hcs365 Microchip Technology Inc., hcs365 Datasheet - Page 20

no-image

hcs365

Manufacturer Part Number
hcs365
Description
Keeloq Code Hopping Encoder
Manufacturer
Microchip Technology Inc.
Datasheet

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
hcs365-I/P
Manufacturer:
Microchip Technology
Quantity:
135
Part Number:
hcs365-I/P
Manufacturer:
MICROCHIP
Quantity:
12 000
Part Number:
hcs365-I/P
Manufacturer:
MICROCHIP/微芯
Quantity:
20 000
Part Number:
hcs365-I/SM
Manufacturer:
MICROCHIP
Quantity:
12 000
Part Number:
hcs365-I/SM
Manufacturer:
MICROCHIP/微芯
Quantity:
20 000
Part Number:
hcs365-SN
Manufacturer:
MICROCHIP/微芯
Quantity:
20 000
Part Number:
hcs365/P
Manufacturer:
MICROCHIP
Quantity:
12 000
Part Number:
hcs365/P
Manufacturer:
MICROCHIP/微芯
Quantity:
20 000
Part Number:
hcs365/SM
Manufacturer:
MICROCHIP
Quantity:
12 000
Part Number:
hcs365/SM
Manufacturer:
MICROCHIP/微芯
Quantity:
20 000
HCS365
FIGURE 7-3:
7.4
The strength of this security is based on keeping a
secret inside the transmitter that can be verified by
encrypted transmissions to a trained receiver. The
transmitter’s secret is the manufacturer’s key, not the
encryption algorithm. If that key is compromised then a
smart transceiver can capture any serial number, cre-
ate a valid code word, and trick all receivers trained
with that serial number. The key cannot be read from
the EEPROM without costly die probing but it can be
calculated by brute force decryption attacks on trans-
mitted code words. The cost for these attacks should
exceed what you would want to protect.
To protect the security of other receivers with the same
manufacturer’s code, you need to use the random seed
for secure learn. It is a second secret that is unique for
each transmitter. Its transmission on a special button
press combination can be disabled if the receiver has
another way to find it, or limited to the first 127 trans-
missions for the receiver to learn it. This way, it is very
unlikely to ever be captured. Now if a manufacturer’s
key is compromised, clone transmitters can be created,
but without the unique seed they have to be relearned
by the receiver. In the same way, if the transmissions
are decrypted by brute force on a computer, the ran-
dom seed hides the manufacturer’s key and prevents
more than one transmitter from being compromised.
The length of the code word at these baud rates makes
brute force attacks that guess the hopping code take
years. To make the receiver less susceptible to this
attack, make sure that you test all the bits in the
decrypted code for the correct value. Do not just test
low counter bits for sync and the bit for the button input
of interest.
The main benefit of hopping codes is to prevent the
retransmission of captured code words. This works
very well for code words that the receiver decodes. Its
weakness is if a code is captured when the receiver
misses it, the code may trick the receiver once if it is
used before the next valid transmission. To make the
DS41109D-page 20
Security Considerations
Entire Window
rotates to eliminate
use of previously
used codes
SYNCHRONIZATION WINDOW
(resynchronization)
Double Operation
(32K Codes)
(32K Codes)
Blocked
Window
Window
Preliminary
receiver more secure it could increment the counter on
questionable code word receptions. To make the trans-
mitter more secure, it could use separate buttons for
lock and unlock functions. Another way would be to
require two different buttons in sequence to gain
access.
There are more ways to make K
secure, but they all have trade-offs. You need to find a
balance between security, design effort, and usability,
particularly in failure modes. For example, if a button
sticks or kids play with it, the counter should not end up
in the blocked code window rendering the transmitter
useless or requiring retraining.
Single Operation
(16 Codes)
Stored
Synchronization
Counter Value
Window
2002 Microchip Technology Inc.
EE
L
OQ
systems more

Related parts for hcs365