Sponsored Links
-->

Sunday, September 23, 2018

Identifying a rolling code remote - YouTube
src: i.ytimg.com

A rolling code (or sometimes called a hopping code) is used in keyless entry systems to prevent replay attacks, where an eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock'. Such systems are typical in garage door openers and keyless car entry systems.


Video Rolling code



Techniques

  • Common PRNG (pseudorandom number generator) -- preferably cryptographically secure -- in both transmitter and receiver
  • Transmitter sends 'next' code in sequence
  • Receiver compares 'next' to its calculated 'next' code.
  • A typical implementation compares within the next 256 codes in case receiver missed some transmitted keypresses.

Maps Rolling code



Application in RF remote control

A rolling code transmitter is useful in a security system for providing secure encrypted radio frequency (RF) transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable component.


Rolling code keyfob FSK decode+replay test - YouTube
src: i.ytimg.com


Rolling code vs. fixed code RF remote control

Remote controls send signals in code. When the sending code is the same as the code that is expected by the receiver, then the receiver will actuate the relay, unlock the door, or open the barrier. Remote controls with a fixed code always send the same fixed code. Remote controls with a rolling code (or hopping code) always send out a different code from the one previously sent.


Rolling Code 2-Channel UHF Remote Control Kit
src: www.circuitspecialists.com


KeeLoq

The Microchip HCS301 was once the most widely used system on garage and gate remote control and receivers. The chip uses the KeeLoq algorithm. The HCS301 KeeLoq system transmits 66 data bits.

  • 34 bits are not encrypted : a 28-bit serial number, 4 bits of button information, and 2 status bits (repeat and low battery indicators).
  • 32 bits are encrypted (the rolling code) : 4 bits of button information, 2 bits of OVR (used to extend counter value), 10 bits of DISC (discrimination value; often the low 10 bits of the serial number), and a 16-bit counter. In a resyncing situation, the encrypted 32 bits are replaced with a 32-bit seed value.

EasyScan - tutorial - Normal Rolling Code - YouTube
src: i.ytimg.com


Rolljam vulnerability

A rolling code transmitted by radio signal that can be intercepted can be vulnerable to falsification. In 2015, it was reported that Samy Kamkar had built an inexpensive electronic device about the size of a wallet that could be concealed on or near a locked vehicle to capture a single keyless entry code to be used at a later time to unlock the vehicle. The device transmits a jamming signal to block the vehicle's reception of rolling code signals from the owner's fob, while recording these signals from both of his two attempts needed to unlock the vehicle. The recorded first code is forwarded to the vehicle only when the owner makes the second attempt, while the recorded second code is retained for future use. Kamkar stated that this vulnerability had been widely known for years to be present in many vehicle types, but was previously undemonstrated. A demonstration was done during DEF CON 23.


HSC301 Rolling Code Remotes Programmer ← LMPAutomation Blog
src: lmpautomation.com


References


Buy hcs301 rolling code module and get free shipping on AliExpress.com
src: ae01.alicdn.com


External links

  • How Remote Entry Works; cites successful attack on KeeLoq.
  • Atmel Inc.'s application note AVR411

Source of article : Wikipedia