Design and Security Considerations for Passive Immobilizer Systems
|
|
|
- Maude Gilmore
- 10 years ago
- Views:
Transcription
1 Design and Security Considerations for Passive Immobilizer Systems Jim Goings, Toby Prescott, Michael Hahnen, Karl Militzer For years, consumers have come to rely on the convenience and added security that a passive vehicle immobilizer system offers. These systems consist of a key fob, carried by the driver, and a base station, mounted in the vehicle. They work together to determine if the driver is authorized to start the vehicle. Of equal or greater importance is the system s ability to prevent unauthorized sources from using the vehicle. While top-level functionality of a vehicle immobilizer is simple to describe, the underlying technology enabling it is intriguing and sophisticated. This article will explore both the hardware and software aspects of vehicle immobilizer systems as well as offer noteworthy comments on design and security considerations. Communication The prevailing method of communication between key fob and vehicle in passive vehicle immobilizer systems today is with a modulated magnetic field. This field is created by the vehicle s immobilizer base station from a low frequency alternating current, typically 125kHz. The magnetic field serves three fundamental purposes: A) the power source for the key fob, hence the term passive, B) a carrier on which information from the base station to key fob is conveyed, e.g. downlink, C) a carrier on which information from the key fob to the base station is conveyed, e.g. uplink. Characteristics of magnetic fields that are of particular appeal for a vehicle immobilizer system pertain most to the key fob s need to operate completely passively, e.g. without a battery. Downlink field detection and uplink field modulation can both be achieved using circuitry that consumes very little current. Furthermore, harnessing sufficient field energy to power these circuits in the key fob electronics can be achieved with relative ease. During the system design phase, care must be taken to carefully consider key performance parameters such as key fob energy requirements, which affect antenna coil geometries and drive levels, and the authentication process, which has a direct impact on response time. The sections that follow will address these topics in greater detail. System Interfaces The system architecture of a vehicle immobilizer has several layers of abstraction, each representing different system interfaces. Figure 1 provides a visual representation of these layers. Figure 1. Vehicle Immobilizer Interface Layers The Physical Layer Crytographic Protocol Logical Physical A t the lowest level of a vehicle immobilizer system is the physical layer. It consists of a vehicle-mounted antenna coil capable of creating a magnetic field of sufficient magnitude to enable its detection and modulation by an antenna coil mounted in the user s key fob. 3
2 Field Generation and Modulation Vehicle immobilizer systems can be classified in one of two different ways based on how the magnetic field is used to support the transfer data: half duplex or full duplex. In a half-duplex system, the vehicle-mounted antenna coil alternates between periods of energy transfer and data transfer. Uplink data (e.g., fob to vehicle) is modulated using Frequency Shift ing (FSK). A graphical representation of this communication method is shown in Figure 2. Two points should be intuitively obvious from viewing Figure 2. First, the rate of data transfer suffers from a significant compromise due to the recurring need to perform the energy transfer, e.g., charge up the key fob. Second, the modulated signal is very small compared to the field present during the energy transfer period, making it more susceptible to interference from ambient noise which results in reduced range. These characteristics have caused the popularity of half-duplex systems to wane. The dominant system in use today is the full-duplex system in which the vehicle-mounted antenna coil performs energy transfer AD data transfer simultaneously. Uplink data is modulated using Amplitude Shift ing (ASK). A graphical Magnetic Field Charges Fob FSK Fob Return Frequency ƒ ¹ (red) Figure 2. Half-duplex Communication Using FSK FSK Fob Return Frequency ƒ 0 (blue) Automotive Compilation Vol. 7 4
3 Magnetic Field Charges Fob ASK Fob Return Signal - Resistively Damped ( Green ) ASK Fob Return Signal - Undamped ( Black ) Figure 3. Full-duplex Communication Using ASK representation of this communication method is shown in Figure 3. Clearly, the ability to simultaneously transfer data while keeping the key fob energized, or charged, provides the design engineer a significant data transfer rate advantage over half-duplex systems. Additionally, the constant carrier field tends to mask out interferences and enables robust communication during the data transfer. Furthermore, this approach can be realized using simple envelope detection circuitry. Because of the popularity of the full-duplex vehicle immobilizer system in the market place today, the rest of this document will focus on this type of system. to predetermined times; T0 for a logic 0 and T1 for a logic 1. The advantage to this approach is that it embeds energy transfer from vehicle to key fob into the data encoding and ensures the key fob will be supplied enough energy to process the encoded data. However, a side effect of this encoding method is that the data transfer baud rate depends on the logical value of the data bit stream being sent since the transmission times for each binary state are different. See Figure 4 for a more detailed graphical depiction of this coding method. System Interfaces: the Logical Layer The next layer above the physical layer is the logical layer. This layer captures the characteristics and requirements for the coding and transfer of data across the magnetic field. It applies to the bi-directional data transfer that takes place from vehicle to key fob, commonly referred to as downlink, as well as key fob to vehicle, also known as uplink. 1-bit value 0 BPLM bit frame example 12 x CLK FC Downlink 1 Downlink information is coded using Pulse Length Modulation; typically Binary Pulse Length Modulation (BPLM) or Quad Pulse Length Modulation (QPLM). This method is based on inserting a carrier field gap,, of fixed duration and setting the gap to gap timing intervals Figure 4. BPLM Coding Method 20 x CLK FC 5
4 QPLM is a variation of BPLM that is sometimes used. With this modulation, two bits are transmitted after one gap, and therefore more power is available on the transponder side. In addition, the average baud rate is higher compared to BPLM. The coding method follows the same basic implementation as BPLM, except the allowed number of states is extended from two to four and the predetermined gap to gap timing Clock Data Manchester Bi-phase Figure 6. Manchester and Bi-phase Coding 2-bit value QPLM bits frame example x CLK FC Both encoding techniques enable clock extraction from the encoded data stream. This is possible because all time durations in the coded bit stream are quantized to one of two values; T or 2T, where T is what is referred to as a half bit. Data rate is fixed by the relationship 1/(2T). Clock extraction merely requires the detection of the minimum time duration element, T, and synchronizing its phase with the coded bit stream. 28 x CLK FC x CLK FC 62 x CLK FC Protocol Layer The protocol layer defines how individual data bits are grouped to enable communication between the vehicle base station and key fob. It defines how many bits and in which order they are transmitted between the reader and the transponder. As a simple analogy, this can be compared to the rules governing the formation of sentences in using words. The protocol layer would be like the sentence formed from the logical layer which would be like the words. It forms a fixed set of commands along with their allowable responses. Figure 5. QPLM Coding Method Authentication intervals are expanded to cover the additional states. See Figure 5 for a visual representation of QPLM. Uplink Information communicated from the user fob to the vehicle base station is typically encoded using Manchester or Biphase. These encoding methods share several characteristics that differ from the downlink: A) the encoded bit stream always has an average duty cycle of 50%, B) the time to send encoded data is based solely on the baud rate. Authentication is the term used to describe the process of deciding whether the driver is authorized to start the vehicle. The simplest form of this is called unilateral authentication. In this case, the vehicle tests the key fob to determine if it has been associated/learned to the vehicle. When an additional step is added to this process, in which the key attempts to test the vehicle to determine if it has been associated with the key fob, it becomes bilateral or mutual authentication. Clearly, this added step increases security strength but comes at the expense of longer authentication time. Automotive Compilation Vol. 7 6
5 Unilateral Authentication Protocol On Car Read U Command Memory Memory Detection Header (optional) 4-bit Command + 4-bit CRC + 32-bit Read U OK? Random umber Memory Challenge 8-bit Command + Challenge-bit Challenge AES-128 (enc.) AES-128 (enc.) Response + M Response-bits Response = Valid OK, it is the right key Start Authentication Command Figure 7. Unilateral Authentication Unilateral Authentication Typically, the unilateral authentication protocol is initiated by the vehicle and consists of the following steps: 1. Vehicle reads the key fob s unique (not to be confused with the secret key) 2. Vehicle generates a random number challenge and sends it to the key fob 3. fob encrypts the challenge (using the secret key) and sends this response to the vehicle 4. Vehicle compares key fob s response with its calculated response (using same key and challenge) ote: The vehicle must posses the key fob s secret key to enable the success of this transaction. The process of sharing the secret key is called Learn and is described in the next section. Learn: Open/ Secure The Learn Protocol is the process that is used to allow the vehicle to establish a secret key and share it with the key fob. Depending on the restrictions and safeguards placed on the initiated Learn session by the vehicle, secret keys can be shared openly or securely. An open Learn process would typically consist of the following steps, also shown in Figure 8: 1. Vehicle generates a secret key based on a random number and proposes it to the key fob 2. fob accepts secret key, saves to memory, and responds with an acknowledgment 3. Vehicle saves secret key to memory after successful receipt of key fob s acknowledgement If the Learn Protocol can t be protected from eavesdroppers or unauthorized access to the vehicle, it may be desirable to utilize a Secure Learn Process. 7
6 Open Learn 1/2 On Detection Header (optional) Car Secret 8-bit Command bit Random umber Secret Memory Learn Secret (1 or 2) Cmd Response ( Pass/Fail ) +8 bit Status Pass = Memory Figure 8. Open Learn Bilateral or Quasi-mutual Authentication A more complex form of an authentication process is the quasi-mutual or bilateral authentication. It is not a full mutual authentication that is implemented in the Atmel immobilizer system because it does not use random generators on both sides of the system, the car and the key. The implemented solution uses a MAC (Message Authentication Code) to authenticate the car vis-à-vis the key. Again, the authentication protocol is initiated by the vehicle and in case of a bilateral authentication consists of the following steps as shown in Figure 9: 1. Vehicle reads the key fob s unique 2. Vehicle generates a random number challenge and sends it to the key fob 3. Vehicle encrypts the random number and appends it to the challenge 4. fob encrypts the challenge (using secret key 1) and compares it with the received encrypted challenge (MAC) 5. If the result matches, the key fob encrypts it (using secret key 2) and sends this response to the vehicle 6. Vehicle compares key fob s response with its calculated response (using same key and challenge) Cryptographic Layer The cryptographic layer provides the highest level of encryption. It contains the mathematical function that transforms a plain text message into a secret message. Ideally, this function should have two properties: 1. Unique: For every plain text input, there must be a unique secret text output 2. Unpredictable: It must not be possible to predict a plain text to secret text pair, even if a large sample of known good plain text to secret text pairs was available for analysis Automotive Compilation Vol. 7 8
7 Bilateral Authentication Protocol On Car Read U CMD 128-bit 1 memory Random umber AES -128 encryption Detection Header (optional) 4-bit Command + 4-bit CRC + 32-bit 8-bit Command + bit Rand + M bit (Rand) Read U OK? Random umber AES-128 encryption 128-bit 1 Start Authenitcation Command Hidden challenge (HCH) expanded to 128 bits Ok, is it the right car, continue 128-bit 2 = AES -128 encryption Hidden challenge (HCH) expanded to 128 bits + M bit {Resp} AES AES-128 encryption 128-bit 2 = Ok, is it the right key, car match Valid Figure 9. Bilateral Authentication Protocol Public vs. Private For many years, private cryptographic algorithms were commonplace. However, private algorithms have drawbacks: A) uncertainty of algorithm s strength, B) lack of being subjected to critical peer review, C) potential wide-scale security compromise should the algorithm be leaked to the public. In recent years, several high-profile examples can be cited that illustrate these weaknesses. Perhaps even more compelling is the lack of interoperability in systems that share the same physical and logical layers. This interferes with basic competitive market forces and in many cases drives higher system costs. In an effort to address these concerns, public opinion has shifted toward the acceptance of a public domain encryption algorithm the Advanced Encryption Standard (or AES, as it is more commonly referred to). Its origin comes from the 1997 initiative at the ational Institute of Standards and Technology (IST) to select a public-domain encryption algorithm. Within a year, fifteen candidate algorithms were identified and subjected to critical review by the cryptographic research community. This analysis included an assessment of security and efficiency characteristics for each algorithm. After trimming the list of candidates from fifteen to four, IST subjected them to a second round of public review before finally selecting the AES algorithm in AES, as we know it today, is a symmetrical block cipher that combines a 128-bit plain text input with a 128-bit secret key to create a 128-bit encrypted output. Due to its symmetrical characteristics, AES can also be used in reverse to combine the encrypted output with the secret key to find and extract the original plain text input. System Security Considerations Attacks and Countermeasures A common misconception held today is that the security of a vehicle immobilizer system is established by the strength of the encryption algorithm. While encryption algorithm strength is important, it alone does not define the overall system s resistance to attack. Each of the interface layers in the immobilizer system, algorithmic, protocol, logical and physical, contributes to the system s overall security and must be studied and fortified against attack. 9
8 Algorithmic Security and Countermeasures As noted earlier, it is imperative that the encryption algorithm possess unique and unpredictable characteristics. In the case of AES, the details of how the algorithm operates is freely available to the public and as a result, it has been subject to critical review by the research community. This, by far, is the best countermeasure available. To date, scientific studies have confirmed the algorithm s strength as it has withstood the test of time (over 10 years). However, in the case of private algorithms, scientific analysis by the research community was not possible, leaving the strength of these algorithms in question. In fact, many have failed to withstand the test of time and in recent years their weaknesses have been exposed. Protocol Security and Countermeasures In systems using unilateral authentication, attacks on the protocol layer are typically accomplished using scan or dictionary methods. In a scan attack, the attacker receives a challenge from the vehicle and returns random values in response. If the protocol consisted of a 56-bit response, then the bit security is 2 56, i.e., it takes 2 56 trials to get one valid challenge-response pair. To resist this type of attack, the following measures can be considered: Increasing the response bit length to add complexity Having the vehicle embed exponentially growing timeouts between consecutive unsuccessful trials Having the vehicle block trials after a fixed number of consecutive unsuccessful trials are attempted In a dictionary attack, the attacker collects valid challenge (from the attacker) response (from the key fob) pairs by communicating directly with the transponder. These pairs are placed in a look-up table or dictionary for future reference. Equipped with this dictionary, the attacker then sequentially triggers the vehicle for a challenge, which can be checked in the dictionary for a valid response. If the protocol included a 100-bit response, one would need 2 51 trials to get one valid challenge-response pair. The birthday paradox states that after 2 n/2 logged challenge-response pairs and 2 n/2 trials, the probability of a valid result is 0.5. Using this, it can be shown that the overall complexity of this attack is 2 n/2+1 = Countermeasures to consider in this case are: Increasing the challenge bit length to add complexity Implementing a bilateral authentication protocol Physical/Logical Security and Countermeasures In recent years, attack methods have grown more sophisticated. Side-channel attacks such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA) as well as other invasive attacks have been successfully applied to extract secret keys from key fobs. These socalled side-channel attacks measure and evaluate the power consumption of a cryptographic device and combine it with knowledge of the plain text or cipher text in order to extract an otherwise secret key. The theory underlying these methods is quite sophisticated and beyond the scope of this document. The strongest defense against the side-channel attacks noted above are: Randomization of clock frequency and operation Interleaving of digital control and the encryption operation Invasive attacks dwell on the physical implementation of the encryption-related circuitry on the silicon die itself. The best countermeasures are fairly simple to implement as long as they are considered early in the design process. The following are examples of steps that could be considered: Metal shielding of memory blocks Using non-standard synthesis libraries Scrambling the location of critical digital elements used during encryption Restricting memory access and automatic chip-erase function if attempted System Performance Considerations Current Consumption System performance has different aspects. One is the power consumption of the key fob. This parameter relates directly to the achievable communication distance between key fob and vehicle base station. Car manufacturers and Tier1 suppliers tend to emphasize the importance of the coupling factor as a critical system parameter. However, it mainly represents the relationship of the mechanical dimensions between the key fob s antenna and the vehicle base station s antenna. This parameter is only valid for a given system configuration and depends on antenna inductance, Q-factor, driver current, reader sensitivity, and ignition lock cylinder material. Because of this, use of this parameter alone to compare different systems is inadequate. Of equal if not more importance than the coupling factor is current consumption, especially given that the key side current consumption is a limiting factor in a passive, batteryless environment where Automotive Compilation Vol. 7 10
9 the energy is harvested from a magnetic field and stored in a small capacitor. By selecting system components designed for extremely low power consumption and microcontrollers capable of being programmed with well-balanced software (putting the controller in sleep mode whenever possible), the engineer is able to overcome earlier system disadvantages requiring high coupling factors to compensate for high current consumption in the key fob. Authentication Response Time Another important factor in immobilizer systems is the time it takes from turning the key fob inserted inside the lock until the engine starts. This time should be short enough to avoid the driver s perception of a delay. Depending on mechanical and electrical system design and how quick a person can introduce and turn the key, an overall timing budget in the range of 300ms to 500ms is typically available. A significant part of this budget is consumed through mechanics and overhead in the body control module. What remains is between 100ms and 200ms for the authentication process. A good compromise in terms of speed and security seems to be a bilateral authentication with a challenge length of 100 bits and a response length of 56 bits. In most systems this results in a response time of under 100ms. Error Handling In case an authentication failed for whatever reason, today s systems require the complete authentication cycle to restart from the beginning and allowing a maximum of three retries within a reasonable time. The retry strategy from Atmel looks a bit different and enables the system to recover from communication errors more quickly. All commands and optionally the data are protected by a Cyclic Redundancy Check (CRC). Both the key fob and the base station can make use of the CRC to detect errors and signal these conditions to their respective communication partner. This enables the base station to be selective about the amount of repeated info, the last action, the last response, or the last command. This feature enables quicker communication recovery and more attempts at communication recovery in the same amount of time (five-seven retries instead of three). Summary By selecting system components that meet the security and performance expectations of the automotive market place, and support a highly configurable and open-source immobilizer software stack, the task of developing a robust vehicle immobilizer system can be greatly simplified. As a leader in automotive vehicle access solutions, Atmel offers such a complete system solution consisting of both hardware and software. fob designs can be realized with the Atmel ATA5580 and the Atmel ATA5795. These devices boast an LF front end, an AES hardware block to perform fast and efficient encryption calculations, coupled with an Atmel AVR microcontroller that has been optimized for extremely low current operation. Both include programmable flash memory that can be used to run the Atmel open immobilizer protocol or other customerspecific software and are capable of completely passive immobilizer operation. A base station can be realized with the Atmel ATA5272. This device integrates the LF base-station function with an AVR microcontroller with 8K of programmable flash memory. As a final complement to these devices, the open immobilizer protocol software from Atmel is available to users at no cost. It provides an unprecedented level of configurability including many user selectable features enabling the dynamic evaluation of system parametric tradeoffs and accelerates the development and optimization process: 1. A logical layer with uplink and downlink baud rate, bit encoding, and modulation depth 2. A protocol layer with challenge and response bit lengths, unilateral or bilateral authentication, data field CRC, two secret keys, secure or open Learn 3. A cryptographic layer with AES crypto clock speed from 125 khz to 4 MHz on the fly 11
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
a leap ahead in analog
EMV Contactless Payment Systems based on AS3911 Overview and System Simulations Giuliano Manzi, PhD Mannheim, May 23 25, 2012 CST EUROPEAN USER CONFERENCE 2012 a leap ahead in analog OUTLINE AS3911 OVERVIEW
Appendix C GSM System and Modulation Description
C1 Appendix C GSM System and Modulation Description C1. Parameters included in the modelling In the modelling the number of mobiles and their positioning with respect to the wired device needs to be taken
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Turn-Key Passive Entry/ Passive Start Solution
Turn-Key Passive Entry/ Passive Start Solution Dr. Jedidi Kamouaa Atmel provides a passive entry/ passive start (PEPS) system with a complete set of basic building blocks, including hardware and software.
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Tire pressure monitoring
Application Note AN601 Tire pressure monitoring 1 Purpose This document is intended to give hints on how to use the Intersema pressure sensors in a low cost tire pressure monitoring system (TPMS). 2 Introduction
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
SECURITY OF PASSIVE ACCESS VEHICLE ANSAF IBRAHEM ALRABADY DISSERTATION. Submitted to the Graduate School. of Wayne State University, Detroit, Michigan
SECURITY OF PASSIVE ACCESS VEHICLE by ANSAF IBRAHEM ALRABADY DISSERTATION Submitted to the Graduate School of Wayne State University, Detroit, Michigan in partial fulfillment of the requirements for the
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Android based Alcohol detection system using Bluetooth technology
For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
Elettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS
SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,
EBERSPÄCHER ELECTRONICS automotive bus systems. solutions for network analysis
EBERSPÄCHER ELECTRONICS automotive bus systems solutions for network analysis DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems System Overview Analyzing Networks in all Development Phases Control
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Digital Subscriber Line (DSL) Transmission Methods
Digital Subscriber Line (DSL) Transmission Methods 1. Overview... 1 2. SHDSL Transmission Methods... 1 SHDSL Transmission System Versions... 1 SHDSL Transmission Subsystem Structure... 1 SHDSL Modulation
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6
Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED
Use of modern telephone network for time transfer: An innovation
Indian Journal of Pure & Applied Physics Vol. 48, September 2010, pp. 676-680 Use of modern telephone network for time transfer: An innovation Pranalee P Thorat* & P Banerjee** National Physical Laboratory,
Using ISO 15693 Compliant RFID Tags in an Inventory Control System
Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Atmel Innovative Silicon RFID IDIC Solutions
Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
2.1 CAN Bit Structure The Nominal Bit Rate of the network is uniform throughout the network and is given by:
Order this document by /D CAN Bit Timing Requirements by Stuart Robb East Kilbride, Scotland. 1 Introduction 2 CAN Bit Timing Overview The Controller Area Network (CAN) is a serial, asynchronous, multi-master
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Instruction Manual Service Program ULTRA-PROG-IR
Instruction Manual Service Program ULTRA-PROG-IR Parameterizing Software for Ultrasonic Sensors with Infrared Interface Contents 1 Installation of the Software ULTRA-PROG-IR... 4 1.1 System Requirements...
APPLICATION NOTE. RF System Architecture Considerations ATAN0014. Description
APPLICATION NOTE RF System Architecture Considerations ATAN0014 Description Highly integrated and advanced radio designs available today, such as the Atmel ATA5830 transceiver and Atmel ATA5780 receiver,
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
Solar Energy Conversion using MIAC. by Tharowat Mohamed Ali, May 2011
Solar Energy Conversion using MIAC by Tharowat Mohamed Ali, May 2011 Abstract This work introduces an approach to the design of a boost converter for a photovoltaic (PV) system using the MIAC. The converter
DDX 7000 & 8003. Digital Partial Discharge Detectors FEATURES APPLICATIONS
DDX 7000 & 8003 Digital Partial Discharge Detectors The HAEFELY HIPOTRONICS DDX Digital Partial Discharge Detector offers the high accuracy and flexibility of digital technology, plus the real-time display
AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications
General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (start at 800 Actel tiles). Enhanced versions
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
Timing Errors and Jitter
Timing Errors and Jitter Background Mike Story In a sampled (digital) system, samples have to be accurate in level and time. The digital system uses the two bits of information the signal was this big
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals. Introduction
Computer Networks and Internets, 5e Chapter 6 Information Sources and Signals Modified from the lecture slides of Lami Kaya ([email protected]) for use CECS 474, Fall 2008. 2009 Pearson Education Inc., Upper
RECOMMENDATION ITU-R F.1113. (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,
Rec. ITU-R F.1113 1 RECOMMENDATION ITU-R F.1113 RADIO SYSTEMS EMPLOYING METEOR-BURST PROPAGATION (Question ITU-R 157/9) (1994) Rec. ITU-R F.1113 The ITU Radiocommunication Assembly, considering a) that
GENESIS COUPE(BK) >2010 > G 2.0 DOHC > Body Electrical System > Immobilizer System > Description and Operation
GENESIS COUPE(BK) >2010 > G 2.0 DOHC > Body Electrical System > Immobilizer System > Description and Operation Description The immobilizer system will disable the vehicle unless the proper ignition key
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
SECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
A DNP3 Protocol Primer
A Protocol Primer Introduction This is a primer for people who want a quick understanding of without having to comb through the tedious details of a complex specification. The writing style is meant to
A Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA
Journal of Signal and Information Processing, 12, 3, 382-386 http://dx.doi.org/1.4236/jsip.12.335 Published Online August 12 (http://www.scirp.org/journal/jsip) A Storage Architecture for High Speed Signal
Overview of EnOcean Security features EXPLANATION OF ENCEOAN SECURITY IN APPLICATIONS
Overview of EnOcean Security features EXPLANATION OF ENCEOAN SECURITY IN APPLICATIONS EnOcean www.enocean.com Author (eo_fusszeile) September 2013 Page 1/ 23 Table of contents 1. INTRODUCTION... 3 1.1.
RF Measurements Using a Modular Digitizer
RF Measurements Using a Modular Digitizer Modern modular digitizers, like the Spectrum M4i series PCIe digitizers, offer greater bandwidth and higher resolution at any given bandwidth than ever before.
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Freescale Variable Key Security Protocol Transmitter User s Guide by: Ioseph Martínez and Christian Michel Applications Engineering - RTAC Americas
Freescale Semiconductor User s Guide VKSPTXUG Rev. 0, 06/2008 Freescale Variable Key Security Protocol Transmitter User s Guide by: Ioseph Martínez and Christian Michel Applications Engineering - RTAC
MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy
Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB ABSTRACT There is a potential for 50-400 million per year Bluetooth nodes within the car market if Bluetooth can be integrated into
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
Introduction Ericsson Handheld Telephone 1341-B
Ericsson Handheld Telephone 1341-B 2 Contents General 5 The Mobile Telephone Network 6 Base Station and Cell 7 Radio Channels 7 Radio Coverage 8 Transmission Control and Communication 9 Quality Control
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION )454 6 TER TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ ")43 0%2 3%#/.$ $50,%8 -/$%- 53).' 4(% %#(/ #!.#%,,!4)/. 4%#(.)15%
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
PCM Encoding and Decoding:
PCM Encoding and Decoding: Aim: Introduction to PCM encoding and decoding. Introduction: PCM Encoding: The input to the PCM ENCODER module is an analog message. This must be constrained to a defined bandwidth
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Satellite Telemetry, Tracking and Control Subsystems
Satellite Telemetry, Tracking and Control Subsystems Col John E. Keesee 1 Overview The telemetry, tracking and control subsystem provides vital communication to and from the spacecraft TT&C is the only
Local Interconnect Network Training. Local Interconnect Network Training. Overview
Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended
NXP Basestation Site Scanning proposal with AISG modems
NXP Basestation Site Scanning proposal with modems Advanced Systems White Paper by Jaijith Radhakrishnan There are a number of connectivity issues associated with cellular base stations that can increase
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Adtech Data Link Simulators.
Adtech Data Link Simulators. Adtech SX series Data Link Simulators create the same delay and error characteristics caused by long distance terrestrial and satellite data links. By providing realistic simulations
LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ
LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
Software User Guide UG-461
Software User Guide UG-461 One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com ezlinx icoupler Isolated Interface Development Environment
BROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO MUTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link INTRODUCTION
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission
Secure Communications Product Brochure 01.01 R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission R&S MKS9680 Modular Encryption Device At a glance The R&S MKS9680 is a highly
Experiment # 9. Clock generator circuits & Counters. Eng. Waleed Y. Mousa
Experiment # 9 Clock generator circuits & Counters Eng. Waleed Y. Mousa 1. Objectives: 1. Understanding the principles and construction of Clock generator. 2. To be familiar with clock pulse generation
Harmonics and Noise in Photovoltaic (PV) Inverter and the Mitigation Strategies
Soonwook Hong, Ph. D. Michael Zuercher Martinson Harmonics and Noise in Photovoltaic (PV) Inverter and the Mitigation Strategies 1. Introduction PV inverters use semiconductor devices to transform the
