1. Interactive decryption of DECT phone calls
- Author
-
McHardy, Patrick, Schuler, Andreas, Tews, Erik, Gollmann, Dieter, Westhoff, Dirk, Tsudik, Gene, and Asokan, N.
- Subjects
Key-recovery attack ,Base station ,Audio signal ,Phone ,business.industry ,Computer science ,Key (cryptography) ,Digital Enhanced Cordless Telecommunications ,Encryption ,business ,Replay attack ,Computer network - Abstract
DECT is a widely deployed standard mostly used for short range wireless phones. So far, no method has been published which is able to recover the audio signal in a call that is encrypted and lasts only for a few minutes. In this paper, we present a method that recovers the audio signal sent from the phone to its base station in an encrypted call. To do so, we use a replay-attack against the phone to recover the key streams, which were used to encrypt the call. The method is applicable to short calls too, where not enough keystreams are available to recover the ciphers key using a key recovery attack on DSC. The method is fast and practical and can be executed at very low cost.
- Published
- 2011
- Full Text
- View/download PDF