Considering the recent proof that the
electronic entry for the prius has been
compromised, It is time to consider a
different method of security, that could
also go well beyond this application.
Solid-state memory has gotten to be very
compact and reliable. Flash drives with
many gigabytes
of memory are now
commonplace. The now small size/
portablility of memory can now allow us to
use methods other than encription only to
ensure security.
Many of us has seen the movie crimson
tide, and others where in order to arm and
fire a nuclear missle, they need to
authenticate. A code is created and 2
copies are made, one for those in
command and those with launching
capabilities. They read the code to
eachother and if they match, they have
been "authenticated."
I envision the same system but on a
larger, and slightly more sophisticated
scale. How many authenticating codes can
you store on 2 gigs of memory? If your
codes were very long, maybe 100,000?, a
billion? (I know there's 8 bits to a byte but
other than that I'm not sure). How many
times do you need to use your key fob per
day? 20 times? 40 times? If it takes about
2 years or so to cycle through the codes
and start over again, I would say that this
is a worthy security method.
Ok, here's how I specifically see it
happening: The car's ignition system and
the keyfob have the same memory with
the same codes stored in them, and are
individual to that care and key fob. The
keyfob is pressed and it sends out a signal
with a code that matches the code that is
in the data space with the memory in the
car. (I hope i make sense, i dont' know all
the terms). In this first event, the car
authenticates back with the same code if it
is. If it is, it then askes the key fob for a
code from a predetermined space in the
memory, maybe a code halfway through
the memory spaces. This way, nobody can
just press your keyfob, record the signal
and get into your car.
Once you have gotten into your car, the
signal on your keyfob advances to the
next code, as well as with your car. You
can get the same code twice, but it would
take a at least i would say 6 months to
cycle through the memory. Who knows, it
could be years until you get through the
entire memory and have to cycle through
again.
What do you all think? It is the same
authentication as nuclear arms x 2, but on
a micro scale. Of course, you could always
add encription to beef it up, but this is my
idea.
It is like having 2 identical lists of random
numbers. The 2 parties (key fob and car)
know where they are on the list. The
keyfob calls out the number of the current
position. If it is the corresponding
number, the car will call back and ask for
a different code.
The datablock position is kept in some
kind of ram that will lose it's position if
the the thing loses power from the
battery. Someone may be able to take the
key fob apart but once they disconnect the
battery they won't know where from the
list to call numbers from. They may have
all the codes from the memory but the car
authentication system will not allow for
the submission of more than one code per
second, and could even sound the alarm if
it seems like the code is being cycled
through really quickly.
I hope some of you got through my
horribly electronics comprehension. It was
hard enough for me.