Rosengrens RKL-10: Difference between revisions

From Lockwiki
Jump to navigationJump to search
Tag: Manual revert
 
(7 intermediate revisions by 2 users not shown)
Line 22: Line 22:
== Principles of operation ==
== Principles of operation ==
This lock has a double circular lever one pack consisting of 9 code wheels and 2 driver wheels. The other pack engages with the cuts on the key, drives the code pack and a corresponding fence that will go into the true cuts and then allows the bolt to be moved into the open or closed positions. The key has 9 different cuts (1 passive cut called AB). Cuts 1-4 are on the A-side of the key. Cuts 5-8 are on the B-side of the key. No cut on side A is called A1. Deepest cut on side A is called AB. AB is a passive cut. An AB cut meant that the next active cut is B5-B8. There is a transport key which being a no-cut is all A1's.
This lock has a double circular lever one pack consisting of 9 code wheels and 2 driver wheels. The other pack engages with the cuts on the key, drives the code pack and a corresponding fence that will go into the true cuts and then allows the bolt to be moved into the open or closed positions. The key has 9 different cuts (1 passive cut called AB). Cuts 1-4 are on the A-side of the key. Cuts 5-8 are on the B-side of the key. No cut on side A is called A1. Deepest cut on side A is called AB. AB is a passive cut. An AB cut meant that the next active cut is B5-B8. There is a transport key which being a no-cut is all A1's.
Only one side of the key is ever active in each cut position. Cuts on the opposite side of the key in these positions are only to make visual inspection harder.
Only one side of the key is ever active in each cut position. Cuts on the opposite side of the key in these positions are only to make visual inspection harder. There are two versions of this lock. Only the code wheels differ. Version one takes longer to decode although decoding is possible the procedure is different.


== Gallery ==
== Gallery ==
Line 36: Line 36:
File:RKL10_key_in_lock-Idanhurja.png
File:RKL10_key_in_lock-Idanhurja.png
File:RKL10_keyhole_curtain_turned-Idanhurja.png |RKL-10 keyhole with curtain rotated.
File:RKL10_keyhole_curtain_turned-Idanhurja.png |RKL-10 keyhole with curtain rotated.
File:RKL10_MakeUpKey_TechnicalEntry.jpg |RKL-10 Make Up Key and Key Gauge.
</gallery></div>
</gallery></div>


Line 42: Line 43:
*Lockpicking
*Lockpicking
*Decoding
*Decoding
The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012. The process has three phases:
The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012.
1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8)
 
2 - Use the anlalysis sheet to determine true or false gates
The process has three phases:
3 - test possible combinations and open the lock
*1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8)
Time to decode using this technique ranges from about 12-40 minutes. The key of the key affects the decoding time.
*2 - Use the anlalysis sheet to determine true or false gates
The procedure is possible due to the design of the code wheels following a known pattern.
*3 - test possible combinations and open the lock
Time to decode using this technique ranges from about 12-40 minutes. The key code affects the decoding time.
The procedure is possible due to the design of the code wheels following a known pattern thus true code is possible to deduce via testing in a much reduced code space.


== External links ==
== External links ==
Line 54: Line 57:
* Idanhurja [https://www.youtube.com/watch?v=DB4xi3W_O-4 Operation of RKL10 demonstrated using a cutaway lock] (video)
* Idanhurja [https://www.youtube.com/watch?v=DB4xi3W_O-4 Operation of RKL10 demonstrated using a cutaway lock] (video)
* Fey, Han. [https://toool.nl/images/7/72/Abloypart4.pdf Abloy Special Products (Part 4)]
* Fey, Han. [https://toool.nl/images/7/72/Abloypart4.pdf Abloy Special Products (Part 4)]
* Technical Entry [https://technicalentry.de/rosengrens-the-european-sicherheitsstufe-iv-tresor-ohne-schluessel-oeffnen/ RKL10 opening ] (German language)


== See also ==
== See also ==

Latest revision as of 12:20, 23 June 2024

Rosengrens RKL-10

Rosengrens RKL-10
RKL10 with key-Idanhurja.png
Name Rosengrens RKL-10
Manufacturer Rosengrens
Lock Type Safe lock
Lock Design Disc-detainer
Specifications
# of Components 9
Component Type Disc-detainer



Principles of operation

This lock has a double circular lever one pack consisting of 9 code wheels and 2 driver wheels. The other pack engages with the cuts on the key, drives the code pack and a corresponding fence that will go into the true cuts and then allows the bolt to be moved into the open or closed positions. The key has 9 different cuts (1 passive cut called AB). Cuts 1-4 are on the A-side of the key. Cuts 5-8 are on the B-side of the key. No cut on side A is called A1. Deepest cut on side A is called AB. AB is a passive cut. An AB cut meant that the next active cut is B5-B8. There is a transport key which being a no-cut is all A1's. Only one side of the key is ever active in each cut position. Cuts on the opposite side of the key in these positions are only to make visual inspection harder. There are two versions of this lock. Only the code wheels differ. Version one takes longer to decode although decoding is possible the procedure is different.

Gallery

Vulnerabilities

  • Lockpicking
  • Decoding

The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012.

The process has three phases:

  • 1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8)
  • 2 - Use the anlalysis sheet to determine true or false gates
  • 3 - test possible combinations and open the lock

Time to decode using this technique ranges from about 12-40 minutes. The key code affects the decoding time. The procedure is possible due to the design of the code wheels following a known pattern thus true code is possible to deduce via testing in a much reduced code space.

External links

See also

Stub lock.png
This article is a stub. You can help Lockwiki by expanding it.