Again put the obstacle base again hears nothing.
Pretend to be a base and the required password number 100502. Keychain says the password and the command. Recordable.
Pretend to be a FOB and start the session. Database prompts for a password number 100501. Spoken password and command.
— The machine is armed, the victim leaves.
Pretend to be a FOB and start the session. Database prompts for a password number 100502. Spoken password and command. Our machine.
\r
3. The keychain is poorly protected from copying. It's one thing to store a 128-bit key protected memory inside the crypto processor and the other hundreds of KB-megabytes of disposable keys. You will need an external flash drive, which can be easily read.
\r
4. What to do when the keys still end? To reprogram the alarm? To generate a new one? And how them then to the FOB to fill? You should carefully consider this point.
\r
5. How will the procedure of adding a new FOB?
\r
In General the idea is good and with proper implementation will work reliably. But the devil, as always, in the details :)
answered by
0 like 0 dislike
still, asymmetric encryption — best solves the problem.
answered by
0 like 0 dislike
In General, for a long time almost all of the car alarms began to use dynamic code. Started back when I was a little boy and worked as an electrician/alarm installer. About 15 years ago. Although these are now robbed, but the alarm with fixed code, I think, now still need to search. You can install code dialog box, grabbers do not reveal. But much depends on the setting.
answered by
0 like 0 dislike
Many systems initiate the session by pressing a button on the key FOB, and on his appearance in the "visible area" of the base. These are opened by relay signal.
answered by
0 like 0 dislike
Probably, developers of such systems is beneficial to drove cars and bought a new one. Other explanations, given the current the level of development of the technology, I do not see.
answered by
0 like 0 dislike
Put mechanical protection!
answered by
0 like 0 dislike
Now the most resistant electronic burglary alarm with dialog code.
I can recommend Pandora (line DXL is above 3210, LX, Pandect X)
Or any Starline (with index above 60 - A61, E60, a64, etc.)

These manufacturers guarantee protection from hacking. If anyone can hack, the producers promise to pay 5 million rubles as a reward.
answered by

Related questions

0 like 0 dislike
3 answers
0 like 0 dislike
4 answers
asked Sep 23, 2018 by Viva33
0 like 0 dislike
1 answer
0 like 0 dislike
1 answer
0 like 0 dislike
1 answer
24,509 questions
45,932 answers
0 comments
397 users