Abstract
KeeLoq is a block cipher used in numerous widespread passive entry and remote keyless entry systems as well as in various component identification applications. The KeeLoq algorithm has a 64-bit key and operates on 32-bit blocks. It is based on an NLFSR with a nonlinear feedback function of 5 variables.
In this paper new key recovery attacks on KeeLoq are proposed. The first one has a complexity of about 250.6 KeeLoq encryptions. The second attack finds the key in 237 encryptions and works for the whole key space. In our attacks we use the techniques of guess-and-determine, slide, and linear attacks as well as cycle structure analysis. Both attacks need 232 known plaintext-ciphertext pairs.
We also analyze the KeeLoq key management and authentication protocols applied in rolling-code and IFF access systems widely used in real-world applications. We demonstrate several practical vulnerabilities.
This is a short version of the full work on the analysis of KeeLoq systems presented at the 3rd Conference on RFID Security (RFIDSec’07) in Malaga, Spain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bogdanov, A.: Attacks in the KeeLoq Block Cipher and Authentication Systems. In: The 3rd Conference on RFID Security (RFIDSec 2007), Malaga, Spain (2007)
Wikipedia: Keeloq algorithm (2006), http://en.wikipedia.org/wiki/KeeLoq
HomeLink: Homelink and KeeLoq-based Rolling Code Garage Door Openers (2006), http://www.homelink.com/home/keeloq.tml
Microchip: Hopping Code Decoder using a PIC16C56, AN642 (1998), http://en.wikipedia.org/wiki/KeeLoq and http://www.keeloq.boom.ru/decryption.pdf
Microchip: An Introduction to KeeLoq Code Hopping (1996), http://ww1.microchip.com/downloads/en/AppNotes/91002a.pdf
Microchip: HCS101 Fixed Code Encoder Data Sheet (2001), http://ww1.microchip.com/downloads/en/DeviceDoc/41115c.pdf
Microchip: Using KeeLoq to Validate Subsystem Compatibility, AN827 (2002), http://ww1.microchip.com/downloads/en/AppNotes/00827a.pdf
Microchip: PIC12F635/PIC16F636/PIC16F639 Cryptographic Module General Overview, TB086 (2005), http://ww1.microchip.com/downloads/en/DeviceDoc/91086A.pdf
Biryukov, A., Wagner, D.: Slide Attacks. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, Springer, Heidelberg (1999)
Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, Springer, Heidelberg (2000)
Biham, E., Dunkelman, O., Keller, N.: Improved Slide Attacks. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, Springer, Heidelberg (2007)
Courtois, N., Bard, G.: Algebraic and Slide attacks on KeeLoq (2007), http://eprint.iacr.org/2007/062
Siegenthaler, T.: Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications. IEEE Trans. on Inform. Theory IT-30 (1984)
Siegenthaler, T.: Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. on Computers 34 (1985)
Chor, B., Goldreich, O., Hastad, J., Fridman, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem or t-Resilient Functions. In: 26th Symposium on Foundations of Computer Science (1985)
Baigneres, T., Junod, P., Vaudenay, S.: How Far Can We Go Beyond Linear Cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, Springer, Heidelberg (2004)
Menezes, A., van Oorshot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Microchip: HCS301 KeeLoq Code Hopping Encoder Data Sheet (2001), http://ww1.microchip.com/downloads/en/devicedoc/21143b.pdf
Microchip: HCS410 Keeloq Code Hopping Encoder and Transponder (2001), http://ww1.microchip.com/downloads/en/DeviceDoc/40158e.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bogdanov, A. (2008). Linear Slide Attacks on the KeeLoq Block Cipher. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds) Information Security and Cryptology. Inscrypt 2007. Lecture Notes in Computer Science, vol 4990. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79499-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-79499-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-79498-1
Online ISBN: 978-3-540-79499-8
eBook Packages: Computer ScienceComputer Science (R0)