Auto, Gas Security Chips Vulnerable, Study Finds
Can’t we just stipulate that everything is breakable?
Update: Here is the overview of the procedure (from their website) -
We used some new special-purpose cryptanalytic techniques to reconstruct the algorithm used in the DST tags, by simply observing the responses that actual DST tags computed when presented with a large number of specially chosen challeneges. Using this black-box reverse-engineering method, we were able to implement a software program that, when given the same challenge and key as an actual tag, would compute the same response.
The good news – if somebody actually steals a car using these techniques, the suspect list will be extremely short