How do other people's computers abduct your car?

Every time you walk through the parking lot or garage, you can hear familiar “beep” sounds that means the owner has securely locked the door with an electronic key. The tiny flashing light on the instrument panel is the embodiment of the latest anti-theft technology. It tells the thieves that they are about to make moves: The car has been protected by high technology, and you don't have to worry about it.

In most cases, this built-in encryption electronics technology is indeed unbreakable. Even so, there are not many cars stolen each year. For cybercrime, complicated technology does not necessarily create an effective barrier. Sometimes it even backfires. What is this all about?

Czech high tech lone thief

First let us introduce Radko Soucek of the Czech Republic. Soček is in his thirties, but his street-stealing life began as early as when he was eleven. From the outside, he is not like a high-tech thief.

According to the International Association of Car Theft Surveys, there is a "prize" in the country where he lives - the annual car theft rate is more than ten times that of other European countries. Czech officials believe that most of the 51,000 car theft cases each year are organized teams that commit crimes by falsifying their identities and dismantling automotive components.

However, Soček is a lone thief. His famous quote is: You stop, lock the door, and then go home. The time is mine.

As early as the 1990s, more and more European car manufacturers added computer technology to high-end cars, such as Mercedes-Benz, BMW, Ferrari, Porsche, and so on. At the time, Sochke realized that he could use his own software to defeat the manufacturer's anti-theft software. However, due to the lack of formal computer training, he only used some of the software provided on the Internet, and soon the software began to work in Prague and other regions.

In a prison in Prague, Sochke said that twenty years ago he only needed a pair of scissors to handle any Italian sports car. “Now what you need is more technology.” He already does not need those physics. Equipment, and now the tool he uses is a laptop.

There are also many similar theft gangs in the streets of many European countries. They specialize in high-end brands and models of cars. Through special techniques, they can try and guess the anti-theft code in the electronic key. More likely, they have even received vendor's proprietary coding algorithms (which can be stolen, bought, or provided by insiders).

The password of the anti-theft system does not make us more secure. It just makes us proud and we forget about common sense because of our trust in it, such as parking in a bright place, carrying valuables with us, using wheel-assisted locking mechanisms, etc. .

We think that high technology is enough to replace experience, so we are no longer concerned about car safety, and even the definition of safety has become blurred. In addition, manufacturers are no longer raising the level of car safety, and instead improve the owner's driving comfort.

How many cars are actually stolen by computer-simulated key codes? We haven't got a set number, but we don't have a few. When Sochker was arrested in 2006, 150 laptops were found in his laptop. "You can erase all data from your computer, but if you store more data, the theft is successful. The more likely it is," he said.

The analysis of laptop stealing technology

So, how exactly are notebooks used to steal cars? (The following knowledge is for technical discussion only. Do not use for illegal purposes.)

First we need to know what happened when you opened the door and started the car. Most cars use a remote wireless electronic key: you just press the button and it will generate a radio signal to switch the door.

The electronic key can broadcast a coded signal to a car a hundred feet away with the aid of a miniature battery. After the car receives the signal, it will beep and the headlights of the car will flash. This tells you both audibly and visually. : The car is locked. The wireless communication between the key and car is extremely short-lived. When the car receives the expected signal, it will run the specified function.

In order to enhance security, the code used is a rolling code, which the industry calls code hopping. Both the electronic key and the car use the same pseudo-random number seed generated by the proprietary algorithm.

When you open or close the door, both the car and the key will store the next random password generated. And when you are far away from the car and do not press the key within the sensing range, the car and the key time will be out of sync. In the event of such an accident, there is no need to be nervous, but because the random number generated at this time is within the next 256 counts, the car's receiver can still recognize it, but if you are furiously pressing the electronic key while away from the car, over 256 Secondly, you will no longer be able to synchronize with the car (call the Auto Trial Party!). It should be noted that the key here is only the switch used to control the door.

Once you get into the car, you will be faced with another kind of anti-theft technology - the static vehicle anti-theft chip, which is embedded in the plastic substrate of the metal key and plays a vital role. Thanks to this anti-theft device, the number of vehicle theft cases in the United States has dropped dramatically in recent years.

Unlike wireless remote-controlled door locks, radio frequency identification (RFID) chips require an activation and challenge process. When you insert the metal key into the ignition slot, the transponder inside the car (usually near the steering wheel) activates and interrogates the chip in the metal key. The activated anti-theft chip broadcasts a low-frequency code for interaction. The broadcast range is only a few inches, so the key must be inserted into the ignition slot.

Once the chip in the key is verified, the anti-theft system unlocks the rest of the electronic system in the car. In old-fashioned vehicles, "fixed yards" (one car, one yard) are used, and today's cars generate and store new anti-theft codes after each use. It can be said that the anti-theft system is no longer a separate component of the car, it has been widely bundled in the car's electronic system.

Maid key - special sub key

Here we also introduce a special sub key, the valet key, which is a third party key provided by the dealer. There is no anti-theft chip in the key. It allows the car to drive a short distance before it is locked. You may use it when you let a servant help you to park, so that you don't have to worry about the servant driving away from the car.

40-bit encryption has failed

It is the wireless electronic key and vehicle anti-theft chip that constitutes the high-tech anti-theft technology used in most of today's vehicles. Both use RFID encoding to interact, and if so, the common disadvantage of both is that only 40-bit encryption is used. If you put this in the 1990s, it is more than enough, but now it is too short.

As we all know, the more bits are encrypted, the more difficult it is to crack the password, and the more processing time and resources it consumes. 40-bit encryption used to take tens of days to crack, but now it only takes a few hours. Today's 256-bit encryption is considered a very strong encryption algorithm, but few cars can use this level of encryption.

As early as 1965, Gordon Moore, one of the founders of Intel Corporation, proposed the famous "Moore's Law" - the number of transistors that can be accommodated on integrated circuits, which will increase by about 18 months. Times, performance will also double. It is this exponential chip development speed that greatly increases the processing power of computers, which also leads to the current low price of computers.

Of course, this also facilitates password cracking. Shorter passwords can be quickly brute-forced. At the same time, due to defects in digital signature transponders (DSTs), today's cars are even more vulnerable to computer theft.

Sochke told us that he had all the previously stolen anti-theft codes on the laptop's hard disk. When he needs to crack the password of a car, he will first use the same manufacturer's vehicle theft sequence to calculate the car's password. He has a database of his own, which is why Socksek can become a lone thief. But there is also a risk. After the arrest of Soček, the authorities quickly found enough evidence in his laptop hard drive.

As science and technology advance with each passing day, the fight between theft and burglary will continue. What we can do is not blindly trust the anti-theft system. At the same time, we need to rely on daily experience to increase the safety of the vehicle and minimize the possibility of car theft.




Transmission Shaft

Transmission Shaft,Transmission Input Shaft,Transmission Output Shaft,Transmission Counter Shaft,Transmission Main Shaft,Transmission Gear Shaft

ShaoXing Change Auto Synchronizer Ring Co.,Ltd , https://www.sxcjautoparts.com

Posted on