Researchers could open and drive certain vehicles by cloning key fobs
The group, comprised of academics from Belgium’s KU Leuven University, is set to release a paper on the attack Monday at Amsterdam’s Cryptographic Hardware and Embedded Systems conference.
Taking advantage of the Model S key fob’s weak encryption, the attack allows any capable hacker to both open and drive away in the vehicle.
Video of the technique shows how the key fob’s cryptographic key can be stolen in less than 2 seconds using an array of equipment costing roughly $600 dollars.
As outlined by Wired’s Andy Greenberg, the key fob, developed by a company known as Pektron, only uses a 40-bit cipher to encrypt the key fob codes.
“The researchers found that once they gained two codes from any given key fob, they could simply try every possible cryptographic key until they found the one that unlocked the car,” Greenberg writes. “They then computed all the possible keys for any combination of code pairs to create a massive, 6-terabyte table of pre-computed keys. With that table and those two codes, the hackers say they can look up the correct cryptographic key to spoof any key fob in just 1.6 seconds.”