
2. Rights claim key-to-car is the procedure in which
the user is claiming his rights over a car. First,
the car receives the identifier of the key ID
RFKey
,
the access rights rights along with their signature
sig rights. If the signature is not authentic or the
lifetime of the key has expired, the protocol stops.
A random value rnd
RFKey
is further used in the
challenge-response protocol to ensure freshness.
The car needs to contact the sharing center for es-
tablishing a shared cryptographic key and further
sends all the information that was received from
the key along with its own fresh random value
rnd
Car
. We assume that the communication chan-
nel between the car and the sharing center is se-
cure. This is a natural hypothesis since modern
cars are equipped with 3G/4G communication and
SSL/TLS capabilities are already present on auto-
motive grade embedded devices. Designing a se-
curity protocol for the communication channel be-
tween the car and the sharing center would be out
of scope for our work. The sharing center verifies
the access rights, note that it may be that the key
acquired the rights from the sharing center or from
another key as discussed in the last procedure pro-
cedure. In the first case the sharing center has to
verify its own signature by using the public key,
in the second it has to verify a MAC (Message
Authentication Code) with the secret key that is
shared with the initial owner of the access rights.
The car receives the shared key with the RF phy-
sical key which is computed by the sharing cen-
ter as K D
rnd
RFKey
,rnd
Car
,K
RFKey,ShCenter
. Ad-
ditionally, the car receives a signature over the
granted access rights and the new owner-car pair,
i.e., RFKey,Car. Whenever the access rights ex-
pire, the car will deny access to the user. Now
the car answers in a challenge response man-
ner with a MAC computed over the participant
identities, the random values and the shared key
K
RFKey,Car
. The physical key can already compute
this shared key as it already is in possession of
K
RFKey,ShCenter
, then verify the response and ans-
wer to the challenge with a MAC over the va-
lues in reverse order, i.e., MAC
K
RFKey,Car
(ID
RFKey
,
ID
Car
,rnd
RFKey
,rnd
Car
).
3. Car access is the basic procedure in which a
user asks for a particular functionality to the
car, e.g., open doors, windows, start the en-
gine, etc. A challenge-response protocol with
the shared key is used to prove the identity
of each participant. The key simply asks the
functionalities that it wants to perform func and
the car responds with some random material
rnd
Car
. Then the key replies to the challenge
Table 1: Summary of notations.
RFKey an radio-frequency vehicle access key
Car the vehicle to which access is requested
ShCenter the vehicle sharing center
ID id associated to an RF key or car
raccess access rights to the vehicle
func functionalities (requested from vehicle)
rnd random value
Sig digital signature
K D key-derivation process
H hash function
MAC message authentication code
with a MAC computed via the secret shared
key over the identities, functionalities, its own
random material and the received random value,
i.e., MAC
K
RFKey,Car
(ID
RFKey
,ID
Car
,func, rnd
RFKey
,rnd
Car
) .
4. Rights delegation key-to-key is the procedure in
which the owner of one key, can designate a sub-
set of his rights to another key. First, the key sends
a request message with its own ID. The users have
to verbally agree and check on the display of their
keys that the key IDs are correctly set. The se-
cond key responds with the granted access rig-
hts raccess
0
and a MAC over them denoted as
sig rights = MAC
K
RFKey,ShCenter
RFKey
2
,rights
0
. Finally, the requester confirms that the requested
access rights have been received. For practical re-
asons, considering a rather classical interface for
the key, the requester can simply push the buttons
of the key corresponding to the access rights and
these are to be confirmed by the other party. While
the physical design of the key is out of scope for
our work, for clarity, we do suggest it in Figure 2.
We consider that the insecure RF channel of this
step is protected by the visual channel between
the user and the key. Since there is no secretly
shared value between the two keys, relying on
user’s feedback is the only alternative.
5. Verification by neutral third parties, e.g., authori-
ties, is not presented as a distinct protocol compo-
nent as this procedure is straight-forward from the
certification chain. The neutral third party needs
to be in possession of the public-key certificate of
the sharing center and the RF key must externa-
lize the signed access rights by the sharing center.
This can be straight-forwardly achieved.
Designing Wireless Automotive Keys with Rights Sharing Capabilities on the MSP430 Microcontroller
175