MIT Students Release Program To 3D-Print High Security Keys. From Forbes:
When lock maker Schlage imprinted the words “do not duplicate” across the top of the keys for their high-security Primus locks, they meant to create another barrier to reproducing a piece of metal that’s already beyond the abilities of the average hardware store keymaker. One group of hackers, of course, took it instead as a direct challenge.
At the Def Con hacker conference Saturday, MIT students David Lawrence and Eric Van Albert plan to release a piece of code that will allow anyone to create a 3D-printable software model of any Primus key, despite the company’s attempts to prevent the duplication of those carefully-controlled shapes. With just a flatbed scanner and their software tool, they were able to produce precise models that they uploaded to the 3D-printing services Shapeways and i.Materialise, who mailed them working copies of the keys in materials ranging from nylon to titanium.
“In the past if you wanted a Primus key, you had to go through Schlage. Now you just need the information contained in the key, and somewhere to 3D-print it,” says 21-year old Van Albert. “You can take a high security ‘non-duplicatable’ key and basically take it to a virtual hardware store to get it copied,” adds 20-year-old Lawrence.
Schlage’s Primus models are advertised for use in high-security applications: The company’s marketing materials include references to the locks’ use in government facilities, healthcare settings, and detention centers. That security stems in part from Primus’s unique model, which includes two tracks of teeth–one on the top of the key and another on the side, each of which correspond to a separate set of pins in the lock. Even Marc Weber Tobias, one of the world’s most well-known lockpicking experts, has written that he uses Primus locks in his home and for secure evidence storage in his legal practice.
Lawrence’s and Van Albert’s software tool, to be clear, doesn’t let its users open any random door secured by one of those locks. It merely enables anyone to copy a key they couldn’t easily copy before. But the two students in MIT’s electrical engineering program point out that there are ways to copy a key without ever possessing it. Other researchers like those behind the Sneakey project have shown that keys can be effectively replicated from photos, even ones taken from hundreds of feet away. And by studying Schlage’s manuals and patents, Lawrence and Van Albert learned to decipher the two distinct codes in the keys–one set of six numbers cut into the top of the key and another set of five in its sidecut–that can be programmed into their modeling software and precisely reproduced.
“All you need is a friend that works there, or to take a picture of their key, or even a picture of the key hanging off their belt,” says Lawrence. “Pirating keys is becoming like pirating movies. Someone still has to get the information in the first place, but then everyone can get a copy.”
Once a key has been photographed or scanned, 3D-printing through online services is relatively cheap. The MIT students, who say they didn’t try printing the keys themselves on home 3D printers, used Shapeways to print working keys in nylon for less than $5 each, though a more durable titanium copy from i.Materialise.com cost them $150….
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — Transforming Today’s Bad Jobs into Tomorrow’s Good Jobs
Wearables — Etching a stencil
Electronics — Is your op amp going crazy?
Biohacking — Token – A Wearable Ring with NFC & Bluetooth
No comments yet.
Sorry, the comment form is closed at this time.