<oai_dc:dc xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
        <dc:relation>http://tuprints.ulb.tu-darmstadt.de/2932/</dc:relation>
        <dc:title>DECT Security Analysis</dc:title>
        <dc:creator>Tews, Erik</dc:creator>
        <dc:description>DECT is a standard for cordless phones. The intent of this thesis is to evaluate DECT security in a&#13;
comprehensive way. To secure conversations over the air, DECT uses two proprietary algorithms, namely&#13;
the DECT Standard Authentication Algorithm (DSAA) for authentication and key derivation, and the DECT&#13;
Standard Cipher (DSC) for encryption. Both algorithms have been kept secret and were only available&#13;
to DECT device manufacturers under a None Disclosure Agreement (NDA). The reader is first introduced&#13;
into the DECT standard. The two algorithms DSAA and DSC have been reverse engineered and are then&#13;
described in full detail. At first, attacks against DECT devices are presented, that are based on faults made&#13;
by the manufacturers while implementing the DECT standard. In the next Chapters, attacks against the&#13;
DSAA and the DSC algorithm are described, that recover the secret keys used by these algorithms faster&#13;
than by brute force. Thereafter, a attack against the DECT radio protocol is described, that decrypts&#13;
encrypted DECT voice calls. Finally, an outlook over the next release of the DECT standard is presented,&#13;
that is expected to counter all attacks against DECT, that are described in this thesis.</dc:description>
        <dc:date>2012-05-30</dc:date>
        <dc:type>Ph.D. Thesis</dc:type>
        <dc:type>NonPeerReviewed</dc:type>
        <dc:format>application/pdf</dc:format>
        <dc:language>eng</dc:language>
        <dc:rights>Creative Commons: Attribution-Noncommercial-No Derivative Works 3.0</dc:rights>
        <dc:identifier>http://tuprints.ulb.tu-darmstadt.de/2932/1/thesis-webview.pdf</dc:identifier>
        <dc:identifier>    Tews, Erik &lt;http://tuprints.ulb.tu-darmstadt.de/view/person/Tews=3AErik=3A=3A.html&gt;    :  DECT Security Analysis.    Technische Universität, Darmstadt     [Ph.D. Thesis], (2012)  </dc:identifier>
        <dc:language>en</dc:language>
        <dc:type>info:eu-repo/semantics/doctoralThesis</dc:type>
        <dc:rights>info:eu-repo/semantics/openAccess</dc:rights></oai_dc:dc>