Decoding: Difference between revisions

From Lockwiki
Jump to navigationJump to search
m (Fix broken link)
 
(13 intermediate revisions by 8 users not shown)
Line 1: Line 1:
= Decoding =                                                                                                                                                               
= Decoding =                                                                                                                                                               


'''Decoding''' is the process of determining the correct position of components in a [[Lock|lock]] through manipulation, disassembly, measurement, and observation of [[Key|keys]] or lock components. While it does not necessarily open the lock, decoding provides the information necessary to create a working key. In this respect, decoding is the middle ground between [[Lockpicking|lockpicking]] and [[Impressioning|impressioning]] techniques.
'''Decoding''' is the process of determining the correct position of components in a [[lock]] through manipulation, disassembly, measurement, and observation of [[key]]s or lock components. While it does not necessarily open the lock, decoding provides the information necessary to create a working key. In this respect, decoding is the middle ground between [[lockpicking]] and [[impressioning]] techniques.


Decoding techniques are quite varied and leave a wide range of [[Forensics|forensic]] evidence. Most lock-centric decoding techniques are considered [[Covert_Entry|covert]] because of the invasive manipulation required. In contrast, most key-centric techniques are forms of [[Surreptitious_Entry|surreptitious entry]] because they focus on observation and measurement.
Decoding techniques are quite varied and leave a wide range of [[Forensics|forensic]] evidence. Most lock-centric decoding techniques are considered [[Covert_Entry|covert]] because of the invasive manipulation required. In contrast, most key-centric techniques are forms of [[surreptitious entry]] because they focus on observation and measurement.


__TOC__
__TOC__
Line 9: Line 9:
== History ==
== History ==


Add to me!
Locks by definition secure or fasten something with the intention that access is possible only with the matching key. Despite this, criminal lock picking likely started with the first locks. Famed locksmith Alfred Charles Hobbs said in the mid-1800's:
 
Rogues are very keen on their profession and know already much more than we can teach them to respect their several kinds of roguery. Rogues knew a good deal about lock-picking long before locksmiths discussed it among themselves...
 
Professional and recreational lock picking also has a long history. King Louis XVI of France (1754–1793) was a keen designer, picker, and manipulator of locks, and physicist Richard Feynman picked locks for fun in the 1940's while employed on the Manhattan Project. The tradition of student roof and tunnel hacking at MIT included lock picking, and their guide to this was made widely available in 1991.
 
Beginning in 1997 more organized recreational lock picking has now grown and developed a competitive aspect in "locksport", along with its own governing body, Locksport International.


== Manipulation ==
== Manipulation ==


Decoding via manipulation focuses on invasive manipulation and analysis of the locking components to determine their correct positions. A wide range of tools and techniques exist to determine the number, size, shape, and position of components. In some cases, lockpicking or impressioning is a prerequisite to the decoding process.
Decoding via manipulation focuses on invasive manipulation and analysis of the locking components to determine their correct positions. A wide range of tools and techniques exist to determine the number, size, shape, and position of components. In some cases, lock picking or impressioning is a prerequisite to the decoding process.


* In [[Pin_tumbler|pin-tumbler]] locks, a tool may be used to determine bottom pin sizes once the lock has been picked. The tool measures the distance each pin can be raised until it gets to the top of the plug. Tools resemble pin-tumbler picks placed on a lever.
* In [[pin-tumbler]] locks, a tool may be used to determine bottom pin sizes once the lock has been picked. The tool measures the distance each pin can be raised until it gets to the top of the plug. Tools resemble pin-tumbler picks placed on a lever.
* Sophisticated scales to weigh components to determine their size. Generally, heavier components signify lower depths because of the additional material.
* Sophisticated scales to weigh components to determine their size. Generally, heavier components signify lower depths because of the additional material.
* Tools to count or identify characterstics of components to identify their code.
* Tools to count or identify characteristics of components to identify their code.
* Some lockpicking tools, namely [[Axial|axial/tubular]] picks and the [[Sputnik]] tool, automatically decode or impression the lock while it is being picked.
* Some lock picking tools, namely [[Axial|axial/tubular]] picks and the [[Sputnik]] tool, automatically decode or impression the lock while it is being picked.
* [[Impressioning]], in a general sense, is a form of manipulation-based decoding that directly produces a working key.
* [[Impressioning]], in a general sense, is a form of manipulation-based decoding that directly produces a working key.
* In [[combination]] locks, manipulation of the dial(s), handle, and [[Bolt|shackle]] can be used to determine the correct combination.


UWbJRz  <a href="http://glozatphrfsh.com/">glozatphrfsh</a>, [url=http://piqvqnukgjyz.com/]piqvqnukgjyz[/url], [link=http://srkwsrccfpud.com/]srkwsrccfpud[/link], http://dgdorkcqmcna.com/
== Disassembly ==
 
Disassembly of the lock will allow direct counts and measurements of internal components. These can be compared with manufacturing data to produce a working key. In some cases, disassembled components are imprinted with their sizes or codes, simplifying the process.


== Measurement ==
== Measurement ==


The key is measured to decode the values of the bitting cuts and the keyway profile. Various tools exist for specific locks, but a ruler or micrometer is equally effective in most cases.
The key is measured to decode the values of the bitting cuts and the key-way profile. Various tools exist for specific locks, such as [[key gauge]]s, but a ruler or micrometer is equally effective in most cases.


== Optical, Photographic, and Visual ==
== Optical, Photographic, and Visual ==
 
[[File:Wafer_lock_reading.jpg|thumb|100px|right|text-top|"Wafer Lock Reading" by Robert Sieveking]]
Visual observation of a key or lock allows for various forms of decoding.  
Visual observation of a key or lock allows for various forms of decoding.  


* Key bitting pattern. This process is known as "sight-reading" a key.
* Key bitting pattern. This process is known as "sight-reading" a key.
* Key codes on the bow. Can also be used to identify the keyway of a lock.
* Key codes on the bow. Can also be used to identify the key-way of a lock.
* Presence and position of secondary locking mechanisms such as [[Sidebar|sidebars]].
* Presence and position of secondary locking mechanisms such as [[sidebar]]s.


In the case of colored lock components, a borescope or similar tool may be used to look inside the lock and determine component positions. Many [[Pin_tumbler|pin-tumbler]] locks use colors to symbolize different bottom pin sizes.
In the case of colored lock components, a bore scope or similar tool may be used to look inside the lock and determine component positions. Many [[pin-tumbler]] re-keying kits use colors to symbolize different bottom pin sizes.


In [[Wafer|wafer]] locks, a borescope or similar tool can be used to look at the position of each wafer as it rests in the lock.
In [[wafer]] locks, a bore scope or similar tool can be used to look at the position of each wafer as it rests in the lock.


In [[Lever|lever]] locks, a borescope or similar tool can be used to look at the shape of each lever, but requires that a secondary tool (a key) be used to move other levers out of the way.
In [[lever]] locks, a bore scope or similar tool can be used to look at the shape of each lever, but requires that a secondary tool (called a "setup key") be used to move other levers out of the way.


== Radiological ==
== Radiological ==


Radiological imaging uses penetrating radiation (X, beta, and gamma rays) to see inside the lock or safe, revealing the proper positions of components. This is most often used against [[Combination|combination]] locks to determine the position of each gate in the wheel pack. This is a surreptitious entry technique unless the use of such a device can be detected. In many cases, even if the ability to detect this form of entry is available it may be considerably expensive.
Radiological imaging uses penetrating radiation (X, beta, and gamma rays) to see inside the lock or safe, revealing the proper positions of components. This is most often used against [[combination]] locks to determine the position of each gate in the wheel pack. This is a surreptitious entry technique unless the use of such a device can be detected. In many cases, even if the ability to detect this form of entry is available it may be considerably expensive.


The use of low-density wheel materials (such as Delrin) combats this attack. Group 1R safe locks are specifically designed to defeat various radiological attacks as well as provide manipulation protection.
The use of low-density wheel materials (such as Delrin) combats this attack. Group 1R safe locks are specifically designed to defeat various radiological attacks as well as provide manipulation protection.
Line 49: Line 58:
== See also ==
== See also ==


* [[Lockpicking]]
* [[Lock picking]]
* [[Impressioning]]
* [[Impressioning]]
* [[Key]]
* [[Key]]

Latest revision as of 23:56, 2 September 2024

Decoding

Decoding is the process of determining the correct position of components in a lock through manipulation, disassembly, measurement, and observation of keys or lock components. While it does not necessarily open the lock, decoding provides the information necessary to create a working key. In this respect, decoding is the middle ground between lockpicking and impressioning techniques.

Decoding techniques are quite varied and leave a wide range of forensic evidence. Most lock-centric decoding techniques are considered covert because of the invasive manipulation required. In contrast, most key-centric techniques are forms of surreptitious entry because they focus on observation and measurement.

History

Locks by definition secure or fasten something with the intention that access is possible only with the matching key. Despite this, criminal lock picking likely started with the first locks. Famed locksmith Alfred Charles Hobbs said in the mid-1800's:

Rogues are very keen on their profession and know already much more than we can teach them to respect their several kinds of roguery. Rogues knew a good deal about lock-picking long before locksmiths discussed it among themselves...

Professional and recreational lock picking also has a long history. King Louis XVI of France (1754–1793) was a keen designer, picker, and manipulator of locks, and physicist Richard Feynman picked locks for fun in the 1940's while employed on the Manhattan Project. The tradition of student roof and tunnel hacking at MIT included lock picking, and their guide to this was made widely available in 1991.

Beginning in 1997 more organized recreational lock picking has now grown and developed a competitive aspect in "locksport", along with its own governing body, Locksport International.

Manipulation

Decoding via manipulation focuses on invasive manipulation and analysis of the locking components to determine their correct positions. A wide range of tools and techniques exist to determine the number, size, shape, and position of components. In some cases, lock picking or impressioning is a prerequisite to the decoding process.

  • In pin-tumbler locks, a tool may be used to determine bottom pin sizes once the lock has been picked. The tool measures the distance each pin can be raised until it gets to the top of the plug. Tools resemble pin-tumbler picks placed on a lever.
  • Sophisticated scales to weigh components to determine their size. Generally, heavier components signify lower depths because of the additional material.
  • Tools to count or identify characteristics of components to identify their code.
  • Some lock picking tools, namely axial/tubular picks and the Sputnik tool, automatically decode or impression the lock while it is being picked.
  • Impressioning, in a general sense, is a form of manipulation-based decoding that directly produces a working key.
  • In combination locks, manipulation of the dial(s), handle, and shackle can be used to determine the correct combination.

Disassembly

Disassembly of the lock will allow direct counts and measurements of internal components. These can be compared with manufacturing data to produce a working key. In some cases, disassembled components are imprinted with their sizes or codes, simplifying the process.

Measurement

The key is measured to decode the values of the bitting cuts and the key-way profile. Various tools exist for specific locks, such as key gauges, but a ruler or micrometer is equally effective in most cases.

Optical, Photographic, and Visual

"Wafer Lock Reading" by Robert Sieveking

Visual observation of a key or lock allows for various forms of decoding.

  • Key bitting pattern. This process is known as "sight-reading" a key.
  • Key codes on the bow. Can also be used to identify the key-way of a lock.
  • Presence and position of secondary locking mechanisms such as sidebars.

In the case of colored lock components, a bore scope or similar tool may be used to look inside the lock and determine component positions. Many pin-tumbler re-keying kits use colors to symbolize different bottom pin sizes.

In wafer locks, a bore scope or similar tool can be used to look at the position of each wafer as it rests in the lock.

In lever locks, a bore scope or similar tool can be used to look at the shape of each lever, but requires that a secondary tool (called a "setup key") be used to move other levers out of the way.

Radiological

Radiological imaging uses penetrating radiation (X, beta, and gamma rays) to see inside the lock or safe, revealing the proper positions of components. This is most often used against combination locks to determine the position of each gate in the wheel pack. This is a surreptitious entry technique unless the use of such a device can be detected. In many cases, even if the ability to detect this form of entry is available it may be considerably expensive.

The use of low-density wheel materials (such as Delrin) combats this attack. Group 1R safe locks are specifically designed to defeat various radiological attacks as well as provide manipulation protection.

See also