Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key
New York Times ^ | January 29, 2005 | JOHN SCHWARTZ

Posted on 01/29/2005 4:37:19 AM PST by MississippiMasterpiece

BALTIMORE - Matthew Green starts his 2005 Ford Escape with a duplicate key he had made at Lowe's. Nothing unusual about that, except that the automobile industry has spent millions of dollars to keep him from being able to do it.

Mr. Green, a graduate student at Johns Hopkins University, is part of a team that plans to announce on Jan. 29 that it has cracked the security behind "immobilizer" systems from Texas Instruments Inc. The systems reduce car theft, because vehicles will not start unless the system recognizes a tiny chip in the authorized key. They are used in millions of Fords, Toyotas and Nissans.

All that would be required to steal a car, the researchers said, is a moment next to the car owner to extract data from the key, less than an hour of computing, and a few minutes to break in, feed the key code to the car and hot-wire it.

An executive with the Texas Instruments division that makes the systems did not dispute that the Hopkins team had cracked its code, but said there was much more to stealing a car than that. The devices, said the executive, Tony Sabetti, "have been fraud-free and are likely to remain fraud-free."

The implications of the Hopkins finding go beyond stealing cars.

Variations on the technology used in the chips, known as RFID for radio frequency identification, are widely used. Similar systems deduct highway tolls from drivers' accounts and restrict access to workplaces.

Wal-Mart is using the technology to track inventory, the Food and Drug Administration is considering it to foil drug counterfeiting, and the medical school at the University of California, Los Angeles, plans to implant chips in cadavers to curtail unauthorized sale of body parts.

The Johns Hopkins researchers say that if other radio frequency ID systems are vulnerable, the new field could offer far less security than its proponents promise.

The computer scientists are not doing R.&D. for the Mafia. Aviel D. Rubin, a professor of computer science who led the team, said his three graduate students did what security experts often do: showed the lack of robust security in important devices that people use every day.

"What we find time and time again is the security is overlooked and not done right," said Dr. Rubin, who has exposed flaws in electronic voting systems and wireless computer networks.

David Wagner, an assistant professor of computer science at the University of California, Berkeley, who reviewed a draft of a paper by the Hopkins team, called it "great research," adding, "I see it as an early warning" for all radio frequency ID systems.

The "immobilizer" technology used in the keys has been an enormous success. Texas Instruments alone has its chips in an estimated 150 million keys. Replacing the key on newer cars can cost hundreds of dollars, but the technology is credited with greatly reducing auto theft. - Early versions of in-key chips were relatively easy to clone, but the Texas Instruments chips are considered to be among the best. Still, the amount of computing the chip can do is restricted by the fact that it has no power of its own; it builds a slight charge from an electromagnetic field from the car's transmitter.

Cracking the system took the graduate students three months, Dr. Rubin said. "There was a lot of trial and error work with, every once in a while, a little 'Aha!' "

The Hopkins researchers got unexpected help from Texas Instruments itself. They were able to buy a tag reader directly from the company, which sells kits for $280 on its Web site. They also found a general diagram on the Internet, from a technical presentation by the company's German division. The researchers wrote in the paper describing their work that the diagram provided "a useful foothold" into the system. (The Hopkins paper, which is online at www.rfidanalysis.org, does not provide information that might allow its work to be duplicated.

The researchers discovered a critically important fact: the encryption algorithm used by the chip to scramble the challenge uses a relatively short code, known as a key. The longer the code key, which is measured in bits, the harder it is to crack any encryption system.

"If you were to tell a cryptographer that this system uses 40-bit keys, you'd immediately conclude that the system is weak and that you'd be able to break it," said Ari Juels, a scientist with the research arm of RSA Security, which financed the team and collaborated with it.

The team wrote software that mimics the system, which works through a pattern of challenge and response. The researchers took each chip they were trying to clone and fed it challenges, and then tried to duplicate the response by testing all 1,099,511,627,776 possible encryption keys. Once they had the right key, they could answer future challenges correctly.

Mr. Sabetti of Texas Instruments argues that grabbing the code from a key would be very difficult, because the chips have a very short broadcast range. The greatest distance that his company's engineers have managed in the laboratory is 12 inches, and then only with large antennas that require a power source.

Dr. Rubin acknowledged that his team had been able to read the keys just a few inches from a reader, but said many situations could put an attacker and a target in close proximity, including crowded elevators.

The researchers used several thousand dollars of off-the-shelf computer equipment to crack the code, and had to fill a back seat of Mr. Green's S.U.V. with computers and other equipment to successfully imitate a key. But the cost of equipment could be brought down to several hundred dollars, Dr. Rubin said, and Adam Stubblefield, one of the Hopkins graduate students, said, "We think the entire attack could be done with a device the size of an iPod."

The Texas Instruments chips are also used in millions of the Speedpass tags that drivers use to buy gasoline at ExxonMobil stations without pulling out a credit card, and the researchers have shown that they can buy gas with a cracked code. A spokeswoman for ExxonMobil, Prem Nair, said the company used additional antifraud measures, including restrictions that only allow two gas purchases per day.

"We strongly believe that the Speedpass devices and the checks that we have in place are much more secure than those using credit cards with magnetic stripes," she said.

The team discussed its research with Texas Instruments before making the paper public. Matthew Buckley, a spokesman for RSA Security, said his company, which offers security consulting services and is developing radio frequency ID tags that resist unauthorized eavesdropping, had offered to work with Texas Instruments free of charge to address the security issues.

Dr. Wagner said that what graduate students could do, organized crime could also do. "The white hats don't have a monopoly on cryptographic expertise," he said.

Dr. Rubin said that if criminals did eventually duplicate his students' work, people could block eavesdroppers by keeping the key or Speedpass token in a tinfoil sheath when not in use. But Mr. Sabetti, the Texas Instruments executive, said such precautions were unnecessary. "It's a solution to a problem that doesn't exist," he said.

Dan Bedore, a spokesman for Ford, said the company had confidence in the technology. "No security device is foolproof," he said, but "it's a very, very effective deterrent" to drive-away theft. "Flatbed trucks are a bigger threat," he said, "and a lot lower tech."


TOPICS: Business/Economy; Culture/Society; News/Current Events
KEYWORDS: autotheft; computersecurity; ford; privacy; rfid; technology; ti; whitehats
Navigation: use the links below to view more comments.
first 1-2021-24 next last
From left, Prof. Aviel D. Rubin, Adam Stubblefield, Matthew Green and Stephen Bono working with cards programmed to conduct an assault on a car-key chip.

1 posted on 01/29/2005 4:37:19 AM PST by MississippiMasterpiece
[ Post Reply | Private Reply | View Replies]

To: MississippiMasterpiece

Inventive bunch. Good work.


2 posted on 01/29/2005 4:40:36 AM PST by Jet Jaguar (Civilization is an enormous improvement on the lack thereof. (O'Rourke))
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece
Anything the pros want to steal - they can get. Most security systems will stop people who don't have the patience or training to get past it. So the implications of this are theoretical for most of us. We have to balance the expense of security with the likelihood a theft will occur.

Denny Crane: "I want two things. First God and then Fox News."

3 posted on 01/29/2005 4:44:00 AM PST by goldstategop (In Memory Of A Dearly Beloved Friend Who Lives On In My Heart Forever)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece

OK! If it takes a Johns Hopkins grad student to steal my car, I'm willing to run the risk!


4 posted on 01/29/2005 5:10:18 AM PST by night reader
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

I like the part about disabling automated toll collection systems. Maybe these kids can put our demented governor's plan out of business (in Texas).

http://www.freerepublic.com/focus/f-news/1329336/posts


5 posted on 01/29/2005 5:14:18 AM PST by BobL
[ Post Reply | Private Reply | To 2 | View Replies]

To: MississippiMasterpiece
...and the medical school at the University of California, Los Angeles, plans to implant chips in cadavers to curtail unauthorized sale of body parts.

Well, I'm impressed that it takes a grad student and several professors from our institutions of higher learning to make a dent in the security of my vehicle, but...

I was definitely not aware that we had a problem with body parts from cadavers being sold.

Who is selling them?

Who are they selling them to?

Who removes them for sale?

Who accepts them and installs them?

I thought I was a pretty well-read and knowledgeable person, been there/done that kind of person, but this is the first I've heard of this.

I can just see some poor fellow that got the bargain-basement deal at his local flea market for his left kidney, walking down the street, whistling away, only to be confronted by the "Stolen Body Parts" squad from the local precinct, it having been detected by a "routine" RFID scan of the poor fellow.

This could be hugh and series.

6 posted on 01/29/2005 5:33:57 AM PST by OldSmaj (Jihad this, Islam! Your religion is false and your god is non-existent! Come get me.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece
people could block eavesdroppers by keeping the key or Speedpass token in a tinfoil sheath

See, maybe the tinfoil hats are a good idea.

7 posted on 01/29/2005 5:36:51 AM PST by j. earl carter
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece

Future NSA employees?

Good news for all you online bankers?


8 posted on 01/29/2005 5:37:52 AM PST by Jimmy Valentine's brother (Crush your enemies; see them driven before you and hear the lamentation of their women - Conan)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece

My Dad always said locks only stop honest people.


9 posted on 01/29/2005 6:10:30 AM PST by Semi Civil Servant (Edward R. Murrow, call your office.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece
There is not a piece of technology out there that cant be cracked or duplicated given enough computer time. This is why a scheme for a national ID card is a folly, and reliance on that in the name of security will lead to catastrophe.
10 posted on 01/29/2005 6:27:02 AM PST by aspiring.hillbilly
[ Post Reply | Private Reply | To 1 | View Replies]

To: night reader
OK! If it takes a Johns Hopkins grad student to steal my car, I'm willing to run the risk!

If a Johns Hopkins grad student can do it, I'm sure any druggie high school dropout with an IQ of 80 will have no trouble hacking your car's security system. /sarcasm

11 posted on 01/29/2005 6:33:42 AM PST by Wilhelm Tell (Lurking since 1997!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Wilhelm Tell

No. But you have some computer whiz in Moscow hired by the Russian mafia creating a program & process. That then gets distributed and the mafia sets up car theft rings in multiple cities.


12 posted on 01/29/2005 7:03:29 AM PST by rbg81
[ Post Reply | Private Reply | To 11 | View Replies]

To: rbg81

Locked car doors can be opened by a universal remote TV clicker...


13 posted on 01/29/2005 7:19:15 AM PST by Eric in the Ozarks
[ Post Reply | Private Reply | To 12 | View Replies]

To: aspiring.hillbilly; Southack; NormsRevenge

"This is why a scheme for a national ID card is a folly, and reliance on that in the name of security will lead to catastrophe."

And note that the Big Auto execs are denying that RFID is a problem. Technology including guns are mere tools used by people for good or evil. Sometimes the good create tools and systems the evil hijack.....

SCENARIO: keep in mind the book of Revelation, then think of "1984" and then the '70s movie "A Thief In The Night" (or the current "Left Behind" blockbusters)....then consider our satellite network, the capabilities of ecommerce, cell phones, children animals and felons already injected with satellite trackable capsules...now RFID taking hold in a big way--and vulnerable to hacking.....

(truly end-times apocalyptic shudder) God save us from ourselves!


14 posted on 01/29/2005 7:33:14 AM PST by The Spirit Of Allegiance (ATTN. MARXIST RED MSM: I RESENT your "RED STATE" switcheroo using our ELECTORAL MAP as PROPAGANDA!)
[ Post Reply | Private Reply | To 10 | View Replies]

To: aspiring.hillbilly

"There is not a piece of technology out there that cant be cracked or duplicated given enough computer time. This is why a scheme for a national ID card is a folly, and reliance on that in the name of security will lead to catastrophe."

Not if it is a DNA fingerprint. That can't (to my knowledge) be duplicated. I am very much in favor of a national ID card.


15 posted on 01/29/2005 7:41:27 AM PST by RichardW
[ Post Reply | Private Reply | To 10 | View Replies]

To: Eric in the Ozarks

"Locked car doors can be opened by a universal remote TV clicker.."

I thought TV clickers were IR.


16 posted on 01/29/2005 7:52:58 AM PST by babygene (Viable after 87 trimesters)
[ Post Reply | Private Reply | To 13 | View Replies]

To: babygene

My son (the computer/2800 geek) claims it can be done.


17 posted on 01/29/2005 7:54:28 AM PST by Eric in the Ozarks
[ Post Reply | Private Reply | To 16 | View Replies]

Comment #18 Removed by Moderator

To: MississippiMasterpiece

What can be done in theory, imitated in tests, and is practical in real life are often different. I'm not sure most of the car thieves around are really high tech gurus, willing and able to spend the time and money.

And couldn't the chips be remanufactured to add a couple of numbers into the encription, making the breaking of the code more difficult by a multiple?


19 posted on 01/29/2005 8:01:10 AM PST by wildbill
[ Post Reply | Private Reply | To 1 | View Replies]

To: Blurblogger
SCENARIO: keep in mind the book of Revelation, then think of "1984" and then the '70s movie "A Thief In The Night" (or the current "Left Behind" blockbusters)....then consider our satellite network, the capabilities of ecommerce, cell phones, children animals and felons already injected with satellite trackable capsules...now RFID taking hold in a big way--and vulnerable to hacking.....

(truly end-times apocalyptic shudder) God save us from ourselves!

But consider, in your scenario, who might be doing the hacking. Who is most likely to want to circumvent the government in those days? Some may someday bless such vulnerabilities.

20 posted on 01/29/2005 9:55:07 AM PST by GOP Jedi
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-24 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson