Paper 2011/242
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
Idan Sheetrit and Avishai Wool
Abstract
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several attacks have been published. When a random seed is not used the attack on the system is fairly straight-forward. However when a seed is shared between the remote control and the receiver previous research suggested using highly parallel crypto hardware (like COPACOBANA) for breaking the cipher within reasonable time. In this paper we show that highly-parallel hardware is not necessary: our attack uses a single FPGA for breaking KeeLoq when using a 48-bit random seed in 17 hours using a mid-range Virtex-4, and less than 3 hours using a high-end Virtex-6 chip. We achieve these results using a combination of algorithmic improvements, FPGA design methodology, and Xilinx-specific features.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Contact author(s)
- yash @ eng tau ac il
- History
- 2011-05-18: received
- Short URL
- https://ia.cr/2011/242
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/242, author = {Idan Sheetrit and Avishai Wool}, title = {Cryptanalysis of {KeeLoq} code-hopping using a Single {FPGA}}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/242}, year = {2011}, url = {https://eprint.iacr.org/2011/242} }