Block ciphers | Broken block ciphers

KeeLoq

KeeLoq is a proprietary hardware-dedicated block cipher that uses a non-linear feedback shift register (NLFSR). The uni-directional command transfer protocol was designed by Frederick Bruwer of Nanoteq (Pty) Ltd., the cryptographic algorithm was created by Gideon Kuhn at the University of Pretoria, and the silicon implementation was by Willem Smit at Nanoteq Pty Ltd (South Africa) in the mid-1980s. KeeLoq was sold to Microchip Technology Inc in 1995 for $10 million. It is used in "code hopping" encoders and decoders such as NTQ105/106/115/125D/129D, HCS101/2XX/3XX/4XX/5XX and MCS31X2. KeeLoq is or was used in many remote keyless entry systems by such companies as Chrysler, Daewoo, Fiat, GM, Honda, Toyota, Volvo, Volkswagen Group, Clifford, Shurlok, and Jaguar. (Wikipedia).

KeeLoq
Video thumbnail

The BuShou of HanZi :田

A brief description of the BuShou of 田.

From playlist The BuShou of HanZi

Video thumbnail

The BuShou of HanZi :目

A brief description of the BuShou of 目.

From playlist The BuShou of HanZi

Video thumbnail

The BuShou of HanZi :囗

A brief description of the BuShou of 囗.

From playlist The BuShou of HanZi

Video thumbnail

Slackjaw

An original song written by Taylor Sparks

From playlist music

Video thumbnail

Digitalis

An original song written by Taylor Sparks and Kye Browning

From playlist music

Video thumbnail

The BuShou of HanZi :宀

A brief description of the BuShou of 宀.

From playlist The BuShou of HanZi

Video thumbnail

The BuShou of HanZi :禾

A brief description of the BuShou of 禾.

From playlist The BuShou of HanZi

Video thumbnail

The BuShou of HanZi :耳

A brief description of the BuShou of 耳.

From playlist The BuShou of HanZi

Video thumbnail

25c3: Messing Around with Garage Doors

Speakers: Timo Kasper, Thomas Eisenbarth Breaking Remote Keyless Entry Systems with Power Analysis We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system. KeeLoq rem

From playlist 25C3: Nothing to hide

Related pages

Encryption | Timestamping (computing) | Cryptanalysis | Initialization vector | KeeLoq | Replay attack | Block cipher | Cryptographic nonce | Cipher | Least significant bit | Key (cryptography) | Linear approximation