skip to main content
10.1145/1455770.1455830acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Reconsidering physical key secrecy: teleduplication via optical decoding

Published: 27 October 2008 Publication History

Abstract

The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private --- that duplication should require either possession of the key or a priori knowledge of how it was cut. However, the ever-increasing capabilities and prevalence of digital imaging technologies present a fundamental challenge to this privacy assumption. Using modest imaging equipment and standard computer vision algorithms, we demonstrate the effectiveness of physical key teleduplication --- extracting a key's complete and precise bitting code at a distance via optical decoding and then cutting precise duplicates. We describe our prototype system, Sneakey, and evaluate its effectiveness, in both laboratory and real-world settings, using the most popular residential key types in the U.S.

References

[1]
S. Belongie, J. Malik, and J. Puzicha. Matching Shapes. In Proceedings of the Eighth Internet Conference on Computer Vision (ICCV), July 2001.
[2]
M. Blaze. Rights Amplification in Master-Keyed Mechanical Locks. IEEE Security and Privacy, 1(2):24--32, 2003.
[3]
S.C. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Sydlo. Security Analysis of a Crypographically-Enabled RFID Device. In Proceedings of the USENIX Security Symposium, July 2005.
[4]
J. Bonomi. Nineveh and Its Palaces: Discoveries of Botta and Layard, Applied to the Elucidation of Holy Writ (3rd ed). H.G Bohn, London, 1857.
[5]
CIA. CIA Field-Expedient Key Casting Manual (reprint). Paladin Press, 1989.
[6]
Fortress Lock and Safe Co. Easy entrie. http://www.fortresslock.co.uk/trade/index.htm, 2008.
[7]
J.A. Halderman. Diebold shows how to make your 0wn voting machine key. http://www.freedom-to-tinker.com/?p=1113, 2007.
[8]
R. Hartley and A. Zisserman. Multiple View Geometry in Computer Vision. Cambridge University Press, 2003.
[9]
M. McCloud and G. de Santos. Visual Guide to Lock Picking (3rd ed). Standard Publications, 2007.
[10]
Multipick-Service. High tech key duplication system. http://www.multipick--service.cc/htdocs/en/werkzeug/hightechsk/hightechs%k.php, 2008.
[11]
B. Phillips. The Complete Book of Locks and Locksmithing (6th ed). McGraw-Hill, 2005.
[12]
S.F. Ray. Scientic Photography and Applied Imaging. Focal Press, 1999.
[13]
M.W. Tobias. Locks, Safes and Security: An International Police Reference (2nd Ed). Charles C. Thomas, Springfield, IL, USA, 2000.
[14]
B. Wels and R. Gonggrijp. Bumping locks. http://www.toool.nl/bumping.pdf, 2005.
[15]
A. Zisserman. Matlab functions for multiple view geoemtry. http://www.robots.ox.ac.uk/~vgg/hzbook/code/, 2008.

Cited By

View all
  • (2021)Database-Assisted 3D Reconstruction and Printing of a Mechanical Key From a Single PhotographIEEE Access10.1109/ACCESS.2021.30499969(10729-10736)Online publication date: 2021
  • (2020)Image Privacy Prediction Using Deep Neural NetworksACM Transactions on the Web10.1145/338608214:2(1-32)Online publication date: 9-Apr-2020
  • (2020)Listen to Your KeyProceedings of the 21st International Workshop on Mobile Computing Systems and Applications10.1145/3376897.3377853(3-8)Online publication date: 3-Mar-2020
  • Show More Cited By

Index Terms

  1. Reconsidering physical key secrecy: teleduplication via optical decoding

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
      October 2008
      590 pages
      ISBN:9781595938107
      DOI:10.1145/1455770
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. keys
      2. physical security
      3. teleduplication

      Qualifiers

      • Research-article

      Conference

      CCS08
      Sponsor:

      Acceptance Rates

      CCS '08 Paper Acceptance Rate 51 of 280 submissions, 18%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)39
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Database-Assisted 3D Reconstruction and Printing of a Mechanical Key From a Single PhotographIEEE Access10.1109/ACCESS.2021.30499969(10729-10736)Online publication date: 2021
      • (2020)Image Privacy Prediction Using Deep Neural NetworksACM Transactions on the Web10.1145/338608214:2(1-32)Online publication date: 9-Apr-2020
      • (2020)Listen to Your KeyProceedings of the 21st International Workshop on Mobile Computing Systems and Applications10.1145/3376897.3377853(3-8)Online publication date: 3-Mar-2020
      • (2020)PassTag: A Graphical-Textual Hybrid Fallback Authentication SystemProceedings of the 15th ACM Asia Conference on Computer and Communications Security10.1145/3320269.3384737(60-72)Online publication date: 5-Oct-2020
      • (2019)g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart DevicesIEEE Transactions on Consumer Electronics10.1109/TCE.2019.289571565:2(215-223)Online publication date: 1-May-2019
      • (2019)DeepKey: Towards End-to-End Physical Key Replication from a Single PhotographPattern Recognition10.1007/978-3-030-12939-2_34(487-502)Online publication date: 14-Feb-2019
      • (2018)Beat-PINProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196543(101-115)Online publication date: 29-May-2018
      • (2018)On the Use of "Deep" Features for Online Image SharingCompanion Proceedings of the The Web Conference 201810.1145/3184558.3191572(1317-1321)Online publication date: 23-Apr-2018
      • (2018)A Shoulder Surfing Resistant Graphical Authentication SystemIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2016.253994215:2(180-193)Online publication date: 1-Mar-2018
      • (2018)Hierarchical Content Based Key Retrieval2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD)10.1109/ICABCD.2018.8465409(1-6)Online publication date: Aug-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media