Rosengrens RKL-10: Difference between revisions

From Lockwiki
Jump to navigationJump to search
m (added Idanhurja video link)
 
(12 intermediate revisions by 3 users not shown)
Line 3: Line 3:
{{Lock model
{{Lock model
| name = Rosengrens RKL-10
| name = Rosengrens RKL-10
| Img =  
| Img = File:RKL10_with_key-Idanhurja.png
| Img_size = 150px
| Img_size = 150px
| maker = [[Rosengrens]]
| maker = [[Rosengrens]]
Line 21: Line 21:


== Principles of operation ==
== Principles of operation ==
This lock has a double circular lever one pack consisting of 9 code wheels and 2 driver wheels. The other pack engages with the cuts on the key, drives the code pack and a corresponding fence that will go into the true cuts and then allows the bolt to be moved into the open or closed positions. The key has 9 different cuts (1 passive cut called AB). Cuts 1-4 are on the A-side of the key. Cuts 5-8 are on the B-side of the key. No cut on side A is called A1. Deepest cut on side A is called AB. AB is a passive cut. An AB cut meant that the next active cut is B5-B8. There is a transport key which being a no-cut is all A1's.
Only one side of the key is ever active in each cut position. Cuts on the opposite side of the key in these positions are only to make visual inspection harder.


== Gallery ==
== Gallery ==
Line 30: Line 32:
File:RKL10_driver_pack_front-Idanhurja.png |Driver pack from an RKL-10 (front view).
File:RKL10_driver_pack_front-Idanhurja.png |Driver pack from an RKL-10 (front view).
File:RKL10_driver_pack_rear-Idanhurja.png |Driver pack from an RKL-10 (rear view).
File:RKL10_driver_pack_rear-Idanhurja.png |Driver pack from an RKL-10 (rear view).
File:RKL10_key_parts-Idanhurja.png
File:RKL10_key-Idanhurja.png
File:RKL10_key_in_lock-Idanhurja.png
File:RKL10_keyhole_curtain_turned-Idanhurja.png |RKL-10 keyhole with curtain rotated.
File:RKL10_keyhole_curtain_turned-Idanhurja.png |RKL-10 keyhole with curtain rotated.
</gallery></div>
</gallery></div>


== Vulnerabilities ==
== Vulnerabilities ==
*Lockpicking
*Decoding
The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012.
The process has three phases:
*1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8)
*2 - Use the anlalysis sheet to determine true or false gates
*3 - test possible combinations and open the lock
Time to decode using this technique ranges from about 12-40 minutes. The key code affects the decoding time.
The procedure is possible due to the design of the code wheels following a known pattern thus true code is possible to deduce via testing in a much reduced code space.


== External links ==
== External links ==
Line 40: Line 56:
* Idanhurja [https://www.youtube.com/watch?v=DB4xi3W_O-4 Operation of RKL10 demonstrated using a cutaway lock] (video)
* Idanhurja [https://www.youtube.com/watch?v=DB4xi3W_O-4 Operation of RKL10 demonstrated using a cutaway lock] (video)
* Fey, Han. [https://toool.nl/images/7/72/Abloypart4.pdf Abloy Special Products (Part 4)]
* Fey, Han. [https://toool.nl/images/7/72/Abloypart4.pdf Abloy Special Products (Part 4)]
* Technical Entry [https://technicalentry.de/rosengrens-the-european-sicherheitsstufe-iv-tresor-ohne-schluessel-oeffnen/ RKL10 opening ] (German language)


== See also ==
== See also ==




{{Stub}}


[[Category:Decoding]]
[[Category:Decoding]]
[[Category:Disc-detainer_locks]]
[[Category:Disc-detainer_locks]]
[[Category:Lock models]]
[[Category:Lock models]]
[[Category:Rosengrens]]
[[Category:Safe_locks]]
[[Category:Safe_locks]]

Latest revision as of 20:46, 13 June 2024

Rosengrens RKL-10

Rosengrens RKL-10
RKL10 with key-Idanhurja.png
Name Rosengrens RKL-10
Manufacturer Rosengrens
Lock Type Safe lock
Lock Design Disc-detainer
Specifications
# of Components 9
Component Type Disc-detainer



Principles of operation

This lock has a double circular lever one pack consisting of 9 code wheels and 2 driver wheels. The other pack engages with the cuts on the key, drives the code pack and a corresponding fence that will go into the true cuts and then allows the bolt to be moved into the open or closed positions. The key has 9 different cuts (1 passive cut called AB). Cuts 1-4 are on the A-side of the key. Cuts 5-8 are on the B-side of the key. No cut on side A is called A1. Deepest cut on side A is called AB. AB is a passive cut. An AB cut meant that the next active cut is B5-B8. There is a transport key which being a no-cut is all A1's. Only one side of the key is ever active in each cut position. Cuts on the opposite side of the key in these positions are only to make visual inspection harder.

Gallery

Vulnerabilities

  • Lockpicking
  • Decoding

The decoding process for this high security lock was first designed and developed by a company called Technical Entry in 2012.

The process has three phases:

  • 1 - Determine whether the true cut for each lever is an odd or even number (1,3,5,7 or 2,4,6,8)
  • 2 - Use the anlalysis sheet to determine true or false gates
  • 3 - test possible combinations and open the lock

Time to decode using this technique ranges from about 12-40 minutes. The key code affects the decoding time. The procedure is possible due to the design of the code wheels following a known pattern thus true code is possible to deduce via testing in a much reduced code space.

External links

See also

Stub lock.png
This article is a stub. You can help Lockwiki by expanding it.