An official website of the European Union How do you know?      
European Commission logo
JRC Publications Repository Menu

Practical interception of DECT encrypted voice communications in Unified Communications environments

cover
Digital Enhanced Cordless Telephony, DECT, is a world-wide standard for cordless telephony that is frequently integrated into Unified Communications systems both in commercial and residential environments. DECT supports encryption to protect the confidentiality of the communications whilst allowing the interoperability between products from different models and manufacturers. In this paper we explore, from both a theoretical and a practical standpoint, the security of the DECT cryptographic pairing process, which plays a vital role in the security chain of Unified Communications systems involving DECT technology. Furthermore, we demonstrate a practical security attack against the DECT pairing process that is able to retrieve the cryptographic keys and decrypt in real-time any subsequent encrypted voice communication. We also present a proposal for a more secure alternative cryptographic pairing process that is not vulnerable to this type of passive attack.
2015-04-14
Institute of Electrical and Electronics Engineers (IEEE)
JRC90564
978-1-4799-6364-5,   
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6975562,    https://publications.jrc.ec.europa.eu/repository/handle/JRC90564,   
10.1109/JISIC.2014.26,   
Language Citation
NameCountryCityType
Datasets
IDTitlePublic URL
Dataset collections
IDAcronymTitlePublic URL
Scripts / source codes
DescriptionPublic URL
Additional supporting files
File nameDescriptionFile type 
Show metadata record  Copy citation url to clipboard  Download BibTeX
Items published in the JRC Publications Repository are protected by copyright, with all rights reserved, unless otherwise indicated. Additional information: https://ec.europa.eu/info/legal-notice_en#copyright-notice