Worth Reading: DECT cryptanalysis and counter attacks on malware

    Date 06 May 2010
    Category Cryptography
    3618
    Posted By Alex
    As already announced at the 26C3 congress, Karsten Nohl, Erik Tews and Ralf-Philipp Weinmann have released details of their cryptanalysis of the proprietary and secret encryption algorithm used with DECT (DECT Standard Cipher, DSC) an encryption commonly used with cordless phones. The analysis was carried out by reverse engineering DECT hardware and descriptions from a patent document.
    In their paper titled "Cryptanalysis of the DECT Standard Cipher", the authors describe the analysis and reconstruction of the algorithm, as well as practical ways of calculating the key from recorded key streams within a few hours. A C language implementation of the DSC completes the document.

    * Cryptanalysis of the DECT Standard CipherPDF, a paper by Karsten Nohl, Erik Tews and Ralf-Philipp Weinmann.

    Reverse engineer Andrzej Dereszowski closely analysed the malware installed via a PDF document on a customer's system, searching for specific security holes. He found that the freely available Poison Ivy "remote administration tool" had been installed to access infected systems.

    The link for this article located at H Security is no longer available.

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"20","type":"x","order":"1","pct":95.24,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"1","type":"x","order":"2","pct":4.76,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.