A Practical Attack on KeeLoq

Sebastiaan Indesteege, N. Keller, Orr Dunkelman, Eli Biham, Bart Preneel

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review


KeeLoq is a lightweight block cipher with a 32-bit block size and a 64-bit key. Despite its short key size, it is widely used in remote keyless entry systems and other wireless authentication applications. For example, authentication protocols based on KeeLoq are supposedly used by various car manufacturers in anti-theft mechanisms. This paper presents a practical key recovery attack against KeeLoq that requires 216 known plaintexts and has a time complexity of 244.5 KeeLoq encryptions. It is based on the slide attack and a novel approach to meet-in-the-middle attacks. The fully implemented attack requires 65 minutes to obtain the required data and 7.8 days of calculations on 64 CPU cores. A variant which requires 216 chosen plaintexts needs only 3.4 days on 64 CPU cores. Using only 10 000 euro, an attacker can purchase a cluster of 50 dual core computers that will find the secret key in about two days. We investigated the way KeeLoq is intended to be used in practice and conclude that our attack can be used to subvert the security of real systems. An attacker can acquire chosen plaintexts in practice, and one of the two suggested key derivation schemes for KeeLoq allows to recover the master secret from a single key.
Original languageAmerican English
Title of host publicationAdvances in Cryptology – EUROCRYPT 2008
EditorsNigel Smart
Place of PublicationBerlin Heidelberg
StatePublished - 2008

Publication series

NameLecture Notes in Computer Science


Dive into the research topics of 'A Practical Attack on KeeLoq'. Together they form a unique fingerprint.

Cite this