An overview of DECT security: Unterschied zwischen den Versionen

Aus LaborWiki
Wechseln zu: Navigation, Suche
(Die Seite wurde neu angelegt: „== Titel: An overview of DECT security - history, present time and future changes == Abstract: In late 2008, a group of researchers showed severe weaknesses in …“)
 
(kein Unterschied)

Aktuelle Version vom 3. Dezember 2010, 19:24 Uhr

Titel: An overview of DECT security - history, present time and future changes[Bearbeiten | Quelltext bearbeiten]

Abstract: In late 2008, a group of researchers showed severe weaknesses in both the DECT standard and its implementations. Moreover, the deDECTed.org team did not only show theoretical vulnerabilities, they also for the presented open-source tools to intercept DECT communications. Fast forward two years - the DSC stream cipher used for bulk encryption in DECT has been completely broken, an open-source DECT stack exists as a result of this initial research and the ETSI together with the DECT Forum have worked out new standards and are in the process of introducing a certification process for DECT devices.

This talk will give an overview of security for devices using DECT from the point of view of an offensive security researchers that is a member of the original deDECTed.org team.