An overview of DECT security

Aus LaborWiki
Wechseln zu: Navigation, Suche

Titel: An overview of DECT security - history, present time and future changes[Bearbeiten | Quelltext bearbeiten]

Abstract: In late 2008, a group of researchers showed severe weaknesses in both the DECT standard and its implementations. Moreover, the deDECTed.org team did not only show theoretical vulnerabilities, they also for the presented open-source tools to intercept DECT communications. Fast forward two years - the DSC stream cipher used for bulk encryption in DECT has been completely broken, an open-source DECT stack exists as a result of this initial research and the ETSI together with the DECT Forum have worked out new standards and are in the process of introducing a certification process for DECT devices.

This talk will give an overview of security for devices using DECT from the point of view of an offensive security researchers that is a member of the original deDECTed.org team.