25C3 - 1.4.2.3

25th Chaos Communication Congress
Nothing to hide

Speakers
Erik Tews
Ralf-Philipp Weinmann
Andreas Schuler
Schedule
Day Day 3 (2008-12-29)
Room Saal 1
Start time 17:15
Duration 01:00
Info
ID 2937
Event type lecture
Track Hacking
Language used for presentation en
Feedback

DECT

The Digital Enhanced Cordless Telecommunications standard

Digital Enhanced Cordless Telecommunications (DECT) is a synonym for cordless phones today. Although DECT can be found nearly everywhere, only little is known about the security of DECT. Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public. Nevertheless we decided to investigate the security of DECT closer ...

Digital Enhanced Cordless Telecommunications (DECT) is a synonm for cordless phones today. Although DECT can be found nearly everywhere, only little is known about the security of DECT. Most parts of the DECT standard are public, but all cryptographic algorithms used in DECT (authentication and encryption) are secret and not known to the public.

We will show you the following:

  • An introduction into the DECT protocol.
  • An introduction to the DECT authentication and key management functions.
  • An introduction into the DECT low level communication.
  • A detailed security analysis of the protocol.
  • The secret DSAA algorithm
  • Parts of the secret DSC algorithm