DEF CON 21 – Panel – Key Decoding and Duplication Attacks for the Schlage Primus Lock



Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
DAVID LAWRENCE STUDENT, MASSACHUSETTS INSTITUTE OF TECHNOLOGY
ERIC VAN ALBERT STUDENT, MASSACHUSETTS INSTITUTE OF TECHNOLOGY
ROBERT JOHNSON STUDENT, MASSACHUSETTS INSTITUTE OF TECHNOLOGY

The Schlage Primus is one of the most common high-security locks in the United States. We reverse-engineered the operation of this lock, constructed a parameterized 3d model of a working key, and constructed a software tool to produce such a 3d model given the code number for any key. We then used this tool to 3d print working Primus keys with a variety of 3d printing processes. In our talk, we will discuss the reverse-engineering process, demonstrate our software tool, examine the working 3d printed keys, and discuss the security ramifications of this process.

dlaw, ervanalb, and robj study electrical engineering and computer science at the Massachusetts Institute of Technology, where they spend most of their time hacking on projects unrelated to their studies. They have taught seminars on lockpicking and security vulnerabilities to various audiences at the Institute.

Materials:

https://www.defcon.org/images/defcon-21/dc-21-presentations/Lawrence-Panel/DEFCON-21-Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage-Updated.pdf

https://www.defcon.org/images/defcon-21/dc-21-presentations/Lawrence-Panel/Extras.zip


Post time: Jun-09-2017

INQUIRY DETAILS *

INQUIRY NOW
  • captcha