Wireless and Mobile Communications, International Conference on (2009)
Cannes/La Bocca, France
Aug. 23, 2009 to Aug. 29, 2009
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ICWMC.2009.20
We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force architecture to efficiently recalculate all communication-related shared secrets between the DECT base station and handset. The efficiency of our architecture is demonstrated by a highly pipelined, multi-brute-force-component FPGA implementation. It exploits common weak random number generators implemented at the DECT base stations and a weak authentication scheme between the DECT base stations and their handsets.
DECT security, DSAA, DSC, brute-force attack, FPGA
R. Weinmann, H. G. Molter, K. Ogata and E. Tews, "An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario," Wireless and Mobile Communications, International Conference on(ICWMC), Cannes/La Bocca, France, 2009, pp. 82-86.