C3Subtitles: 32c3: Building and Breaking Wireless Security
back

Building and Breaking Wireless Security

Wireless Physical Layer Security & More...

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:29:05
Language
English
Abstract
This talk gives an overview on state-of-the-art wireless security concepts: How can we analyze wireless protocols? How can we build mechanisms that are secure even when the attacker has unlimited computational power? Can we exploit wireless transmission for more?

Typically, wireless security is realized by implementing encryption on upper layers and replacing the wire with some wireless modulation schemes. Yet, there is more! For example, it is possible to build "NSA proof" systems or to use legacy WiFi frames as radar.

First, there will be a brief introduction on how to hack things with your rad1o badge and other cheap software defined radios. This is your chance to understand how radio waves look like and how to capture and process them :)

Second, the concept of wireless physical layer security is introduced. Based on this, information-theoretic secure systems for confidential communication and key exchange can be built.

Third, wireless transmissions contain a lot of additional information, since they get disturbed depending on the environment. Hence, we can extract positions of humans and even loudspeaker movements through walls.

Talk ID
7119
Event:
32c3
Day
3
Room
Hall 1
Start
10:45 p.m.
Duration
00:30:00
Track
Security
Type of
lecture
Speaker
jiska
0.0% Checking done0.0%
0.0% Syncing done0.0%
18.0% Transcribing done18.0%
82.0% Nothing done yet82.0%

English: Transcribed until

Last revision: 2 years, 9 months ago