DocumentCode :
175353
Title :
Practical Interception of DECT Encrypted Voice Communication in Unified Communications Environments
Author :
Coisel, Iwen ; Sanchez, Israel
Author_Institution :
Joint Res. Centre, Eur. Comm., Ispra Varese, Italy
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
115
Lastpage :
122
Abstract :
Digital Enhanced Cordless Telephony, DECT, is a worldwide standard for cordless telephony that is frequently integrated into Unified Communications systems both in enterprise and residential environments. DECT supports encryption to protect the confidentiality of the communications whilst allowing the interoperability between products from different models and manufacturers. In this paper we explore, from both a theoretical and a practical standpoint, the security of the DECT cryptographic pairing process which plays a vital role in the security chain of Unified Communications systems involving DECT technology. We demonstrate a practical security attack against the DECT pairing process that is able to retrieve the cryptographic keys and decrypt in real-time any subsequent encrypted voice communication. We also present suggestions for a more secure alternative pairing process that is not vulnerable to this type of passive attack.
Keywords :
computer network security; cordless telephone systems; cryptography; open systems; telephony; voice communication; DECT cryptographic pairing process; DECT encrypted voice communication; digital enhanced cordless telephony; enterprise environments; interoperability; residential environments; security; unified communications environments; Authentication; Encryption; Protocols; Radio access networks; Standards;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint
Conference_Location :
The Hague
Print_ISBN :
978-1-4799-6363-8
Type :
conf
DOI :
10.1109/JISIC.2014.26
Filename :
6975562
Link To Document :
بازگشت