YoVDO

Cracking HiTag2 Crypto - Detailed Look at the Academic Attacks

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Ethical Hacking Courses Encryption Courses Cryptanalysis Courses Brute-Force Attacks Courses RFID Technology Courses

Course Description

Overview

Dive deep into the world of RFID hacking with this comprehensive workshop on cracking HiTag2 crypto, presented by Kevin Sheldrake at 44CON 2017. Explore the intricacies of HiTag2 RFID technology, including its 2-way authentication and encryption protocols. Learn about three powerful attacks on the HiTag2 encryption system, originally developed by academic researchers. Discover how to implement these attacks using RFIDler and desktop computers, including nonce replay for accessing readable tag pages, and time/memory trade-off brute force and cryptanalytic attacks for recovering keys and accessing read-protected pages. Witness practical demonstrations of weaponized attacks that enable tag cloning. Note that viewing the prerequisite talk "Cracking HiTag2 Crypto – Weaponising Academic Attacks for Breaking and Entering" is recommended before watching this workshop.

Syllabus

Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop


Taught by

44CON Information Security Conference

Related Courses

Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam
An Introduction to Cryptography
Coventry University via FutureLearn