Skip to main content

Linear Slide Attacks on the KeeLoq Block Cipher

  • Conference paper
Information Security and Cryptology (Inscrypt 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4990))

Included in the following conference series:

Abstract

KeeLoq is a block cipher used in numerous widespread passive entry and remote keyless entry systems as well as in various component identification applications. The KeeLoq algorithm has a 64-bit key and operates on 32-bit blocks. It is based on an NLFSR with a nonlinear feedback function of 5 variables.

In this paper new key recovery attacks on KeeLoq are proposed. The first one has a complexity of about 250.6 KeeLoq encryptions. The second attack finds the key in 237 encryptions and works for the whole key space. In our attacks we use the techniques of guess-and-determine, slide, and linear attacks as well as cycle structure analysis. Both attacks need 232 known plaintext-ciphertext pairs.

We also analyze the KeeLoq key management and authentication protocols applied in rolling-code and IFF access systems widely used in real-world applications. We demonstrate several practical vulnerabilities.

This is a short version of the full work on the analysis of KeeLoq systems presented at the 3rd Conference on RFID Security (RFIDSec’07) in Malaga, Spain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bogdanov, A.: Attacks in the KeeLoq Block Cipher and Authentication Systems. In: The 3rd Conference on RFID Security (RFIDSec 2007), Malaga, Spain (2007)

    Google Scholar 

  2. Wikipedia: Keeloq algorithm (2006), http://en.wikipedia.org/wiki/KeeLoq

  3. HomeLink: Homelink and KeeLoq-based Rolling Code Garage Door Openers (2006), http://www.homelink.com/home/keeloq.tml

  4. Microchip: Hopping Code Decoder using a PIC16C56, AN642 (1998), http://en.wikipedia.org/wiki/KeeLoq and http://www.keeloq.boom.ru/decryption.pdf

  5. Microchip: An Introduction to KeeLoq Code Hopping (1996), http://ww1.microchip.com/downloads/en/AppNotes/91002a.pdf

  6. Microchip: HCS101 Fixed Code Encoder Data Sheet (2001), http://ww1.microchip.com/downloads/en/DeviceDoc/41115c.pdf

  7. Microchip: Using KeeLoq to Validate Subsystem Compatibility, AN827 (2002), http://ww1.microchip.com/downloads/en/AppNotes/00827a.pdf

  8. Microchip: PIC12F635/PIC16F636/PIC16F639 Cryptographic Module General Overview, TB086 (2005), http://ww1.microchip.com/downloads/en/DeviceDoc/91086A.pdf

  9. Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  10. Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  11. Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, Springer, Heidelberg (2007)

    Google Scholar 

  12. Courtois, N., Bard, G.: Algebraic and Slide attacks on KeeLoq (2007), http://eprint.iacr.org/2007/062

  13. Siegenthaler, T.: Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Trans. on Inform. Theory IT-30 (1984)

    Google Scholar 

  14. Siegenthaler, T.: Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. on Computers 34 (1985)

    Google Scholar 

  15. Chor, B., Goldreich, O., Hastad, J., Fridman, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem or t-Resilient Functions. In: 26th Symposium on Foundations of Computer Science (1985)

    Google Scholar 

  16. Baigneres, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, Springer, Heidelberg (2004)

    Google Scholar 

  17. Menezes, A., van Oorshot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  18. Microchip: HCS301 KeeLoq Code Hopping Encoder Data Sheet (2001), http://ww1.microchip.com/downloads/en/devicedoc/21143b.pdf

  19. Microchip: HCS410 Keeloq Code Hopping Encoder and Transponder (2001), http://ww1.microchip.com/downloads/en/DeviceDoc/40158e.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Dingyi Pei Moti Yung Dongdai Lin Chuankun Wu

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bogdanov, A. (2008). Linear Slide Attacks on the KeeLoq Block Cipher. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79499-8_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79498-1

  • Online ISBN: 978-3-540-79499-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics