Cryptography in Radio Frequency Identification and Fair Exchange - - PowerPoint PPT Presentation

cryptography in radio frequency identification and fair
SMART_READER_LITE
LIVE PREVIEW

Cryptography in Radio Frequency Identification and Fair Exchange - - PowerPoint PPT Presentation

Soutenance Publique de Th` ese de Doctorat Cryptography in Radio Frequency Identification and Fair Exchange Protocols Gildas Avoine EPFL, Lausanne, Switzerland COLE POLYTECHNIQUE December 12, 2005 www.avoine.net FDRALE DE LAUSANNE


slide-1
SLIDE 1

Soutenance Publique de Th` ese de Doctorat

Cryptography in Radio Frequency Identification and Fair Exchange Protocols

Gildas Avoine

EPFL, Lausanne, Switzerland

December 12, 2005 – www.avoine.net

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

slide-2
SLIDE 2

Summary of my Work

⊲ Fair Exchange

AV03a, AV03b, AV04, AGGV05, Avo03.

⊲ Radio Frequency Identification

Avo04, ADO05, AO05a, AO05b, CA06, AB06.

⊲ Odds and Ends

Avo05, AMP04, AJO05, AJ03, VAJ03, AJO05.

2 / 34

slide-3
SLIDE 3

Outline of the Presentation RFID PRIMER IMPERSONATION OF TAGS INFORMATION LEAKAGE MALICIOUS TRACEABILITY TRACEABILITY THROUGHT THE COMMUNICATION LAYERS

3 / 34

slide-4
SLIDE 4

RFID PRIMER

slide-5
SLIDE 5

RFID Definition and Architecture Definition RFID Radio Frequency IDentification (RFID) is a method of remotely identifying objects or subjects using transponders (tags) queried through a radio frequency channel.

tag tag tag tag database tag reader

4 / 34

slide-6
SLIDE 6

RFID Tags

5 / 34

slide-7
SLIDE 7

RFID Readers

6 / 34

slide-8
SLIDE 8

Tag Characteristics

communication distance computation memory tamper−resistance power source s y m m e t r i c s e m i − p a s s i v e 128 1024 m e t e r s c e n t i m . no yes p a s s i v e a c t i v e a s y m m e t r i c x

  • r

7 / 34

slide-9
SLIDE 9

Tag Specificities

⊲ Tags cannot be switched-off ⊲ Tags answer without the agreement of their bearers ⊲ Increasing of the communication range ⊲ Tags can be almost invisible

8 / 34

slide-10
SLIDE 10

Daily Life Examples

⊲ Management of stocks ⊲ Libraries ⊲ Anti-counterfeiting ⊲ Access control ⊲ Localization of people ⊲ Electronic documents ⊲ Counting cattle

9 / 34

slide-11
SLIDE 11

Security Threat Classification

⊲ Denial of service ⊲ Impersonation ⊲ Information Leakage ⊲ Malicious traceability

10 / 34

slide-12
SLIDE 12

IMPERSONATION OF TAGS

slide-13
SLIDE 13

Problem and Adversary Means Problem An adversary should not be able to impersonate a tag. Adversary Means The adversary can query the targetted tag or eavesdrop (RFID) communications between the tag and readers. Then the adversary tries to simulate the tag in front of a legitimate reader.

11 / 34

slide-14
SLIDE 14

Tag Simulator

12 / 34

slide-15
SLIDE 15

Identification vs Authentication Primal goal of RFID is to provide security. Definition Authentication The authentication consists for the reader in obtaining the identity

  • f the tag and a proof that the claimed identity is correct.

Primal goal of RFID is to provide functionality. Definition Identification The identification consists for the reader in obtaining the identity

  • f the tag, but no proof is required.

13 / 34

slide-16
SLIDE 16

Identification Protocol System Tag

request

− − − − − − − − − − − − − − − − − →

ID

← − − − − − − − − − − − − − − − − − Examples: Counting cattle, localization, stock management.

14 / 34

slide-17
SLIDE 17

Authentication Protocol System (K) Tag (K)

r

− − − − − − − − − − − − − − − − − →

EK (r)

← − − − − − − − − − − − − − − − − − Examples: Access control, e-documents, anti-counterfeiting.

15 / 34

slide-18
SLIDE 18

Impersonation (Example: Texas Instrument DST Module)

⊲ Attack of Bono et al. on the Digital Signature Transponder

manufactured by TI, used in automobile ignition key.

Key (RFID) Car r EK(r)

⊲ Recovering the 40-bit key requires less than 1 minute using a

time-memory trade-off.

Recovering the cryptographic key / Impersonating the ignition key / Impersonating the SpeedPass card 16 / 34

slide-19
SLIDE 19

Impersonation (Example: Relay Attack)

⊲ The reader believes the tag is within its electromagnetic field. ⊲ The attacker behaves as an extension cord.

adversary tag

reader database ⊲ The solution consists in using a distance bounding protocol.

17 / 34

slide-20
SLIDE 20

INFORMATION LEAKAGE

slide-21
SLIDE 21

Problem and Adversary Means Problem An adversary should not be able to obtain useful information about the tagged object. Adversary Means The adversary can query the targetted tag or eavesdrop (RFID) communications between the tag and readers.

18 / 34

slide-22
SLIDE 22

Information Leakage Problem

⊲ Tagged books in libraries ⊲ Tagged pharmaceutical products ⊲ Electronic documents like passports, ID cards, etc.

19 / 34

slide-23
SLIDE 23

MALICIOUS TRACEABILITY

slide-24
SLIDE 24

Problem and Adversary means Problem An adversary should not be able to track people thanks to the RFID tags they carry. Adversary Means The adversary can query the targetted tag and eavesdrop (RFID) communications between his target and readers.

20 / 34

slide-25
SLIDE 25

Avoiding Malicious Traceability

⊲ The information sent back by the tag must be indistinguishable

(by an adversary) from a random value.

⊲ The information must be refreshed at each new identification.

21 / 34

slide-26
SLIDE 26

Protocols

Protocol Weaknesses pointed out by [JuelsP03] [Avoine04], [ZhangK05] [VadjaB03] [VadjaB03] [GolleJJS04] [Avoine05], [SaitoRS04] [Juels04] [Juels04] [HenriciM04] [AvoineO05] [SaitoRS04] [Avoine05] [JuelsW05] [GilbertRS05] [WeisSRE02] [OhkuboSK03] [FeldhoferDW04] [MolnarW04] [RheeKKW05]

22 / 34

slide-27
SLIDE 27

Feldhofer, Dominikus, and Wolkerstorfer’s Protocol System (K) Tag (K) pick a

a

− − − − − − − − − − − − − − − − − → find K in its database s.t. AES−1

K (σ) is valid σ

← − − − − − − − − − − − − − − − − − pick b and compute σ = AESK(a, b)

23 / 34

slide-28
SLIDE 28

Computation Complexity of Challenge-Response Protocols

⊲ An exhaustive search in the system’s database is required to

identify one tag.

⊲ Complexity too high in particular in case of inventory. ⊲ Is it possible to design an RFID protocol with a complexity

better than linear?

⊲ Molnar and Wagner proposed a solution that reduces the

complexity of any challenge-response from O(n) to O(log n).

24 / 34

slide-29
SLIDE 29

Molnar and Wagner’s Tree-Based Technique

⊲ Each tag stores logδ(n) keys.

T2 T3 T4 T5 T6 T7 T8 T9 T10 T12 T13 T14 T15 T16 T11 T1 K19 K20 K18 K15 K16 K14 K12 K7 K8 K6 K1 K2 K3 K4 K10 K11 K5 K9 K13 K17

⊲ A challenge-response is applied at each level of the tree. ⊲ Instead of carrying out 1 exhaustive search in a set of size n,

logδ(n) exhaustive searches are performed in sets of size δ.

25 / 34

slide-30
SLIDE 30

Drawbacks

⊲ Tags share some keys. ⊲ Tampering with tags gives information about the other tags.

K19 K20 K18 K15 K14 K12 K7 K8 K6 K1 K2 K3 K4 K10 K5 K9 K13 T2 T4 T5 T6 T7 T8 T9 T10 T12 T13 T14 T15 T16 T11 T1

known keys unknown keys

K17 K16 K11 T3 26 / 34

slide-31
SLIDE 31

How to Trace a Tag (1) Tamper with k tags. (2) Choose any target T and query it at will. (3) Query T1 and T2 to determine which of the two is T.

A T T2 T1 tamper with RFID RFID RFID (1) (2) (3)

?

27 / 34

slide-32
SLIDE 32

Five Cases to Analyze

⊲ T1 on known branch and T2 on unknown branch: success. ⊲ T2 on known branch and T1 on unknown branch: success. ⊲ T1 and T2 both on known but different branches: success. ⊲ T1 and T2 both on unknown: failure. ⊲ T1 and T2 both the same known branch: failure at level i but

the attack moves on to level i + 1.

28 / 34

slide-33
SLIDE 33

Probability of Success

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 100 200 300 400 500 600 700 800 900 1000 Probability of tracing tag T Branching factor δ k = 1 k = 20 k = 50 k = 100 k = 200

29 / 34

slide-34
SLIDE 34

Using a Time-Memory Trade-Off

⊲ Time complexity can be reduced against a memory cost. ⊲ [AO05] as efficient as [MW04]. ⊲ [AO05] does not degrade security.

30 / 34

slide-35
SLIDE 35

TRACEABILITY THROUGHT THE COMMUNICATION LAYERS

slide-36
SLIDE 36

Problem and Adversary Means Problem An adversary should not be able to track people thanks to the RFID tags they carry. Adversary Means The adversary takes benefit of a side channel instead of using the RFID protocol. This side channel can be in any layer of the communication model.

31 / 34

slide-37
SLIDE 37

Malicious Traceability in the Communication Layer

request Noise

32 / 34

slide-38
SLIDE 38

Collision-Avoidance Protocols (Example: Slotted Aloha)

⊲ The access to the communication channel is split into time

slots.

⊲ The number of slots is chosen by the reader which informs the

tags they will have n slots to answer.

⊲ Each tag randomly chooses one slot among the n and replies

to the reader when its slot arrives.

⊲ If n is not sufficiently large, then some collisions occur. ⊲ Example: Philips ICode1 Label.

33 / 34

slide-39
SLIDE 39

CONCLUSION

slide-40
SLIDE 40

Conclusion

⊲ Will low cost RFID become an ubiquitous technology? ⊲ Is malicious traceability a problem? ⊲ Is it too late to deal with this problem? ⊲ Are there existing solutions? ⊲ Shall we have a drink after the presentation?

34 / 34