<xMetaDiss:xMetaDiss xsi:schemaLocation="http://www.d-nb.de/standards/xMetaDiss/ http://www.d-nb.de/standards/xmetadiss/xmetadiss.xsd" xmlns:xMetaDiss="http://www.d-nb.de/standards/xMetaDiss/" xmlns:cc="http://www.d-nb.de/standards/cc/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcmitype="http://purl.org/dc/dcmitype/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:pc="http://www.d-nb.de/standards/pc/" xmlns:urn="http://www.d-nb.de/standards/urn/" xmlns:thesis="http://www.ndltd.org/standards/metadata/etdms/1.0/" xmlns:ddb="http://www.d-nb.de/standards/ddb/" xmlns="http://www.d-nb.de/standards/subject" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><dc:title xsi:type="ddb:titleISO639-2" lang="eng">DECT Security Analysis</dc:title><dc:title xsi:type="ddb:titleISO639-2" ddb:type="translated" lang="ger">DECT Sicherheitsanalyse</dc:title><dc:creator xsi:type="pc:MetaPers"><pc:person><pc:name type="nameUsedByThePerson"><pc:foreName>Erik</pc:foreName><pc:surName>Tews</pc:surName></pc:name></pc:person></dc:creator><dc:subject xsi:type="xMetaDiss:DDC-SG">510 Mathematik</dc:subject><dc:subject xsi:type="xMetaDiss:DDC-SG">620 Ingenieurwissenschaften</dc:subject><dcterms:abstract lang="eng" xsi:type="ddb:contentISO639-2">DECT is a standard for cordless phones. The intent of this thesis is to evaluate DECT security in a&#13;
comprehensive way. To secure conversations over the air, DECT uses two proprietary algorithms, namely&#13;
the DECT Standard Authentication Algorithm (DSAA) for authentication and key derivation, and the DECT&#13;
Standard Cipher (DSC) for encryption. Both algorithms have been kept secret and were only available&#13;
to DECT device manufacturers under a None Disclosure Agreement (NDA). The reader is first introduced&#13;
into the DECT standard. The two algorithms DSAA and DSC have been reverse engineered and are then&#13;
described in full detail. At first, attacks against DECT devices are presented, that are based on faults made&#13;
by the manufacturers while implementing the DECT standard. In the next Chapters, attacks against the&#13;
DSAA and the DSC algorithm are described, that recover the secret keys used by these algorithms faster&#13;
than by brute force. Thereafter, a attack against the DECT radio protocol is described, that decrypts&#13;
encrypted DECT voice calls. Finally, an outlook over the next release of the DECT standard is presented,&#13;
that is expected to counter all attacks against DECT, that are described in this thesis.</dcterms:abstract><dc:publisher ddb:role="Universitäts- und Landesbibliothek" countryCode="DE" xsi:type="cc:Publisher" type="dcterms:ISO3166"><cc:universityOrInstitution><cc:name>Universitäts- und Landesbibliothek Darmstadt</cc:name><cc:place>Darmstadt</cc:place></cc:universityOrInstitution><cc:address cc:Scheme="DIN5008">Schloss, 64283 Darmstadt</cc:address></dc:publisher><dc:contributor xsi:type="pc:Contributor" thesis:role="advisor"><pc:person><pc:name type="nameUsedByThePerson"><pc:foreName>Buchmann</pc:foreName><pc:surName>Johannes</pc:surName></pc:name></pc:person></dc:contributor><dc:contributor xsi:type="pc:Contributor" thesis:role="advisor"><pc:person><pc:name type="nameUsedByThePerson"><pc:foreName>Lucks</pc:foreName><pc:surName>Stefan</pc:surName></pc:name></pc:person></dc:contributor><dcterms:dateAccepted xsi:type="dcterms:W3CDTF">2011-09-19</dcterms:dateAccepted><dc:type xsi:type="ddb:PublType">ElectronicThesisandDissertation</dc:type><dc:identifier xsi:type="urn:nbn">urn:nbn:de:tuda-tuprints-29328</dc:identifier><dcterms:medium xsi:type="dcterms:IMT">application/pdf</dcterms:medium><dc:language xsi:type="dcterms:ISO639-2">eng</dc:language><thesis:degree><thesis:level>thesis.doctoral</thesis:level><thesis:grantor xsi:type="cc:Corporate" type="dcterms:ISO3166" countryCode="DE"><cc:universityOrInstitution><cc:name>Technische Universität Darmstadt</cc:name><cc:place>Darmstadt</cc:place><cc:department><cc:name>Department of Computer Science</cc:name></cc:department></cc:universityOrInstitution></thesis:grantor></thesis:degree><ddb:contact ddb:contactID="F6000-0090"></ddb:contact><ddb:fileNumber>1</ddb:fileNumber><ddb:fileProperties ddb:fileName="thesis-webview.pdf" ddb:fileID="file15686" ddb:fileSize="706866"></ddb:fileProperties><ddb:identifier ddb:type="URL">http://tuprints.ulb.tu-darmstadt.de/2932/</ddb:identifier><ddb:rights ddb:kind="unknown"></ddb:rights><ddb:server>Universitäts- und Landesbibliothek, Darmstadt</ddb:server></xMetaDiss:xMetaDiss>