SLIDE 1
RFID and ticketing application
Who?
C´ edric Lauradoux EPL/INGI/GSI
When?
January 22, 2009
SLIDE 2 Outline
◮ Technology ◮ Information leakage ◮ Malicious tracability ◮ Denial of service ◮ Relay attacks
◮ Problem ◮ Attacks
- when RFID meet ticketing. . .
SLIDE 3
Radio Frequency IDentification
SLIDE 4 Radio Frequency IDentification
The big Napoleon
asymmetric xor Distance yes no 1024 13.56Mhz 900Mhz 2.4Ghz Frequency 0.20$ 0.80$ 3$ Crypto Tamper resistance 124Khz meters EPC Gen 2 ISO 14443 Norms Memory Cost ISO 15963 symmetric centimeters 128
SLIDE 5
Radio Frequency IDentification
Identification
Definition
The result of an identification protocol is the identity claimed by the queried RFID tag.
Alice the tag Bob the door Alice
Who are you ?
SLIDE 6 Radio Frequency IDentification
Authentification
Definition
The result of an authentification protocol is the genuine identity
Alice the tag Bob the door f (k, n1, Id) n1 (k, Id) (k, Id)
In brief: Authentification = Identity + Proof.
SLIDE 7 Frequency band
- 125–134 kHz (LF): Pet identification, livestock tracking. . .
- 13.553–13.567 MHz (HF): Smartcards, libraries. . .
- 860–960 MHz (UHF): Supply chain tracking. . .
- 2.4000–2.4835 GHz (UHF): Highway toll, vehicle fleet. . .
SLIDE 8
Norms
lost in translation ??
ISO Identification protocols:
10536 18046 24710 18185 17366 15418 24721 19789 15459 18047 14443 15963 11784 17367 17368 15693 11785 17365 19762 18000 15961
SLIDE 9 Radio Frequency IDentification
Beijing Olympic Games
First event of this scale to use RFID:
- 16 millions RFID tags used
(224) Tags usage:
- ticket anti-counterfeiting system
- food production and delivery monitoring
- subway and hotels access control
Next event, the Universal Exhibition (Shanghai 2010):
(226)
SLIDE 10 Radio Frequency IDentification
Beijing Olympic Games
Tag technology:
- 13.56 Mhz range 1-10cm;
- ISO 14443B;
- No cryptographic capabilities;
- TMC products THR1064.
Reader technology:
- CPLD centric (reconfigurable);
- Software Defined Radio;
- PDA interface.
SLIDE 11
Tag
Memory RF−interface Collision Interface ALU Authen.
SLIDE 12 RFID and security
Okay, you got us. . . crypto what ?
We don’t care !
What the hell is that ?
. . . . . . ?
SLIDE 13
Malicious traceability
Definition
An adversary should not be able to track the tag holder: impossibility to correlate the tag interactions with the context of the usage.
Alice the tag Bob the door Got you! f (k, n1, Id) n1 n1 f (k, n1, Id) (k, Id) (k, Id) f (k, n1, Id) n1
SLIDE 14
Malicious traceability
Tag architecture
Memory RF−interface Collision Interface ALU
RNG f k Id
SLIDE 15
Malicious traceability
SLIDE 16 Malicious traceability
Data analysis in forensic
E c2 ∈ F2m, m ≤ n t1, p2, Id1 F2n E t1, p1, Id1 c1 ∈ F2m, m ≤ n
Choices for E:
differential analysis
??
- strict avalanche criteria functions
??
side-channel attacks
SLIDE 17 Tonight word:
Definition
Anonymity – [. . . ] the term typically refers to a person, and
- ften means that the personal identity, or personally identifiable
information of that person is not known. More strictly, and in reference to an arbitrary element [. . . ], within a well-defined set (called the ”anonymity set”), ”anonymity” of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be ”anonymous”. WIKIPEDIA
Definition
Anonymity – we don’t put your data into the database. STIB, RATP. . .
SLIDE 18 Relay attacks
Chess player problem
- 1. d4
- 1. d4
- 1. .. Cf6
- 1. .. Cf6
Rusé ce Jean−Pierre !
SLIDE 19
Relay attacks
in RFID.
Bob the door Alice the tag Bob the door Alice the tag f (k, n1, Id) (k, Id) (k, Id) n1 n1 (k, Id) f (k, n1, Id) (k, Id)
SLIDE 20 Relay attacks
Solution
Round Trip Time ?
Problem
- BCET
- WCET
- σ ?
- reception t2
- ok if δt < σ
Verification (n1 ◦ t1)
F(n1 ◦ t1, k, Id)
SLIDE 21 Relay attacks
More headaches !
◮ freeze the time ◮ speed the time ◮ he is all-mighty !
◮ don’t dream no clock ! ◮ any computation is a potential noise for the result.
SLIDE 22 Relay attacks
3 types of attacks
- Mafia fraud: the basic attack.
- Distance fraud: the prover cheats by sending early answer.
- Terrorism fraud: the prover colludes with the attacker
without revealing its secret key. The solutions are the distance-bounding protocols.
SLIDE 23 Denial of services
DoS is important in a competition context:
- RF Jammer: secure spread spectrum;
- Collision Jammer: improved algorithms;
- ElectroMagnetic Pulse: no possible solution.
Almost unvoidable attacks:
- Important to know your enemy;
- Critical to know what can do your commpetitor to ternish
your reputation;
SLIDE 24
Ticketing applications
An access control problem
SLIDE 25
Ticketing problem
The players Don’t want to know any complex stuffs The thief The customer The steward Responsible for the customers line Don’t like to wait (short line) Hold the ticket (don’t expect anything else) The owner Designer of the system A few constraints: money, time... Collusion with the thief to increase profit Unlimited evilness Collusion with the owner Smart: through time find always all the weaknesses
SLIDE 26 Ticketing problem
The rules
?? check check collusion control collusion sell
Specific attacks on ticketing systems:
- Counterfeit
- ne for many;
- Pass-back
a few for many;
many for many;
money for money.
SLIDE 27
Counterfeit
sell 63 check 63 check 63 control counterfeit 63
SLIDE 28 Counterfeit: ticket like bills ?
. . . or can we take advantage of money anti-counterfeiting system
Paper anti-counterfeiting system:
- special paper;
- special ink;
- holography;
Hard to check !
SLIDE 29
Pass-back
t1 t2 t3 t4
SLIDE 30
Pass-Back
t1, t2, t3, t4
SLIDE 31
Pass-back
t1 t2 t3 t4
SLIDE 32
Pass-back
SLIDE 33 Pass-back
Coupon
Disavantages:
- one shot;
- not resistant to collusion;
SLIDE 34
Black market and illegal multiple sales
I am not Santa Claus !
SLIDE 35 RFID and ticketing
I have a dream of an RFID ticketing solutions that is:
- efficient;
- secure;
- cheap (no crypto on tag);
- compatible;
- simple (this is a dream);
I am free to forget:
- privacy;
- relay;
- other complex stuffs;