ALL-INKL.COM - Webhosting Server Hosting Domain Provider

Tesla S car key easily cloned

If you thought, a high tech car with a value of over
100’000 US$ cannot be stolen easily, then you’d better
not watch the following video. A team of the catholic
University Leuven in Belgium shows how.

With hardware worth 500 US$ you’ll be equipped for your less-than-a-minute-carjacking

All you need is an antenna (Yard Stick One), an USB-powered minicomputer (Raspberry Pi 3 B+), A software defined radio (Proxmark 3) and a USB powerbank to power it all.

The backend is a server with a 6 terabytes large database containing various pairing keys.

The problem is that the Tesla is constantly sending out a wake up signal to identify nearby keys and unlock itself to allow a quick start and ride experience.

With the antenna you’re good to go and take the signal from about 1m (3ft) distance most likely unnoticed.

The Raspi is gathering the information about the key and the car and compares them in the database remotely stored on the server.

This is so fast that it takes only a couple seconds to be performed completely. Rendering the car helpless against your “attack”

With only little effort you’re good to hijack a 100’000 US$ car.

Although Tesla has fixed the security leak by introducing a PIN-to-go system in the car, other vehicles are still suject to being instantly hijacked as they also use the same encryption/decryption method Tesla uses. So are also cars and bikes from McLaren, Karma and Triumph affected.

The encryption standard DST40 has been declared insecure by 2005 yet it is used in a wide variety of even actual cars, even luxury cars.

Since there’s no easy fix as the hardware inside the key is too weak to use an alternative encryption system, most companies still rely on DST40 and it’s insecure encryption power. 40 bits are just too weak to offer a good protection and that’s the reason why the TMTO attack (TMTO stands for Time/Memory TradeOff attack) is so successful and quick.

The only workaround for the companies mentioned above is to implement a second security system i.e. to start the vehicle using a passcode. But this passcode has to be entered on the vehicle.s console directly as otherwise even that communication sent from the key might be captured and rendering  the passcode obsolete.

So what we learn from this is, that comfort often has a tradeoff with security. The result is what we have now. A rather insecure transmission system for quite expensive vehicles making a theft easier as usual.

In the upcoming years, these companies will have to check on a new encryption method that is on the one hand lightweight and can be run from the transmitter with just a little more processing power. New small-embedded-systems on specially desigened SoCs should make this possible…

Watch the video here:


September 15, 2018 Netspark - 1594 posts - Member since: May 9th, 2011 No Comments »

RATING :
Rockbottom!Very badBadAverageGoodVery goodAwesome! (1 votes, average: 6.00 out of 7)
Loading...
FILED UNDER :Computer , Curiosities , News , Technology , Video
TAGGED WITH : , , , , , ,

Leave a comment