0% found this document useful (0 votes)
54 views7 pages

Breaking Hitag2 With Reconfigurable Hardware: August 2011

This document describes research into breaking the Hitag2 stream cipher used in access control systems. The researchers developed an FPGA-based architecture for performing an exhaustive key search attack on Hitag2. Their implementation on a COPACOBANA FPGA cluster could reveal the 48-bit secret key in under 2 hours, outperforming prior algebraic attacks. This defines a new lower time limit for cloning access devices that use Hitag2, such as car keys. The attack is massively parallelizable across multiple FPGA devices to further reduce the cracking time.

Uploaded by

LIRO ROMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views7 pages

Breaking Hitag2 With Reconfigurable Hardware: August 2011

This document describes research into breaking the Hitag2 stream cipher used in access control systems. The researchers developed an FPGA-based architecture for performing an exhaustive key search attack on Hitag2. Their implementation on a COPACOBANA FPGA cluster could reveal the 48-bit secret key in under 2 hours, outperforming prior algebraic attacks. This defines a new lower time limit for cloning access devices that use Hitag2, such as car keys. The attack is massively parallelizable across multiple FPGA devices to further reduce the cracking time.

Uploaded by

LIRO ROMA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/220880353

Breaking Hitag2 with Reconfigurable Hardware

Conference Paper · August 2011


DOI: 10.1109/DSD.2011.77 · Source: DBLP

CITATIONS READS
14 1,756

2 authors, including:

Martin Novotný
Czech Technical University in Prague
57 PUBLICATIONS   268 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Martin Novotný on 30 June 2020.

The user has requested enhancement of the downloaded file.


Breaking Hitag2 with Reconfigurable Hardware
Petr Štembera Martin Novotný
Czech Technical University in Prague Czech Technical University in Prague
Faculty of Electrical Engineering, Karlovo nám. 13 Faculty of Information Technology, Kolejnı́ 550/2
Prague, Czech Republic Prague, Czech Republic
Email: [email protected] Email: [email protected]

Abstract— The Hitag2 stream cipher is used in many real- cipher, its internal structure and the protocol between the
world applications, such as car immobilizers and door opening transponder and the car. In Sect. III we summarize the related
systems, as well as for the access control of buildings. The work and the previously proposed algebraic attacks that require
short length of the 48-bit secret key employed makes the cipher
vulnerable to a brute-force attack, i.e., exhaustive key search. almost two days of computation on a standard PC and cannot
In this paper we develop the first hardware architecture for the be parallelized. In Sect. IV we describe the architecture of
cryptanalysis of Hitag2 by means of exhaustive key search. Our our attack implemented in reconfigurable hardware. The attack
implementation on the Cost-Optimized Parallel Code-Breaker reveals the key in less than two hours in maximum (i.e. less
COPACOBANA is able to reveal the secret key of a Hitag2 than one hour on average) using a cluster of 120 FPGAs.
transponder in less than 2 hours (103.5 minutes) in the worst case.
The speed of our approach outperforms all previously proposed Unlike algebraic attacks, our attack can be easily scaled, which
attacks and requires only 2 sniffed communications between a enables trading the speed of the attack for the amount of
car and a tag. Our findings thus define a new lower limit for the resources. The knowledge of the key is required for cloning the
cloning of car keys in practice. Moreover, the attack is arbitrarily tag [13] and unauhorized opening of a car and driving away.
parallelizable and could thus be run on multiple COPACOBANAs In Sect. V we evaluate the performance of our attack and we
to decrease the time to find the secret key.
compare it with the algebraic ones and in the last Sect. VI we
Keywords: Hitag2, cryptanalysis, FPGA, reconfigurable
conclude with final remarks.
hardware, COPACOBANA
II. H ITAG 2
I. I NTRODUCTION
According to [7] and [8], Hitag2 RFID chips use base
Hitag2 is a stream cipher primarily used in Radio Frequency transmit frequency 125 kHz with Biphase or Manchester
Identification (RFID) applications, such as car immobilizers. modulation. The average bit rate for a reader (embedded in a
It has been developed and introduced in late 90’s by Philips car) is 5.2kbit/s and up to 8kbit/s for a transponder (embedded
Semiconductors (currently NXP). According to [5], [6], [12], in a tag). Data are transmitted bidirectionally in half duplex
[13], Hitag2 is for example used in access systems for army mode. Hitag2 RFID chips contain 256 bits of data that are
and government buildings in Germany as well as in RFID car divided into 8 pages of 32 bits.
locks, where, by pressing the button, an electronic tag sends The chips can operate in 3 read-only modes (denoted as
command to open or close the door of a car. Concerning car Public mode A, B and C) in which data are broadcast in
security systems, Hitag2 is allegedly used in models produced plaintext. These modes are suitable for applications such as
by car manufacturers such as BMW, Audi, Alfa Romeo, animal identification, but they offer no security.
Porsche, Bentley, VW, Peugeot, Renault, Citroën, Iveco trucks Hitag2 transponders can operate also in so-called Password
and others [12], [13]. It is not clear whether the Hitag2 is still mode, which is mostly used in access systems for buildings.
used in newly produced cars, however, for its relatively recent However, this mode also does not provide any security. In
introduction, it is sure that many cars with Hitag2 are still in this mode the transponder and the reader interchange their
daily use. passwords, which are always the same and never encrypted.
Hitag2 is by its internal structure very similar to its prede- Therefore, implementation of a replay attack is as simple as
cessor, i.e., the Crypto1 cipher [3], [4] used in Mifare-Classic recording to a tape recorder.
cards. Hitag2 uses a 48 bit key and its internal state also has the The only mode providing some (weak) security is a so-
corresponding length of 48 bits. Due to its internal structure, called Crypto mode, which is mostly used in car locks. In this
Hitag2 is vulnerable to algebraic attacks. Due to the relatively work we solely focus on cryptanalysis of this mode of Hitag2
short key length of the cipher, brute-force attacks on Hitag2 system.
are feasible and practical. In Crypto mode the transponder and the reader share com-
In this work we introduce our implementation of a parallel mon 48 bit secret key. To prevent replay attacks, the unique
brute-force attack implemented on a Field Programmable initialization vector (IV) is generated for every transaction
Gate Array (FPGA) platform, which outperforms previously between the reader and the transponder. The secret key,
proposed algebraic attacks. In Sect. II we describe the Hitag2 together with the initialization vector and the serial number of
ϭϭϬϬϬ
ϱďŝƚƐ
ϭϭϭϭϭнh/
ϱнϯϮďŝƚƐ Zt
d'
/sнƵƚŚ ĞǀŝĐĞ
ϯϮнϯϮďŝƚƐ
ϭϭϭϭϭн΀ŽŶĨŝŐ нWt΁Ύ
ϱнϯϮďŝƚƐ

Fig. 1. Hitag2 protocol in Crypto mode

the tag are used for initialization of a cipher. After initialization


the Hitag2 cipher produces a keystream. First 32 bits of the
keystream are used as an authenticator, and the remaining bits
Fig. 2. Internal structure of Hitag2, initialization and encryption
are used for encryption like in any standard stream cipher. The
details of Hitag2 protocol in the Crypto mode are described
below.
with 48 bit LFSR and a nonlinear function with 20 inputs,
A. Hitag2 Protocol in Crypto Mode producing 1 output bit per 1 clock cycle. The other components
The protocol in Crypto mode is depicted in Figure 1. It are used only at the initialization phase. The reference source
works as follows: code in C language can also be downloaded from [1].
Hitag2 operates with 48 bit secret key, shared between the
1) The reader (embedded inside a car) sends the command
reader (car) and the transponder (tag), 32 bit serial number of
11000 to the transponder (embedded in the portable tag).
the tag and 32 bit initialization vector IV. The serial number
2) The tag responds by 11111 followed by its 32 bit serial
and the initialization vector are, without any encryption, trans-
number (SN).
mitted between the reader and the transponder during their
3) Then the reader sends a 32 bit pseudo-random IV and
communication.
the 32 bit authenticator. The authenticator consists of
1) Initialization Phase: At the beginning, the LFSR is
the first 32 bits of the keystream. The authenticator bits
loaded with 32 bits of the serial number and 16 lower bits
are transmitted in reverse order.
of the secret key (top of Figure 2). Then, in 32 steps the
4) Transponder computes authenticator as well. If both
LSFR is filled from right with 32 bits, each of them being a
authenticators match, then the transponder sends 11111
XOR of three bits—one bit of the key, one bit of the randomly
followed by the content of Page 3 of its memory
generated initialization vector IV, and one bit produced as the
(these are 8 bits of configuration flags and 24 bits of
output of the boolean function applied to the previous state.
”transponder password”). Those 32 bits are encrypted
The initialization phase takes 32 clock cycles.
by bitwise XOR with the next 32 bits of the keystream.
2) Keystream Generation: For generation of a keystream,
The initialization vector is randomly generated for every
the multiplexer on right is switched to its upper input (feed-
transaction between the reader and the transponder to prevent
back from LFSR). At each clock cycle, the LFSR is updated
replay attacks. Hitag2 transponders use challenge-response
first, and then the output bit is computed as a result of
authentication protocol. It is the reader (car) that generates the
the boolean function of 20 inputs. This boolean function is
initialization vector and proves its identity to the transponder
composed of instantiations of 4-input boolean functions fa4
(tag) first by sending the authenticator. This prevents a chosen-
and fb4 , and a 5-input boolean function fc5 . The functions are
IV attack. Moreover, unless the attacker knows the content of
described by their truth tables, where e.g. fa4 = 0x2C79 =
Page 3 of the transponder memory, the attacker obtains only
0010110001111001 is the content of the truth table—the least
32 bits of the keystream. As the secret key has 48 bits, for
significant bit is the output for fa4 (0000), while the most
successful recovery of this key the attacker needs data from at
significant bit is the output for fa4 (1111).
least two sniffed transactions between the tag and the reader.
Because of low carrier frequency (125 kHz) and low rate, III. R ELATED W ORK
it is very simple to sniff transmitted data by simple antenna
circuit [6], [14]. Several attacks on Hitag2 have been published in the open
literature. Since the cipher had been kept secret (security by
B. Hitag2 Internal Structure obscurity) by the manufacturer, an important achievement was
The internal structure of the Hitag2 cipher is shown in revealing the detailed principle of the Hitag2 cipher [2]. The
Figure 2 adopted from [1]. Hitag2 consists of a filter generator description of the Cipher together with a reference program
code were published in [1]. On the basis of this cipher appear to be the only such reconfigurable parallel FPGA
description, several algebraic attacks evolved. machines optimized for code breaking tasks reported in open
At the present time there are two known algebraic attacks, literature. Depending on the actual algorithm, the parallel
as described in [5] and [6]. Both published attacks exploit hardware architecture can outperform conventional computers
the low complexity and lack of sufficient non-linearity of by several orders of magnitude. COPACOBANA has been
Hitag2. In principle, both attacks transform the state of Hitag2 designed under the assumptions that (i) computationally
into system of equations. Then the system of equations is costly operations are parallelizable, (ii) parallel instances
transformed into a SAT problem and solved with a SAT solver have only a very limited need to communicate with each
on a PC. other, (iii) the demand for data transfers between host and
In an attack described in [5], the authors are able to extract nodes is low due to the fact that computations usually
the secret 48 bit key within 6 hours, on the basis of 16 dominate communication requirements and (iv) typical crypto
chosen initialization vectors, by running MiniSat 2.0 on a algorithms and their corresponding hardware nodes demand
PC. However, as the Hitag2 protocol described above prevents very little local memory which can be provided by the on-chip
chosen-IV attacks, this attack has to be regarded as theoretical. RAM modules of an FPGA. Considering these characteristics
Another more practical attack needs data from at least 4 sniffed COPACOBANA appeared to be perfectly tailored for our
transactions. With these (random) data, the calculations require attack.
45 hours. Via its controller card COPACOBANA is connected to the
Another attack, presented in [6], lacks any detailed descrip- host computer that controls the attack. The host computer can
tion. Therefore it is not clear whether the attack time (6 hours communicate with each individual FPGA—it can send data
with CryptoSAT) is again valid only for chosen-IV or whether or command to the FPGA, it can monitor the status of the
it is valid for any random data. We assume that the stated FPGA and, upon success, it also obtains found key. The host
attack time was only for the theoretical case of chosen-IV. computer is also able to broadcast data and/or commands to
all FPGAs in parallel.
IV. O UR ATTACK
We have implemented a brute-force attack on Hitag2. The B. Hardware Architecture of the Attack
attack works as follows: From one transaction between the To parallelize the attack, the search space is divided into
car and the tag we get the serial number of the tag, the key subspaces. Each FPGA is by the host computer assigned
initialization vector, and the authenticator. Then, we generate with one subspace to search in. If the search in the subspace
and test all 248 keys. Each key we load to the Hitag2 core is finished without any success, then the FPGA is assigned
together with the serial number and the initialization vector, with another subspace. The attack runs until the key is found
and we generate the authenticator. Generated authenticator we or until all key subspaces are explored.
compare with the authenticator obtained from the transaction. In our case the search space is divided into 512 subspaces,
If we get the match, then the key loaded to the Hitag2 core which are defined by 9 most significant bits of the key. The
becomes a key candidate. FPGA internally generates all 239 keys of assigned subspace.
As the key has 48 bits, while the authenticator has only 32 The block-level structure of the Hitag2 breaker implemented
bits, it is clear that about 216 key candidates would generate in each FPGA can be found in Figure 3. The breaker consists
the same authenticator. To select the right key, all those of the control module and 256 Hitag2 executional cores,
key candidates are then checked against data from another denoted as H2 Core. Therefore, each FPGA verifies 256 keys
transaction between the car and the reader. These data contain concurrently. If any H2 Core produces a key candidate, then
the same serial number of the tag, but the initialization vector this key candidate is passed to the H2 Core – final (at the
and the authenticator are different. bottom of Figure 3) for verification against data from second
The brute-force attack could be implemented in software, transaction between the transponder and the reader.
however, the attack time would be extremely long. For exam- 1) Design Approach: In order to achieve higher perfor-
ple, the Pentium-IV processor is able to check about 2 million mance we exploited some properties of underlying imple-
keys per second, therefore, the attack time would be about 4 mentation platform (FPGA). However, these properties require
years. special design approach described below.
Much better results we obtain when implementing the brute- Look-up tables in Xilinx Spartan-3 FPGAs are dedicated
force attack in hardware. Reconfigurable devices, namely for implementation of combinational logic. However, in some
FPGAs, offer ideal platform for implementation of such an slices the LUTs can also be configured to work as a shift
attack. register with a maximum length of 16 bits (denoted as SRL16).
This property enables to implement much bigger shift-register-
A. Implementation Platform—COPACOBANA based circuits. For example, using all flip-flops available in
The COPACOBANA (Cost-Optimized Parallel Code used FPGA we may build the circuit containing equivalent
Breaker) machine [9] [10] is a high-performance, low-cost of 150 Hitag2 execution cores. Note that in this case all
cluster consisting of 120 Xilinx Spartan3-XC3S1000 FPGAs. flip-flops would be used for cores and there would be no
Currently, COPACOBANA and its successor RIVYERA [11] controller and other circuits. On the other hand, using SRL16s
n+1 data_2 data
slot data control
data2
cs 2 2
cntrl 2 1
rd/wr 1
2 data
adr m_1 match Data
data2 3
3 processing 1
data clk control 3
m_n H2 Core #1
64 feedback
data CMP match
adr m_f 1
clk match data
rd/wr data2 n:1
Control module clk LFSR
control MUX
cs
H2 Core #n
slot 1
1 2
data Non-linear Functions
clk_in clk_out match control
data2
DCM clk control
bus_clk Hitag2 Core
H2 Core - final
FPGA

Fig. 3. Block-level structure of the Hitag2 breaker in one FPGA Fig. 4. Hitag2 execution core

we can implement up to 300 Hitag2 cores inside one FPGA, tion modes (Load, Initialization, Authenticator generation and
still leaving enough LUTs and flip-flops for a controller and verification). Control signals are common for all execution
other necessary circuits. However, the usage of SRL16s brings cores inside one FPGA. Data signals are further divided into
some limitations to the circuit design—we have to avoid any 2 groups—data and data2. The 2 bit signal data2 is common
parallel input or output to the shift register. Therefore, we can for all execution cores and is used only during Load phase to
use only serial input and output. Due to this fact we have speed up LFSR load. The 1 bit signal data is unique for every
not implemented e.g. a pipeline (which was one of design execution core.
options), since such a pipeline would require parallel access to The execution core has only 1 output signal—match. This
all bits of registers in each pipeline stage. Instead, we decided signal is used during Authenticator generation and verification
to implement an array of small, encapsulated, independent phase to indicate whether successively generated authenticator
processing units, each having only few serial inputs. still conforms to the sniffed one.
Although up to 300 Hitag2 cores would fit into one FPGA, 4) How it Works: The attack runs in rounds which are
we have placed there just 256+1 of them. This allowed us divided into 3 phases (Load, Initialization, Authenticator gen-
significant simplification of the control module. Additionally, eration and verification). At each round every execution core is
we could achieve higher frequency due to more relaxed assigned with one key for verification. The key is composed of
placement and routing. 9 bits of the key subspace, 31 bits generated by the counter in
2) Control Module: Control module implements interface the control module, and 8 bits which are unique for each core.
to COPACOBANA bus and performs communication between If no key candidate is found, then the counter is incremented
the host computer and FPGA. We developed simple commu- and the FPGA verifies the set of another 256 keys in the
nication protocol to ensure data integrity and error detection next round. Below we provide detailed description of all three
functions. The module receives commands and data from host phases.
application. Based on them it controls processing of assigned In the Load phase all execution cores are loaded with 32
subspace. bits of serial number and upper 16 bits of the key. These data
Another part of control module monitors and controls the are common to all cores. This phase would require 48 clock
process in execution cores. Beside FSM it contains 31 bit cycles, however, we reduced the phase to just 16 clock cycles
counter which is used for generating input data for execution (below).
cores. Then, in the Initialization phase, the cores are via input
3) Hitag2 Execution Core: The Hitag2 execution core bit data loaded with product of xor operation of initialization
simulates Hitag2 cipher operation. It is slightly modified to vector and lower 32 bits of the key. The first 24 bits of this
simplify brute-force attack implementation. The structure of xor product are again common to all cores, but the last 8 bits
the Hitag2 execution core is shown in Figure 4. Execution are unique for each core. This phase requires 32 clock cycles.
core vital parts are very similar to Hitag2 chip implementation. Finally, in the last phase, the Authenticator is generated and
They consist of LFSR, non-linear function and few control verified. At the beginning of this phase the output bit match is
parts. set. Then the authenticator is bit-by-bit generated in each core.
Execution core has only 5 input bits and 1 output bit. At the same moment the control module sends corresponding
The input signals consist of 3 data bits and 2 control bits. bits of sniffed authenticator to the cores via their input bit data.
The control signals are used for selection of one of opera- Each core on-the-fly compares bits of sniffed and generated
TABLE I
authenticator. If the two bits are not equal, output bit match
C OMPARISON OF ATTACK METHODS
is cleared. This phase may require up to 32 clock cycles.
If the signal match is still set in some core by the end of the
Type Implementation Attack
last phase, then the key candidate is found. Such key candidate
of attack platform time
is then send to the H2 Core – final, which repeats the same
above three phases, but with another data. HAR 2009 Algebraic PC N/A
5) Improvements: By default each round requires 112 clock ISC 2009 Algebraic PC 45 hours
cycles. By detailed examination of Hitag2 cipher operation and SW implementation Brute-force PC 4 years
internal processes we have implemented two special features of a brute-force attack
increasing the performance of the breaker. They are (i) parallel Our implementation Brute-force COPACOBANA 103.5 mins
3-wire LFSR load and (ii) round truncate function.
Parallel 3-wire LFSR load: As mentioned earlier, to allow
synthesis tool to configure LUTs as shift registers (which to reveal the secret key. Other attack implementations require
enables effective utilization of FPGA chip), the LFSR has to data from at least four sniffed transactions.
be loaded via serial input. However, loading then requires 48 Another advantage is the almost linear design scalability. It
clock cycles. In order to achieve better design performance, we is straightforward to use more COPACOBANA machines in
have decided to add 2 more load wires to Hitag2 execution order to reduce the attack time. For example, when using 4
cores (in Figure 4 denoted as data2). LFSR is divided into COPACOBANA machines, the time required to verify all keys
3 parts, each being 16 bits long. These parts are loaded in the key space would be less then half an hour.
separately in only 16 clock cycles. Implementation of 3 We have practically verified the entire design and all its
wire LFSR load significantly reduces amount of clock cycles modules with large set of testbenches and test data sets to
required to load LFSR. We save 32 clock cycles per round, verify its proper function. The design fulfills all requirements
which is 28% of the total number of clock cycles. and passed all tests.
Round truncate function: During the Authenticator gen-
eration and verification phase, every execution core on-the- VI. C ONCLUSIONS AND F INAL R EMARKS
fly verifies conformity of the generated and the sniffed au- In this work we have introduced a highly efficient imple-
thenticator. In case when generated and sniffed authenticator mentation of a parallel exhaustive key-search of the Hitag2
discontinue to conform to each other, this non-conformity is cipher. Our attack is practically realized on the cryptanalytic
signalized to the control module via the signal match. When hardware platform COPACOBANA. Each FPGA in COPACO-
all execution cores signalize authenticator non-conformity to BANA verifies about 378 million keys per second, therefore,
the control module, the round is interrupted. The counter is one fully equipped COPACOBANA with 120 FPGAs is able to
incremented, new data are generated and new round is started. determine the correct key in less than 2 hours (103.5 minutes)
Implementation of this feature saves about 20 clock cycles per in the worst case. The proposed design is almost linearly
one round on average, which is about 18% of the total number scalable, which allows further reduction of the attack time by
of clock cycles in average. employing more COPACOBANA machines.
Implementation of both these features saves about 52 clock The brute-force attack outperforms all previous implemen-
cycles out of 112, which represents about 46% on average. tations by several orders of magnitude. Just two monitored
communications between a Hitag2 transponder and a reader,
V. I MPLEMENTATION R ESULTS
instead of 4 sniffed transactions required in other published
Our proposed parallel brute-force breaker for COPACO- attacks, are sufficient to reveal the secret key.
BANA platform implements 256+1 Hitag2 execution cores in The attack also demonstrates the power of reconfigurable
each FPGA chip. The design utilizes 90% of the hardware devices. Although the brute-force attack is in general the most
resources available on one FPGA chip and can run at a maxi- demanding type of attack, its implementation in hardware is
mum frequency of 90 MHz. In each round of the key-search, much faster then software implementation of less complex
256 keys are verified in one FPGA. One round requires 60 algebraic attack.
clock cycles on average plus one clock cycle for initialization Further improvement may be gained by implementing the
of the round. Every FPGA is thus able to verify about 378 algebraic attack in hardware. However, this type of attack
million keys per second. requires SAT solver, which represents serious design limitation
As a result, one COPACOBANA with 120 FPGAs is able — to the best of our knowledge, there is sill no existing
to verify all 248 keys in just 103.5 minutes. For comparison, implementation of SAT solver in hardware.
the previously proposed attack methods are listed in Table I.
Data for software implementation of brute-force attack are ACKNOWLEDGMENT
adopted from [5]. Our implemented design outperforms all This research has been partially supported by MSMT under
known attacks by several orders of magnitude. Moreover, our research program MSM6840770014, by the grant of the Czech
proposed design has very low requirements on the amount Grant Agency GA102/09/1668, and by the grant of the Czech
of sniffed data — only 2 sniffed transactions are sufficient Technical University SGS10/119/OHK3/1T/18.
R EFERENCES
[1] Nicolas T. Courtois and Sean O’Neil, HITAG 2 Stream Cipher –
C Implementation and Graphical Description, 2006-2007. http://
cryptolib.com/ciphers/hitag2/, as of February 28, 2012.
[2] Nicolas T. Courtois and Sean O’Neil, FSE Rump Session –
HITAG2 Cipher, 2008. http://fse2008rump.cr.yp.to/
00564f75b2f39604dc204d838da01e7a.pdf, as of February 28,
2012.
[3] I.C. Wiener, Crypto1 specification, reference implementation and test vec-
tors, 2007-2008. http://cryptolib.com/ciphers/crypto1/,
as of February 28, 2012.
[4] Nicolas T. Courtois, Karsten Nohl and Sean O’Neil, Algebraic Attacks
on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards,
Cryptology ePrint Archive, Report 2008/166, 2008. http://eprint.
iacr.org/2008/166, as of February 28, 2012.
[5] Nicolas T. Courtois, Sean O’Neil, and Jean-Jacques Quisquater, Practical
Algebraic Attacks on the Hitag2 Stream Cipher, In: ISC ’09: Proceedings
of the 12th International Conference on Information Security, pp. 167–
176, LNCS 5735, Pisa, Italy, Springer-Verlag 2009.
[6] Henryk Plötz and Karsten Nohl, Breaking Hitag2, HAR2009, 2009.
https://har2009.org/program/events/135.en.html, as
of February 28, 2012.
[7] Philips Semiconductors, Hitag2 protocol datasheet, 1996.
http://www.keeloq.boom.ru/HT2protocol.pdf, as of De-
cember 20, 2010.
[8] Philips Semiconductors, HT2 DC20 S20, HITAGTM 2 Transpon-
ders (datasheet), 1998. http:/www.synometrix.com/Hitag_2_
Data_Sheet.pdf, as of December 20, 2010.
[9] Sandeep Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer and Manfred
Schimmler, Breaking Ciphers with COPACOBANA - A Cost-Optimized
Parallel Code Breaker., In: Cryptographic Hardware and Embedded
Systems — CHES 2006, pp.101–118, LNCS 4249, Springer-Verlag 2006.
[10] Tim Güneusu, Timo Kasper, Martin Novotný, Christof Paar and Andy
Rupp, Cryptanalysis with COPACOBANA., In: IEEE Transactions on
Computers, 2008, vol. 57, no. 11, pp.1498–1513.
[11] SciEngines, RIVYERA. http://www.sciengines.com/
products/computers-and-clusters/rivyera-s3-5000.
html, as of February 28, 2012.
[12] Car transponders table. http://www.keeloq.boom.ru/table.
pdf, as of December 20, 2010.
[13] NKAAY, HITAG-2 Key Tool V50.
http://www.nkaay.com/manual/hitag2.pdf, as of February
28, 2012.
[14] Henryk Plötz, Analyzing an unknown access control system, 2007.
http://www2.informatik.hu-berlin.de/˜ploetz/
analyzing-an-unknown-access-control-system.pdf,
aso of February 28, 2012.

View publication stats

You might also like