A Proof of Concept for Modern Car Sharing Timo Kasper , Alexander - - PowerPoint PPT Presentation

a proof of concept for modern car sharing
SMART_READER_LITE
LIVE PREVIEW

A Proof of Concept for Modern Car Sharing Timo Kasper , Alexander - - PowerPoint PPT Presentation

July 10, 2013 Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing Timo Kasper , Alexander Khn, David Oswald, Christian Zenger, Christof Paar Chair for Embedded Security (EMSEC) HGI,


slide-1
SLIDE 1

Timo Kasper, Alexander Kühn, David Oswald, Christian Zenger, Christof Paar

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing

July 10, 2013

Chair for Embedded Security (EMSEC) HGI, Ruhr-Universität Bochum, Germany

9th Workshop on RFID Security, Graz, Austria

slide-2
SLIDE 2

2

  • defined in ISO/IEC 14443 standard
  • large scale applications:
  • access control systems
  • electronic passports
  • payment systems
  • ticketing / public transport
  • Near Field Communication (NFC)

is compatible to ISO/IEC 14443

The infrastructure (cards, readers, …) is out there

 Let’s use it! NFC

Contactless Smartcards (and NFC)

slide-3
SLIDE 3

3

Motivation

slide-4
SLIDE 4

4

Goals of the Project

  • on-line booking application
  • correctly identify the customer (billing, …)
  • transfer booked rights to phone
  • access booked NFC objects with phone

(including scenarios without permanent Internet)

  • enable alternatives based on contactless cards
  • proof-of-concept implementation (!)
slide-5
SLIDE 5

5

Ingredients

  • 1. NFC-smartphone with Internet access (UMTS, GSM, …)

here: BlackBerry Bold 9900

  • 2. Contactless card with e-ID function

here: new German electronic identity card (nPA)

  • 3. NFC-enabled object(s)

here: red car with NFC interface

slide-6
SLIDE 6

6

Phase 1: Booking (NFC phone acts as RFID reader)

  • use e-ID card to prove customer’s identity to service provider

(PACE with PIN and EAC)

  • credential is generated and securely transferred to the phone
slide-7
SLIDE 7

7

Phase 2: Execute Booked Rights (NFC phone emulates Mifare DESfire)

  • car acts as NFC reader, phone emulates Mifare DESfire card
  • secure channel: 3DES-based mutual authentication scheme
  • car obtains and checks credential
  • if credential is valid, access is given
slide-8
SLIDE 8

Chair for Embedded Security (Prof. Christof Paar)

www.emsec.rub.de

timo.kasper@rub.de

Thank you! Questions?

slide-9
SLIDE 9

OK, some more details ….

slide-10
SLIDE 10

10

One-Time Registration at the Service Provider

  • 1. generate customer‘s public key 𝒒𝒍𝑫 and secret key 𝒕𝒍𝑫
  • 2. shop stores 𝒒𝒍𝑫, customer ID 𝑱𝑬𝑫, and MRZ of nPA
  • 3. phone stores 𝒕𝒍𝑫, and 𝒒𝒍𝑻𝑸 of the service provider

(𝒒𝒍𝑻𝑸, 𝒕𝒍𝑻𝑸) (𝒒𝒍𝑻𝑷, 𝒕𝒍𝑻𝑷)

(𝒒𝒍𝑫 , 𝒕𝒍𝑫)

slide-11
SLIDE 11

11

Phase 1: Booking (NFC phone acts as RFID reader)

Two steps:

  • 1. customer identification
  • 2. obtaining a right (credential)
slide-12
SLIDE 12

12

Booking 1/2 Customer Identification

 secure, if special nPA reader (external pinpad) was used…

slide-13
SLIDE 13

13

Booking 2/2 Obtaining a Right (Credential)

  • customer is identified, let‘s book s.th. !
  • communication secured with TLS

(assumption: TLS is secure …)

  • four steps:
slide-14
SLIDE 14

14

Booking 2/2 Obtaining a Right (Credential)

  • service information 𝐽𝑇𝑆𝑓𝑟 (e.g., GPS position of phone)
  • customer ID 𝐽𝐸𝐷
  • random nonce 𝑂𝐷
  • time stamp 𝑢𝑡𝑇𝑆𝑓𝑟
slide-15
SLIDE 15

15

Booking 2/2 Obtaining a Right (Credential)

  • service information 𝐽𝑇𝑆𝑓𝑟 (e.g., GPS position of phone)
  • customer ID 𝐽𝐸𝐷
  • random nonce 𝑂𝐷
  • time stamp 𝑢𝑡𝑇𝑆𝑓𝑟
slide-16
SLIDE 16

16

Booking 2/2 Obtaining a Right (Credential)

  • service information 𝐽𝐶𝑆𝑓𝑟 (e.g., GPS position of car …)
  • unique service object information 𝑉𝐽𝐶𝑆𝑓𝑟 (e.g., car ID)
  • modified nonce 𝑂𝐷‘
  • time stamp 𝑢𝑡𝐶𝑆𝑓𝑟
slide-17
SLIDE 17

17

Booking 2/2 Obtaining a Right (Credential)

  • service information 𝐽𝐶𝑆𝑓𝑟 (e.g., GPS position of car …)
  • unique service object information 𝑉𝐽𝐶𝑆𝑓𝑟 (e.g., car ID)
  • modified nonce 𝑂𝐷‘
  • time stamp 𝑢𝑡𝐶𝑆𝑓𝑟
slide-18
SLIDE 18

18

Booking 2/2 Obtaining a Right (Credential)

  • service information 𝐽𝐶𝑆𝑓𝑟
  • unique service object information 𝑉𝐽𝐶𝑆𝑓𝑟
  • (more) modified nonce 𝑂𝐷‘‘
  • time stamp 𝑢𝑡𝐶𝐷𝑝𝑜
slide-19
SLIDE 19

19

Booking 2/2 Obtaining a Right (Credential)

  • service information 𝐽𝐶𝑆𝑓𝑟
  • unique service object information 𝑉𝐽𝐶𝑆𝑓𝑟
  • (more) modified nonce 𝑂𝐷‘‘
  • time stamp 𝑢𝑡𝐶𝐷𝑝𝑜
slide-20
SLIDE 20

20

Booking 2/2 Obtaining a Right (Credential)

  • Create service credential from:

information 𝐽𝑇𝐷, (even more) modified nonce 𝑂𝐷‘‘‘, unique service object information 𝑉𝐽𝑇𝐷, time stamp 𝑢𝑡𝑇𝐷, Authentication Key, and encrypted user rights credential

slide-21
SLIDE 21

21

Booking 2/2 Obtaining a Right (Credential)

  • Create service credential from:

information 𝐽𝑇𝐷, (even more) modified nonce 𝑂𝐷‘‘‘, unique service object information 𝑉𝐽𝑇𝐷, time stamp 𝑢𝑡𝑇𝐷, Authentication Key, and encrypted User Rights Credential

slide-22
SLIDE 22

22

Booking 2/2 Obtaining a Right (Credential)

very easy!

slide-23
SLIDE 23

23

Phase 2: Execute Booked Rights (NFC phone emulates Mifare DESfire)

  • Authentication Key from service credential is used to secure

wireless link (DESfire mutual authentication)

  • Decrypt User Rights Credential with 𝒕𝒍𝑻𝑷 and verify its

signature with 𝒒𝒍𝑻𝑸

slide-24
SLIDE 24

Homework:

Read our paper and find out how the Authentication Key is generated and updated in case of no Internet.

slide-25
SLIDE 25

25

Secure Elements

In Theory: Several options

  • Embedded Secure Element (eSE)
  • SIM card issued by communication provider
  • SE integrated in a (Micro) SD card

In Practice:

  • slow (8-bit) and Java
  • no access granted 
slide-26
SLIDE 26

26

Implementation Obstacles and Security Issues

Software on Smartphone:

  • no access to SE  no secure storage
  • program main CPU in Java (  !! )
  • RIM API doesn‘t support nPA elliptic curve (brainpoolP256r1)

nPA:

  • No certificate for Terminal Authentication (TA)
  • No external pinpad / secure nPA reader

 Trojan in smartphone OS poses a security threat

slide-27
SLIDE 27

27

Run-Time of PACE

slide-28
SLIDE 28

28

Summary

  • Concept for secure rights management with NFC
  • Smartphone application for booking via TLS
  • NFC phone as RFID reader realizes eID function of nPA

(ECDHKE in Java …)

  • NFC phone emulates Mifare DESfire card to open car
  • some remaining security issues discussed
slide-29
SLIDE 29

Chair for Embedded Security (Prof. Christof Paar)

www.emsec.rub.de

timo.kasper@rub.de

www.kasper-oswald.de

Thank you! Questions?

slide-30
SLIDE 30

30

Security for eMobility: Project SecMobil

slide-31
SLIDE 31

Partners

Associated Partners

31

slide-32
SLIDE 32

32

Goals

  • development of a secure energy sensor
  • tamper-proof smart metering
  • standardized security architecture for electric cars
  • privacy and data security

for end-users and suppliers

slide-33
SLIDE 33

33

  • Lecture „Introduction to

Cryptography and Data Security“

  • Videos of 2 semesters
  • all online:

www.crypto-textbook.com Introduction to Cryptography and Data Security