Rosengrens RKL-10: Difference between revisions
Tag: Manual revert |
|||
Line 42: | Line 42: | ||
*Lockpicking | *Lockpicking | ||
*Decoding | *Decoding | ||
The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012. The process has three phases: | The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012. | ||
1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8) | |||
2 - Use the anlalysis sheet to determine true or false gates | *The process has three phases: | ||
3 - test possible combinations and open the lock | *1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8) | ||
Time to decode using this technique ranges from about 12-40 minutes. The key of the key affects the decoding time. | *2 - Use the anlalysis sheet to determine true or false gates | ||
*3 - test possible combinations and open the lock | |||
*Time to decode using this technique ranges from about 12-40 minutes. The key of the key affects the decoding time. | |||
The procedure is possible due to the design of the code wheels following a known pattern. | The procedure is possible due to the design of the code wheels following a known pattern. | ||
Revision as of 16:02, 2 June 2024
Rosengrens RKL-10
Rosengrens RKL-10 | |
| |
Name | Rosengrens RKL-10 |
---|---|
Manufacturer | Rosengrens |
Lock Type | Safe lock |
Lock Design | Disc-detainer |
Specifications | |
# of Components | 9 |
Component Type | Disc-detainer |
Principles of operation
This lock has a double circular lever one pack consisting of 9 code wheels and 2 driver wheels. The other pack engages with the cuts on the key, drives the code pack and a corresponding fence that will go into the true cuts and then allows the bolt to be moved into the open or closed positions. The key has 9 different cuts (1 passive cut called AB). Cuts 1-4 are on the A-side of the key. Cuts 5-8 are on the B-side of the key. No cut on side A is called A1. Deepest cut on side A is called AB. AB is a passive cut. An AB cut meant that the next active cut is B5-B8. There is a transport key which being a no-cut is all A1's. Only one side of the key is ever active in each cut position. Cuts on the opposite side of the key in these positions are only to make visual inspection harder.
Gallery
Vulnerabilities
- Lockpicking
- Decoding
The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012.
- The process has three phases:
- 1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8)
- 2 - Use the anlalysis sheet to determine true or false gates
- 3 - test possible combinations and open the lock
- Time to decode using this technique ranges from about 12-40 minutes. The key of the key affects the decoding time.
The procedure is possible due to the design of the code wheels following a known pattern.
External links
- Ларин Олег (Larin Oleg) OB ROSENGRENS RKL10 (video)
- Idanhurja Operation of RKL10 demonstrated using a cutaway lock (video)
- Fey, Han. Abloy Special Products (Part 4)
See also
This article is a stub. You can help Lockwiki by expanding it. |