We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Panel - Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock

Formal Metadata

Title
Panel - Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
Title of Series
Number of Parts
112
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
The Schlage Primus is one of the most common high-security locks in the United States. We reverse-engineered the operation of this lock, constructed a parameterized 3d model of a working key, and constructed a software tool to produce such a 3d model given the code number for any key. We then used this tool to 3d print working Primus keys with a variety of 3d printing processes. In our talk, we will discuss the reverse-engineering process, demonstrate our software tool, examine the working 3d printed keys, and discuss the security ramifications of this process. dlaw, ervanalb, and robj study electrical engineering and computer science at the Massachusetts Institute of Technology, where they spend most of their time hacking on projects unrelated to their studies. They have taught seminars on lockpicking and security vulnerabilities to various audiences at the Institute.