Protocol security analysis of the ASSA ABLOY VERSO® CLIQ mechatronic locking system. I captured and decoded 1-Wire protocol communication between the key and lock, identified plaintext System ID transmission, analyzed encryption weaknesses, and quantified predictable patterns. Full signal captures, CSV data, timing diagrams, and decoder available on GitHub.
System tested: VERSO CLIQ lock with System ID V1004261. The key acts as the master device, lock as the slave, communicating via a single-wire digital protocol.
Mechatronic locks are widely deployed in enterprise and critical infrastructure for physical access control. Vulnerabilities in their authentication protocols can lead to:
Logic analyzer traces showing System ID "V1004261" in plaintext, 70%+ byte repetition, and 13.66/4.33 µs binary timing
Signal captures (CSV), timing diagrams, decoder implementation, and vulnerability analysis published on GitHub
Partial encryption discovered: System ID and permissions in plaintext, only Q1-Q21 blocks encrypted
Proposed: full payload encryption + session tokens + timing randomization to improve protocol security
Captured ASSA ABLOY CLIQ 1-Wire traffic revealing System ID "V1004261" in plaintext and 70%+ byte repetition
Measured pulse widths: 13.66 µs = 0, 4.33 µs = 1, 18.75 µs cycle, ~98 µs total unlock time
Custom decoder to parse 1-Wire pulse sequences and extract structured payloads (System ID, permissions, crypto blocks)
Eliminate plaintext System ID transmission — encrypt entire authentication payload including identifiers and permission fields (A1-A3, P1-P3) to prevent traffic analysis.
Implement cryptographically random session tokens for each unlock attempt to prevent replay attacks — ensure each authentication frame is unique and time-bound.
Add random delays to break predictable timing patterns (current 18.75 µs cycle, ~98 µs total) to make forwarding attacks more difficult to synchronize.
Address the 70%+ byte repetition issue by diversifying encrypted payloads with variable padding and randomized field ordering.
Protocol security analysis of the ASSA ABLOY VERSO® CLIQ lock system: captured and decoded 1-Wire protocol traffic revealing System ID "V1004261" in plaintext, 70%+ identical byte sequences across authentication sessions, and partial encryption (only Q1-Q21 blocks encrypted, identifiers in plaintext). Binary pulse timing decoded: 13.66 µs = 0, 4.33 µs = 1. Complete signal captures, CSV data, timing diagrams, and Python decoder available on GitHub.