Relay Attacks and Distance Bounding Protocols in RFID Environments - - PowerPoint PPT Presentation

relay attacks and distance bounding protocols in rfid
SMART_READER_LITE
LIVE PREVIEW

Relay Attacks and Distance Bounding Protocols in RFID Environments - - PowerPoint PPT Presentation

Relay Attacks and Distance Bounding Protocols in RFID Environments Prof. Gildas Avoine Universit e catholique de Louvain, Belgium Information Security Group SUMMARY RFID Background Relay Attacks Countermeasures and Evolved Frauds


slide-1
SLIDE 1

Relay Attacks and Distance Bounding Protocols in RFID Environments

  • Prof. Gildas Avoine

Universit´ e catholique de Louvain, Belgium Information Security Group

slide-2
SLIDE 2

SUMMARY

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-3
SLIDE 3

RFID BACKGROUND

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-4
SLIDE 4

Architecture

Definition (RFID) [RFID] means the use of electromagnetic radiating waves or reactive field coupling in the radio frequency portion of the spectrum to communicate to or from a tag through a variety of modulation and encoding schemes to uniquely read the identity of a radio frequency tag or other data stored on it.

Reader T ag Reader T ag T ag T ag Back-end kystem

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 4

slide-5
SLIDE 5

Basic RFID

www.aeroid.co.uk www.rfid-library.com www.flickr.com www.safetzone.com

Supply chain tracking.

  • Track boxes, palettes, etc.

Libraries.

  • Improve book borrowing and inventories.

Pet identification.

  • Replace tattoos by electronic ones.
  • ISO11784, ISO11785.

Localisation.

  • Children in amusement parks, Elderly people.
  • Counting cattle.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 5

slide-6
SLIDE 6

Evolved RFID

Credit: G. Avoine Credit: G. Avoine www.carthiefstoppers.com www.brusselnieuws.be www.bajabeach.es blogs.e-rockford.com

Building access control.

  • Eg. UCL, MIT.

Automobile ignition key.

  • Eg. TI DST, Keeloq.

Public transportation.

  • Eg. Brussels, Boston, Paris, ..., Thalys.

Payment.

  • Eg. Visa, Baja Beach Club.

Electronic documents.

  • Eg. ePassports.

Loyalty cards.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 6

slide-7
SLIDE 7

Tag Characteristics

cost power frequency communication standard calculation storage

Access control Logistics active passive LF HF UHF meters dm cm UID 1 KB 40 KB no pwd sym crypto asym crypto EPC ISO14443 ISO15693 10 cents 50 cents euros

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 7

slide-8
SLIDE 8

RELAY ATTACKS

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-9
SLIDE 9

Variant of ISO 9798-2 Protocol 3

Verifier (secret k) Prover (secret k) Pick Na

Na

− − − − − − − − − →

Ek(Na,Nb)

← − − − − − − − − Pick Nb

Protocol secure under common assumptions on E, k, Na, and Nb.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 9

slide-10
SLIDE 10

Relay Attack

Verifier Prover Adversary Adversary

10000 km

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 10

slide-11
SLIDE 11

Relay Attack

Definition and Do-Ability

Definition (Relay Attack) A relay attack is a form of man-in-the-middle where the adversary manipulates the communication by only relaying the verbatim messages between two parties. Reader starts a timer when sending a message.

  • To avoid semi-open connections.
  • The timer is not tight.

Example: ISO 14443 “Proximity Cards”.

  • Used in most secure applications.
  • Standard on the low-layers (physical, collision-avoidance).
  • Default timer is around 5 ms.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 11

slide-12
SLIDE 12

Practicability

Examples

Radio link over 50 meters (G. Hancke 05). With some ACR122 (A. Laurie 09). With NFC cell phones or over Internet (libNFC).

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 12

slide-13
SLIDE 13

COUNTERMEASURES AND EVOLVED FRAUDS

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-14
SLIDE 14

Protocol Aims in General Framework

Definition (Distance Checking) A distance bounding is a process whereby one party is assured:

1 Of the identity of a second party, 2 That the latter is present in the neighborhood of the verifying

party, at some point in the protocol.

Reader Tag

Distance bounding does not avoid relay attacks.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 14

slide-15
SLIDE 15

No Fraud

Adversary Reader Tag Reader Tag Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 15

slide-16
SLIDE 16

Fraud

Adversary Reader Adversary Tag Reader Tag Reader Reader Adversary Tag Reader Adversary Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 16

slide-17
SLIDE 17

Measuring the Distance

Global Positioning System (GPS). Received Signal Strength (RSS). Round Trip Time (RTT).

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 17

slide-18
SLIDE 18

Distance Bounding Based on the Speed of Light

Measure the round-trip-time (RTT) of a given message.

  • Provide a bound on the distance.
  • Idea introduced by Beth and Desmedt [Crypto90].

Reader Neighborhood computation Accelerated Tag

Message must be authenticated

  • Auth. is time-consuming

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 18

slide-19
SLIDE 19

Simplified Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na

Na

− − − − − − − → h(K, Na) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange

Question Adversary’s success probability (relay attack): 0.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 19

slide-20
SLIDE 20

Mafia Fraud

Definition (Mafia Fraud) A mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the reader and an honest tag located outside the neighborhood. Mafia fraud: Desmedt, Goutier, Bengio [Crypto87]. Shamir about Fiat-Shamir protocol [Crypto86]: “I can go to a Mafia-owned store a million successive times and they still will not be able to misrepresent themselves as me.” (The NY Times, February 17, 1987, James Gleick). A.k.a., relay attack, chess grandmaster, wormhole problem, passive man-in-the-middle, middleman attack...

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 20

slide-21
SLIDE 21

Distance Fraud

Definition (Distance Fraud) Given a distance bounding protocol, a distance fraud is an attack where a dishonest and lonely prover purports to be in the neighborhood of the verifier. Example Home confinement is a legal measure by which a person is confined by the authorities to his residence. With such a measure where travels are restricted, a distance attack is definitely relevant, in

  • rder to allow the person under monitoring to leave his residence

without being detected.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 21

slide-22
SLIDE 22

Terrorist Fraud

Definition (Terrorist Fraud) A terrorist fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the reader and a dishonest tag located outside of the neighborhood, such that the latter actively helps the adversary to maximize her attack success probability, without giving to her any advantage for future attacks. Example The terrorist attack also makes sense in the case of home confinement because the arrested person may benefit from the help

  • f an accomplice who stays close to the monitoring system while

the person under control is away. In such a case, a terrorist fraud is needed because the ankle bracelet cannot be removed except by the authorities.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 22

slide-23
SLIDE 23

PROTOCOLS

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-24
SLIDE 24

Theoretical Protocols

Brands and Chaum (Eurocrypt 1993) Hancke and Kuhn (SecureComm 2005) Munilla, Ortiz, and Peinado (RFIDsec 2006) Reid, Neito, Tang, and Senadji (ASIACCS 2007) Singel´ ee and Preneeld (ESAS 2007) Tu and Piramuthu (EURASIP RFID Technologie 2007) Munilla and Peinado (Wireless Com. and Mobile Comp. 2008) Kim, Avoine, Koeune, Standaert, and Pereira (ICISC 2008) Nikov and Vauclair (eprint 2008) Avoine and Tchamkerten (ISC 2009) Kim and Avoine (CANS 2009) Peris-Lopez, Hernandez-Castro, et al. (arXiv.org 2009) Avoine, Floerkemeier, and Martin (Indocrypt 2009) . . .

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 24

slide-25
SLIDE 25

HANCKE AND KUHN’S PROTOCOL (2005)

slide-26
SLIDE 26

Simplified Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na

Na

− − − − − − − → h(K, Na) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 26

slide-27
SLIDE 27

Simplified Hancke and Kuhn’s Protocol

Analysis

Question Success probability in the following cases:

1 Terrorist fraud: 1. 2 Distance fraud:

3

4

n.

3 Mafia fraud: 1.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 27

slide-28
SLIDE 28

Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb

Na

− − − − − − − →

Nb

← − − − − − − − h(K, Na, Nb) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 28

slide-29
SLIDE 29

Simplified Hancke and Kuhn’s Protocol

Analysis

Question Success probability in the following cases:

1 Terrorist fraud: 1. 2 Distance fraud:

3

4

n.

3 Mafia fraud:

3

4

n.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 29

slide-30
SLIDE 30

ANALYSIS FRAMEWORK

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-31
SLIDE 31

Adversary Model

Adversary Strategies for Querying a Prover

Definition (Pre-ask strategy) The adversary relays the first slow phase. She then executes the fast phase with the prover before the verifier starts the fast phase. Afterward, she performs the fast phase with the legitimate verifier. She can also finally relay the final slow phase, if any. Definition (Post-ask strategy) The adversary relays the first slow phase. She then executes the fast phase with the verifier without asking the prover. Then, she queries the prover with the correct challenges received during the fast phase. Finally, she relays the final slow phase.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 31

slide-32
SLIDE 32

Prover Model

Tampering Capabilities of the Prover

Definition (Black-box model) In a black-box model, the prover cannot observe or tamper with the execution of the algorithm. Definition (White-box model) In a white-box model, the prover has full access to the implementation of the algorithm and a complete control over the execution environment.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 32

slide-33
SLIDE 33

Relations Between the Frauds and the Models

White−box model Terrorist fraud Terrorist fraud Mafia fraud Mafia fraud Distance fraud Distance fraud Black−box model

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 33

slide-34
SLIDE 34

Prover Model

Computing Capabilities of the Prover

In the white-box model, restricting the computation capabilities

  • f the prover within one protocol execution is required.

This computation bound should be provided by the designers of distance bounding protocols and the security analysis should be based on it.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 34

slide-35
SLIDE 35

Prover Model

Computing Capabilities of the Prover - Example: HK

1e-16 1e-14 1e-12 1e-10 1e-08 1e-06 0.0001 0.01 1 1 10 100 1000 10000 100000 1e+06 Adversary success probability p: Number of runs Register length: n=20 n=40 n=60 n=80 n=128 Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 35

slide-36
SLIDE 36

Prover Model – Circle Analysis

Distance Between Verifier and Prover

In some distance bounding protocols, each response bit depends

  • n some previous challenges during the fast phase.

Receiving the previous challenges depends on how far the prover is away from the verifier.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 36

slide-37
SLIDE 37

CONCLUSION AND FURTHER READING

RFID Background Relay Attacks Countermeasures and Evolved Frauds Protocols Analysis Framework Conclusion and Further Reading

slide-38
SLIDE 38

Conclusion

Why so Many Protocols?

Goal is to decrease the adversary’s success probabilities.

  • Resistance to noise.
  • Avoid a final signature.
  • Separate authentication and distance checking.
  • . . .

Theory is far beyond practice.

  • First protocols analyzed with a pedestrian appraoch.
  • What is designed in theory is perhaps not practical.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 38

slide-39
SLIDE 39

Conclusion

Limits of Distance Bounding

Relay attacks are practicable. Distance bounding not implemented in commercial products.

  • Propagation delays are much shorter than processing times.
  • The considered time are nanoseconds.
  • What is the practical radius of the neighborhood?
  • Why sending only one bit?

Mifare Plus contains a kind of distance bounding protocol. Mitigating the problem is perhaps enough.

  • Adversary also induces some delays.
  • Thwarting adversaries using commercial readers.
  • Avoiding long-distance attacks.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 39

slide-40
SLIDE 40

Further Reading

  • Y. Desmedt, C. Goutier, and S. Bengio. Special Uses and

Abuses of the Fiat-Shamir Passport Protocol. In CRYPTO’87,

  • vol. 293 of LNCS, pp 21–39, Aug. 1988. Springer.
  • S. Brands and D. Chaum. Distance-Bounding Protocols. In

EUROCRYPT’93, vol. 765 of LNCS, pp 344–359, May 1993. Springer.

  • G. Hancke and M. Kuhn. An RFID Distance Bounding Protocol.

In SecureComm 2005, Sep. 2005. IEEE.

  • G. Avoine, M. Bing¨
  • l, S. Kardas, C. Lauradoux, and B. Martin.

A Framework for Analyzing RFID Distance Bounding Protocols. Journal of Computer Security, 2010.

Gildas Avoine Relay Attacks and Distance Bounding Protocols in RFID Environments 40