Saturday, November 8, 2008

Keys can now be duplicated from a photograph


For those concerned about their security, there's a new danger to worry about.

Few of us would care if our house keys appeared in a photograph of the family picnic posted on the internet.

But we should be concerned, because advances in digital imaging and optics means any photograph of a key posed a potential security threat, Stefan Savage, a computer science professor at the University of California, warns.

Professor Savage and two of his PhD students have developed a software program called Sneakey that can clone a key in "two to three minutes" after analysing a digital photograph.

The algorithm is so sophisticated it easily copes with the low-resolution mobile phone images routinely posted on social networking sites such as MySpace and Facebook.

"The software looks at the key, adjusts the image for any rotations or distortions, then produces a string of numbers that is appropriate for that key," Professor Savage said.

"Those numbers are fed into a key-cutting machine and it makes a perfect copy.

Professor Savage, 39, said his team at the University's Jacobs School of Engineering in San Diego found "thousands" of images of keys inadvertently posted on the photo-sharing site Flickr.

They also used a camera fitted with a telephoto lens to photograph and duplicate a set of keys on a cafe table from a distance of more than 60 metres.




Far from being unique, the bumps and valleys on a conventional key can be "completely described" using a five- or six-digit number, he said.

"The design of the keys we use today is 150 years old and the world has changed."

As a result, Professor Savage believes we should protect our keys in the same way we protect the code to our debit card.

. . .

The University of California team is keeping the code secret, but Professor Savage admits anyone with a basic knowledge of programming and computer vision techniques would be able to reproduce it.


That's thought-provoking for sure! Apparently this software can be run on any personal computer, and machines to cut keys from the type of numeric codes it supplies are freely available. I recall from my days working in a prison that we'd have covers attached to all high-security keys, so that inmates couldn't see and memorize the notches in them, later to try to make copies of them out of scraps of metal or wood in their cells. Sounds like something similar may be coming to ordinary house keys as well!

Keep your keys safe, friends.

Peter

1 comment:

  1. I foresee keys with retracting sleeves (think of fake knives, but in reverse). That way, the key would be covered unless you were actually inserting the key into the lock, but you wouldn't have to worry about losing the cover or even taking it off while trying to get in your house/car.

    ReplyDelete

ALL COMMENTS ARE MODERATED. THEY WILL APPEAR AFTER OWNER APPROVAL, WHICH MAY BE DELAYED.