Open Source Device Attacks Microsoft Wireless Keyboards And Other Units

A new open source device has recently been launched in the market by the Security researchers this Friday on the 26th March. The device (Keykeriki v.2) captures the traffic of a huge range of wireless systems such as remote controls, medical devices and keyboards.
Keykeriki v.2 manages to break through data encryptions, even with powerful cryptography. Keykeriki v.2 is a veritable exploitative data encryption tool for spotting weak spots in crypto communications through keystroke comparison versus the appropriate ciphertext.

In a presentation during a Vancouver-based CanSecWest conference, Dreamlabs Senior Security Expert Thorsten Schroder illustrated how Keykeriki v.2 can be employed to hack into Microsoft wireless keyboards. Schroder states that Microsofts ownership crypto, Xor, is not a very good option for data security as it is weak and easy to override which explains why Microsoft has shifted from Xor to its own their own powerful crypto-algorithm software and secret checksum algorithm. Like Logitech, Microsoft employs 128-bit AES hardware crypto-enabled transceiver chips. Logitechs 128-bit AES encryption can still be decoded by looking into the exchanges of the secret key.

Riding on its banner of useful manipulation of the latest wireless devices, Dreamlab Technologies Keykeriki v.2 is an open-source device that sequesters the traffic of a number of wireless devices such as remote controls, keyboards and medical devices, capturing whole data streams (i.e., the remote addresses and other details of the raw data transfers) sent between 2 wireless units through the use of a series of chips created by Norway-based Nordic Semiconductor. Keykeriki comes in a package complete with firmware, software and schematics.

This open-source kit from Switzerland gives programmers and researchers the ability to capture 2-layered payloads and remotely carry out unauthorized commands by intercepting the communications between 2 wireless devices, disabling or crippling the data encryption function, and culling sensitive (often confidential) information from the 2 devices. Its a way to determine the points in the data encryption program that need improvement, or further strengthening.