Soutenance Publique de Th` ese de Doctorat
Cryptography in Radio Frequency Identification and Fair Exchange Protocols
Gildas Avoine
EPFL, Lausanne, Switzerland
December 12, 2005 – www.avoine.net
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE
Cryptography in Radio Frequency Identification and Fair Exchange - - PowerPoint PPT Presentation
Soutenance Publique de Th` ese de Doctorat Cryptography in Radio Frequency Identification and Fair Exchange Protocols Gildas Avoine EPFL, Lausanne, Switzerland COLE POLYTECHNIQUE December 12, 2005 www.avoine.net FDRALE DE LAUSANNE
EPFL, Lausanne, Switzerland
December 12, 2005 – www.avoine.net
ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE
⊲ Fair Exchange
⊲ Radio Frequency Identification
⊲ Odds and Ends
2 / 34
3 / 34
tag tag tag tag database tag reader
4 / 34
5 / 34
6 / 34
communication distance computation memory tamper−resistance power source s y m m e t r i c s e m i − p a s s i v e 128 1024 m e t e r s c e n t i m . no yes p a s s i v e a c t i v e a s y m m e t r i c x
7 / 34
⊲ Tags cannot be switched-off ⊲ Tags answer without the agreement of their bearers ⊲ Increasing of the communication range ⊲ Tags can be almost invisible
8 / 34
⊲ Management of stocks ⊲ Libraries ⊲ Anti-counterfeiting ⊲ Access control ⊲ Localization of people ⊲ Electronic documents ⊲ Counting cattle
9 / 34
⊲ Denial of service ⊲ Impersonation ⊲ Information Leakage ⊲ Malicious traceability
10 / 34
11 / 34
12 / 34
13 / 34
request
ID
14 / 34
r
EK (r)
15 / 34
⊲ Attack of Bono et al. on the Digital Signature Transponder
Key (RFID) Car r EK(r)
⊲ Recovering the 40-bit key requires less than 1 minute using a
Recovering the cryptographic key / Impersonating the ignition key / Impersonating the SpeedPass card 16 / 34
⊲ The reader believes the tag is within its electromagnetic field. ⊲ The attacker behaves as an extension cord.
adversary tag
reader database ⊲ The solution consists in using a distance bounding protocol.
17 / 34
18 / 34
⊲ Tagged books in libraries ⊲ Tagged pharmaceutical products ⊲ Electronic documents like passports, ID cards, etc.
19 / 34
20 / 34
⊲ The information sent back by the tag must be indistinguishable
⊲ The information must be refreshed at each new identification.
21 / 34
Protocol Weaknesses pointed out by [JuelsP03] [Avoine04], [ZhangK05] [VadjaB03] [VadjaB03] [GolleJJS04] [Avoine05], [SaitoRS04] [Juels04] [Juels04] [HenriciM04] [AvoineO05] [SaitoRS04] [Avoine05] [JuelsW05] [GilbertRS05] [WeisSRE02] [OhkuboSK03] [FeldhoferDW04] [MolnarW04] [RheeKKW05]
22 / 34
a
K (σ) is valid σ
23 / 34
⊲ An exhaustive search in the system’s database is required to
⊲ Complexity too high in particular in case of inventory. ⊲ Is it possible to design an RFID protocol with a complexity
⊲ Molnar and Wagner proposed a solution that reduces the
24 / 34
⊲ Each tag stores logδ(n) keys.
T2 T3 T4 T5 T6 T7 T8 T9 T10 T12 T13 T14 T15 T16 T11 T1 K19 K20 K18 K15 K16 K14 K12 K7 K8 K6 K1 K2 K3 K4 K10 K11 K5 K9 K13 K17
⊲ A challenge-response is applied at each level of the tree. ⊲ Instead of carrying out 1 exhaustive search in a set of size n,
25 / 34
⊲ Tags share some keys. ⊲ Tampering with tags gives information about the other tags.
K19 K20 K18 K15 K14 K12 K7 K8 K6 K1 K2 K3 K4 K10 K5 K9 K13 T2 T4 T5 T6 T7 T8 T9 T10 T12 T13 T14 T15 T16 T11 T1
known keys unknown keys
K17 K16 K11 T3 26 / 34
A T T2 T1 tamper with RFID RFID RFID (1) (2) (3)
?
27 / 34
⊲ T1 on known branch and T2 on unknown branch: success. ⊲ T2 on known branch and T1 on unknown branch: success. ⊲ T1 and T2 both on known but different branches: success. ⊲ T1 and T2 both on unknown: failure. ⊲ T1 and T2 both the same known branch: failure at level i but
28 / 34
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 200 300 400 500 600 700 800 900 1000 Probability of tracing tag T Branching factor δ k = 1 k = 20 k = 50 k = 100 k = 200
29 / 34
⊲ Time complexity can be reduced against a memory cost. ⊲ [AO05] as efficient as [MW04]. ⊲ [AO05] does not degrade security.
30 / 34
31 / 34
request Noise
32 / 34
⊲ The access to the communication channel is split into time
⊲ The number of slots is chosen by the reader which informs the
⊲ Each tag randomly chooses one slot among the n and replies
⊲ If n is not sufficiently large, then some collisions occur. ⊲ Example: Philips ICode1 Label.
33 / 34
⊲ Will low cost RFID become an ubiquitous technology? ⊲ Is malicious traceability a problem? ⊲ Is it too late to deal with this problem? ⊲ Are there existing solutions? ⊲ Shall we have a drink after the presentation?
34 / 34