Title
Attacks on the DECT Authentication Mechanisms
Abstract
Digital Enhanced Cordless Telecommunications (DECT) is a standard for connecting cordless telephones to a fixed telecommunications network over a short range. The cryptographic algorithms used in DECT are not publicly available. In this paper we reveal one of the two algorithms used by DECT, the DECT Standard Authentication Algorithm (DSAA). We give a very detailed security analysis of the DSAA including some very effective attacks on the building blocks used for DSAA as well as a common implementation error that can practically lead to a total break of DECT security. We also present a low cost attack on the DECT protocol, which allows an attacker to impersonate a base station and therefore listen to and reroute all phone calls made by a handset.
Year
DOI
Venue
2009
10.1007/978-3-642-00862-7_4
IACR Cryptology ePrint Archive
Keywords
DocType
Volume
cordless telephone,dect protocol,building block,detailed security analysis,common implementation error,effective attack,base station,digital enhanced cordless telecommunications,dect standard authentication algorithm,dect authentication mechanisms,dect security,security analysis
Conference
2009
ISSN
Citations 
PageRank 
0302-9743
10
1.35
References 
Authors
2
5
Name
Order
Citations
PageRank
Stefan Lucks11083108.87
Andreas Schuler2101.35
Erik Tews328120.11
Ralf-Philipp Weinmann430820.88
Matthias Wenzel5273.15