DECT Standard Cipher
Encyclopedia
DECT Standard Cipher is an encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 standard, used in DECT
Digital Enhanced Cordless Telecommunications
Digital Enhanced Cordless Telecommunications , usually known by the acronym DECT, is a digital communication standard, which is primarily used for creating cordless phone systems...

 phones to protect communication between a handset
Handset
On a telephone, the handset is a device the user holds to the ear to hear the audio sound. Modern-day handsets usually contain the phone's microphone as well, but in early telephones the microphone was mounted directly on the telephone itself, which often was attached to a wall at a convenient...

 and its associated base station. While most of the DECT standard is publicly available, the part describing the DECT Standard Cipher was only available under a non-disclosure agreement
Non-disclosure agreement
A non-disclosure agreement , also known as a confidentiality agreement , confidential disclosure agreement , proprietary information agreement , or secrecy agreement, is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties...

 to the phones' manufacturers from ETSI
European Telecommunications Standards Institute
The European Telecommunications Standards Institute is an independent, non-profit, standardization organization in the telecommunications industry in Europe, with worldwide projection...

.

Reverse engineered

On June 8, 2002, a posting was made to the alt.anonymous.messages newsgroup containing what was claimed to be the reverse engineered
Reverse engineering
Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation...

 source code
Source code
In computer science, source code is text written using the format and syntax of the programming language that it is being written in. Such a language is specially designed to facilitate the work of computer programmers, who specify the actions to be performed by a computer mostly by writing source...

 of the implementation of the DECT Standard Cipher for the Samsung
Samsung
The Samsung Group is a South Korean multinational conglomerate corporation headquartered in Samsung Town, Seoul, South Korea...

SP-R6150 telephone. This claim has since been refuted.

In 2008, members of the deDECTed.org project actually did reverse engineer the DECT Standard Cipher, and as of 2010 there has been a viable attack on it that can recover the key.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK