Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Legic Prime: Obscurity in Depth

Type
Video
Tags
RFID
Authors
Henryk Plötz, Karsten Nohl
Event
Chaos Communication Congress 26th (26C3) 2009
Indexed on
Mar 25, 2013
URL
http://mirror.fem-net.de/CCC/26C3/mp4/26c3-3709-en-legic_prime_obscurity_in_depth.mp4
File name
26c3-3709-en-legic_prime_obscurity_in_depth.mp4
File size
699.6 MB
MD5
e5a4cf5504968d200b5e94beda1590c1
SHA1
a3183905d5b0251920c368e736e49413152b2ddd

Legic Prime is an artifact from the time when proprietary cryptography in RFID was considered secure enough. We will demonstrate a break for basically any aspect of Legic Prime's claimed security features. If you rely on Legic Prime's security for anything, start migrating. Legic Prime uses obscurity as one of the main defenses against misuse, with readers and cards not readily available on the free market. The system employs multiple layers of strange and obscure techniques in lieu of proper encryption and cryptographic protocols, but promises great security and management features which other systems are lacking (and lacking for good reason).

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !