Key dupliaction software

SLAM: debunk creationism, pseudoscience, and superstitions. Discuss logic and morality.

Moderator: Alyrium Denryle

Post Reply
User avatar
dragon
Sith Marauder
Posts: 4151
Joined: 2004-09-23 04:42pm

Key dupliaction software

Post by dragon »

Well no longer will a spy in the move need to press the key into a clay mode to make a key now they can just take a picture of the key. They were able to take a pic of a key from 200 feet away and make a duplicate of it. Hell they said they can take photos from flickr and make keys.
(PhysOrg.com) -- UC San Diego computer scientists have built a software program that can perform key duplication without having the key. Instead, the computer scientists only need a photograph of the key.

"We built our key duplication software system to show people that their keys are not inherently secret," said Stefan Savage, the computer science professor from UC San Diego's Jacobs School of Engineering who led the student-run project. "Perhaps this was once a reasonable assumption, but advances in digital imaging and optics have made it easy to duplicate someone's keys from a distance without them even noticing."

Professor Savage presents this work on October 30 at ACM's Conference on Communications and Computer Security (CCS) 2008, one of the premier academic computer security conferences.

The bumps and valleys on your house or office keys represent a numeric code that completely describes how to open your particular lock. If a key doesn't encode this precise "bitting code," then it won't open your door.

In one demonstration of the new software system, the computer scientists took pictures of common residential house keys with a cell phone camera, fed the image into their software which then produced the information needed to create identical copies. In another example, they used a five inch telephoto lens to capture images from the roof of a campus building and duplicate keys sitting on a café table more than 200 feet away.

"This idea should come as little surprise to locksmiths or lock vendors," said Savage. "There are experts who have been able to copy keys by hand from high-resolution photographs for some time. However, we argue that the threat has turned a corner—cheap image sensors have made digital cameras pervasive and basic computer vision techniques can automatically extract a key's information without requiring any expertise."

Professor Savage notes, however, that the idea that one's keys are sensitive visual information is not widely appreciated in the general public.

"If you go onto a photo-sharing site such as Flickr, you will find many photos of people's keys that can be used to easily make duplicates. While people generally blur out the numbers on their credit cards and driver's licenses before putting those photos on-line, they don't realize that they should take the same precautions with their keys" said Savage.

As for what to do about the key duplication threat, Savage says that companies are actively developing and marketing new locking systems that encode electromagnetic secrets as well as a physical code. "Many car keys, for example, have RFID immobilizer chips that prevent duplicated keys from turning the car on." he says. In the meantime, he suggests that you treat your keys like you treat your credit card, "Keep it in your pocket unless you need to use it."

How it works

The keys used in the most common residential locks in the United States have a series of 5 or 6 cuts, spaced out at regular intervals. The computer scientists created a program in MatLab that can process photos of keys from nearly any angle and measure the depth of each cut. String together the depth of each cut and you have a key's bitting code, which together with basic information on the brand and type of key you have, is what you need to make a duplicate key.

The chief challenge for the software system, called "Sneakey," is to adjust for a wide range of different angles and distances between the camera and the key being captured. To do so, the researchers relied on a classic computer vision technique for normalizing an object's orientation and size in three dimensions by matching control points from a reference image to equivalent points in the target image.

"The program is simple. You have to click on the photo to tell it where the top of the key is, and a few other control points. From here, it normalizes the key's size and position. Since each pixel then corresponds to a set distance, it can accurately guess the height of each of the key cuts," explained Benjamin Laxton, the first author on the paper who recently earned his Master's degree in computer science from UC San Diego.

The researchers have not released their code to the public, but they acknowledge that it would not be terribly difficult for someone with basic knowledge of MatLab and computer vision techniques to build a similar system.

"Technology trends in computer vision are at a point where we need to consider new risks for physical security systems," said Kai Wang, a UC San Diego computer science graduate student and author on the new paper. Wang is a computer vision researcher working on the creating systems capable of reading text on product packaging. This is part of a larger project on creating a computerized personal shopping assistant for the visually impaired from the lab of computer science professor Serge Belongie.

As a computer security expert, Savage said he particularly enjoyed working on a project with computer vision students.

"UC San Diego is very supportive of interdisciplinary work. There are many opportunities for students and faculty to get their hands dirty in fields they may not know much about a lot at first," said Savage
link
"There are very few problems that cannot be solved by the suitable application of photon torpedoes
User avatar
Phantasee
Was mich nicht umbringt, macht mich stärker.
Posts: 5777
Joined: 2004-02-26 09:44pm

Re: Key dupliaction software

Post by Phantasee »

This isn't doing good things for my paranoia. But, since I used to cut keys when I worked a summer at Canadian Tire, I do have an interest in this sort of thing. It's really fascinating.
XXXI
User avatar
Seggybop
Jedi Council Member
Posts: 1954
Joined: 2002-07-20 07:09pm
Location: USA

Re: Key dupliaction software

Post by Seggybop »

I've done this before manually, but it's a cool idea to automate it. It's interesting how no one seems to realize that keys are standardized and if you know what a key looks like it's very easy to replicate.
my heart is a shell of depleted uranium
User avatar
dragon
Sith Marauder
Posts: 4151
Joined: 2004-09-23 04:42pm

Re: Key dupliaction software

Post by dragon »

Seggybop wrote:I've done this before manually, but it's a cool idea to automate it. It's interesting how no one seems to realize that keys are standardized and if you know what a key looks like it's very easy to replicate.

Aren't each key cut slighty different though.
"There are very few problems that cannot be solved by the suitable application of photon torpedoes
User avatar
Magus
Padawan Learner
Posts: 377
Joined: 2006-11-05 09:05pm
Location: Consistently in flux
Contact:

Re: Key dupliaction software

Post by Magus »

Why haven't locks been set up three-dimensionally? If you fit two or three rows of tumblers side by side, wouldn't the two-dimensional nature of a picture make it much more difficult to analyze the key from a photograph?

They'd also be a hell of a lot harder to pick.
"As James ascended the spiral staircase towards the tower in a futile attempt to escape his tormentors, he pondered the irony of being cornered in a circular room."
User avatar
Hawkwings
Sith Devotee
Posts: 3372
Joined: 2005-01-28 09:30pm
Location: USC, LA, CA

Re: Key dupliaction software

Post by Hawkwings »

...and a lot harder to make. Keys do their job well enough already. It's not like common burglars go around with lockpicking tools or take pictures of their victim's housekey.
Vendetta wrote:Richard Gatling was a pioneer in US national healthcare. On discovering that most soldiers during the American Civil War were dying of disease rather than gunshots, he turned his mind to, rather than providing better sanitary conditions and medical care for troops, creating a machine to make sure they got shot faster.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Re: Key dupliaction software

Post by phongn »

Magus wrote:Why haven't locks been set up three-dimensionally? If you fit two or three rows of tumblers side by side, wouldn't the two-dimensional nature of a picture make it much more difficult to analyze the key from a photograph?
Good locks are set up that way. They also cost a lot more money.
User avatar
Beowulf
The Patrician
Posts: 10619
Joined: 2002-07-04 01:18am
Location: 32ULV

Re: Key dupliaction software

Post by Beowulf »

There's the Schlage Primus Locks which have an extra set of pins in the cylinder that engage cuts made in the side of the key. I suppose if you get a picture from the right side, you could still make a key from it, though it'd be significantly more difficult.

http://everestprimus.schlage.com/index.asp
"preemptive killing of cops might not be such a bad idea from a personal saftey[sic] standpoint..." --Keevan Colton
"There's a word for bias you can't see: Yours." -- William Saletan
User avatar
Edi
Dragonlord
Dragonlord
Posts: 12461
Joined: 2002-07-11 12:27am
Location: Helsinki, Finland

Re: Key dupliaction software

Post by Edi »

Don't know anything about that company, but ABLOY or ASSA ABLOY as it's known these days, makes topnotch locks. The current ones they have been using for years now are pretty damned pick-resistant precisely because the key needs to fit in more dimensions.

Fun fact: ABLOY is actually short for AB Lukko OY, where AB is Swedish for Ltd., Lukko means lock (in Finnish) and OY is lim Ltd. in Finnish.
Warwolf Urban Combat Specialist

Why is it so goddamned hard to get little assholes like you to admit it when you fuck up? Is it pride? What gives you the right to have any pride?
–Darth Wong to vivftp

GOP message? Why don't they just come out of the closet: FASCISTS R' US –Patrick Degan

The GOP has a problem with anyone coming out of the closet. –18-till-I-die
User avatar
PeZook
Emperor's Hand
Posts: 13237
Joined: 2002-07-18 06:08pm
Location: Poland

Re: Key dupliaction software

Post by PeZook »

phongn wrote: Good locks are set up that way. They also cost a lot more money.
All my house keys have two rows of pins each with a different code, which makes it impossible to use this software to duplicate them unless you can get photos of both sides of the key.
And I intend to augment them with an RFID lock sometime in the future :)

I generally keep my keys out of sight, anyway (it's pretty dumb to leave your keys in the open since someone could, I don't know, grab them and run away)
Image
JULY 20TH 1969 - The day the entire world was looking up

It suddenly struck me that that tiny pea, pretty and blue, was the Earth. I put up my thumb and shut one eye, and my thumb blotted out the planet Earth. I didn't feel like a giant. I felt very, very small.
- NEIL ARMSTRONG, MISSION COMMANDER, APOLLO 11

Signature dedicated to the greatest achievement of mankind.

MILDLY DERANGED PHYSICIST does not mind BREAKING the SOUND BARRIER, because it is INSURED. - Simon_Jester considering the problems of hypersonic flight for Team L.A.M.E.
User avatar
Vain
Padawan Learner
Posts: 345
Joined: 2004-10-01 12:26pm
Location: Baltimore, Maryland

Re: Key dupliaction software

Post by Vain »

It is my understanding that expensive locks with complicated, three dimensional arrangements of pins are actually /easier/ to defeat with a bump key, assuming you have one that will fit the lock in question. Of course, there are specific countermeasures that can be employed to make bumping more difficult or even impossible, but... So what? If I have something I need to protect from what I believe are determined, educated thieves, and I have money to throw at trying to stymie their expected avenues of attack, why not spring for electronic or magnetic locks, or even a paid guard? In general, standard two dimensional keys with one row of pins are sufficient. In all of the instances of burglary that I am personally aware of, the thief gained access through an unlocked window or simply used a crowbar.
Post Reply