The Community for Technology Leaders
Wireless and Mobile Communications, International Conference on (2009)
Cannes/La Bocca, France
Aug. 23, 2009 to Aug. 29, 2009
ISBN: 978-0-7695-3750-4
pp: 82-86
ABSTRACT
We present a novel attacking scenario to break into secured DECT-GAP communication. To demonstrate the feasibility of our attack, we propose a brute-force architecture to efficiently recalculate all communication-related shared secrets between the DECT base station and handset. The efficiency of our architecture is demonstrated by a highly pipelined, multi-brute-force-component FPGA implementation. It exploits common weak random number generators implemented at the DECT base stations and a weak authentication scheme between the DECT base stations and their handsets.
INDEX TERMS
DECT security, DSAA, DSC, brute-force attack, FPGA
CITATION

R. Weinmann, H. G. Molter, K. Ogata and E. Tews, "An Efficient FPGA Implementation for an DECT Brute-Force Attacking Scenario," Wireless and Mobile Communications, International Conference on(ICWMC), Cannes/La Bocca, France, 2009, pp. 82-86.
doi:10.1109/ICWMC.2009.20
86 ms
(Ver 3.3 (11022016))