25C3 - 1.4.2.3
25th Chaos Communication Congress
Nothing to hide
Speakers | |
---|---|
Andreas Schuler | |
Erik Tews | |
Ralf-Philipp Weinmann |
Schedule | |
---|---|
Day | Day 3 (2008-12-29) |
Room | Saal 1 |
Start time | 17:15 |
Duration | 01:00 |
Info | |
ID | 2937 |
Event type | lecture |
Track | Hacking |
Language used for presentation | en |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
DECT
The Digital Enhanced Cordless Telecommunications standard
Digital Enhanced Cordless Telecommunications (DECT) is a synonym for cordless phones today. Although DECT can be found nearly everywhere, only little is known about the security of DECT. Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public. Nevertheless we decided to investigate the security of DECT closer ...
Digital Enhanced Cordless Telecommunications (DECT) is a synonm for cordless phones today. Although DECT can be found nearly everywhere, only little is known about the security of DECT. Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public.
We will show you the following:
- An introduction into the DECT protocol.
- An introduction to the DECT authentication and key management functions.
- An introduction into the DECT low level communication.
- A detailed security analysis of the protocol.
- The secret DSAA algorithm
- Parts of the secret DSC algorithm