Millions at Risk as Boffins Break Doorlock Code. Or Not.


Microchip Technologies (MT) is in full damage/spin control mode, as Israeli and Belgian boffins say they've cracked the "Keeloq" anti-theft key code. The code is the foundation of the company's remote control system. MT's plippers lock and unlock the doors and immobilize and de-immobilize models built by Fiat, General Motors, Toyota, Volvo, Honda, Volkswagen, Jaguar, Daewoo and Chrysler. Microchip's website calls the code "a highly secure algorithm." The hackers call it lunchmeat. The Jerusalem Post says all the geeks have to do is wirelessly access your key for about an hour, run their computer program and hey presto! They can identify your code from a billion billion possibilities, unlock your car and motor away. Or can they? "Our attack was checked in depth in program simulations," claimed researchers Sebastian Indestig, Eli Beham, Or Dunkelman, Barrett Fernil and Natan Keller. These guys would do well to remember the Ancient Art of War admonition: the algorithm is not the territory.

More by Robert Farago
Comments
Join the conversation
Um, if it takes someone an hour of wireless access to break a key or keyfob code, doesn't that mean my key code or keyfob has to be broadcasting to let the hacker determine its coding for the entire hour. Do our keys and fobs continuously broadcast?
CSJohnston: The keyfobs mentioned in this story only broadcast when you press the button (the keys do not broadcast). In the early days of car alarms, there were "Code Grabbers" that could potentially steal the frequency of your remote control. But the conditions had to be just right to have it work. So someone would have to steal your keyfob for AN HOUR to learn the algorithm of your keyfob to potentially code up a new set of keys. Fugeddeboudit- the cost and time involved for the average thief would be prohibitive. Some geeks out there are brilliant to crack a code, but to no avail with no practical application.