1. Attachments are working again! Check out this thread for more details and to report any other bugs.

immobilizer hard to defeat??

Discussion in 'Gen 2 Prius Audio and Electronics' started by NightRider, Mar 8, 2006.

  1. NightRider

    NightRider New Member

    Joined:
    Jul 21, 2005
    35
    0
    0
    Researchers said Saturday they have found a way to crack the code used in millions of car keys, a development they said could allow thieves to bypass the security systems on newer car models. The research team at Johns Hopkins University said it discovered that the "immobilizer" security system developed by Texas Instruments could be cracked using a "relatively inexpensive electronic device" that acquires information hidden in the microchips that make the system work. The radio-frequency security system being used in more than 150 million new Fords, Toyotas and Nissans involves a transponder chip embedded in the key and a reader inside the car.
    "We stole our own car," said Avi Rubin, who led the research team.
    Excerpts from an article published in the Detroit News, Sunday, January 30, 2005
     
  2. ScottY

    ScottY New Member

    Joined:
    May 18, 2005
    1,250
    7
    0
    Location:
    Long Island, NY
    Vehicle:
    2005 Prius
  3. hdrygas

    hdrygas New Member

    Joined:
    May 22, 2004
    3,650
    6
    0
    Location:
    Olympia Wa
    Vehicle:
    2004 Prius
    Though the code could be broken the Prius changes the code each time it is used. Someone will figure it out but for now there will be easier cars to steal.
     
  4. bobr1

    bobr1 New Member

    Joined:
    Nov 21, 2005
    306
    2
    0
    Location:
    Portland, Oregon, USA
    I do not recall reading anywhere that the Prius system changes the underlying cryptographic key each time the key is used. The way most challenge-response systems work is by filtering a challenge code through the hidden cryptographic key and sending back a response. To the casual observer, this looks like "changing the code" each time the key is used, but the actual underlying cryptographic key remains unchanged.

    The article at http://rfidanalysis.org/ indicates that they are able to determine the underlying cryptographic key with just two unique intercepted challenge-response pairs.

    The important point I got from the article is that an attacker would either have to pass within inches of you to scan your key (which is possible in a crowded parking lot), or would have to use a fairly large antenna within perhaps 50 ft or so to eavesdrop on the "conversation" your key has with your car.

    Although such modes of theft are possible (basically a high-tech upgrade of pickpocketing), the common kind of theft where a thief casually cases a bunch of random cars and breaks into and forces a start using a crudely hacked metal key are still effectively prevented.

    - Bob R.