RFID Security and Privacy Gildas Avoine Information Security Group - - PowerPoint PPT Presentation

rfid security and privacy
SMART_READER_LITE
LIVE PREVIEW

RFID Security and Privacy Gildas Avoine Information Security Group - - PowerPoint PPT Presentation

RFID Security and Privacy Gildas Avoine Information Security Group UCL Belgium April 2011, Rennes, France Summary RFID Primer. Examples. Capabilities. Particularities. Authentication in RFID. Theory. Practical


slide-1
SLIDE 1

RFID Security and Privacy

Gildas Avoine

Information Security Group UCL Belgium April 2011, Rennes, France

slide-2
SLIDE 2

Gildas Avoine http://sites.uclouvain.be/security/ 2

Summary

RFID Primer.

Examples. Capabilities. Particularities.

Authentication in RFID.

Theory. Practical Attacks.

Relay Attacks.

Feasibility. Countermeasures: Distance Bounding Protocols.

slide-3
SLIDE 3

Gildas Avoine http://sites.uclouvain.be/security/ 3

RFID Primer

slide-4
SLIDE 4

Gildas Avoine http://sites.uclouvain.be/security/ 4

RFID Primer

Definition

“Radio frequency identification'' (RFID) means the use of

electromagnetic radiating waves or reactive field coupling in the radio frequency portion of the spectrum to communicate to or from a tag through a variety of modulation and encoding schemes to uniquely read the identity of a radio frequency tag or

  • ther data stored on it.”

[European Commission Recommendation, 12.5.2009]

slide-5
SLIDE 5

Gildas Avoine http://sites.uclouvain.be/security/ 5

Supply chain.

Track boxes, palettes, etc. Eg: EPC Global Inc.

Libraries.

Improve book borrowing

procedure and inventory. Pet identification.

Replace common identification

tattoo by electronic one.

Will become mandatory in the EU.

Source: www.dclogistics.com Source: www.rfid-library.com Source: www. flickr.com

RFID Primer

Examples: Basic RFID Applications

slide-6
SLIDE 6

Gildas Avoine http://sites.uclouvain.be/security/ 6

RFID Primer

Examples: Evolved RFID Applications

Building access control. Automobile ignition keys. Passports.

Electronic passports since 2004.

Public transportation.

  • Eg. Brussels, Boston, Paris, London.
slide-7
SLIDE 7

Gildas Avoine http://sites.uclouvain.be/security/ 7

RFID Primer

Capabilities

power frequency communication distance memory capabilities computation capabilities cost

passive active low frequency high frequency ultra-high frequency cm dm m no pwd sym crypto asym crypto UID 1 KB 40 KB 10 cents euros 50 cents

slide-8
SLIDE 8

Gildas Avoine http://sites.uclouvain.be/security/ 8

RFID Primer

Capabilities

power frequency communication distance memory capabilities computation capabilities cost

passive active low frequency high frequency ultra-high frequency cm dm m no pwd sym crypto asym crypto UID 1 KB 40 KB 10 cents euros 50 cents

Supply chain

slide-9
SLIDE 9

Gildas Avoine http://sites.uclouvain.be/security/ 9

RFID Primer

Capabilities

power frequency communication distance memory capabilities computation capabilities cost

passive active low frequency high frequency ultra-high frequency cm dm m no pwd sym crypto asym crypto UID 1 KB 40 KB 10 cents euros 50 cents

Supply chain Access control

slide-10
SLIDE 10

Gildas Avoine http://sites.uclouvain.be/security/ 10

RFID Security Specificities

Low-capabilities.

Calculation, Memory, Bandwidth. Asymmetry.

Wireless.

Easy to skim and eavesdrop.

Answer without holder’s agreement / awareness.

Easier to skim, Attack not detected.

Un-perfect security better than nothing.

slide-11
SLIDE 11

Gildas Avoine http://sites.uclouvain.be/security/ 11

Security Threat Classification

Information Leakage Authentication Denial of Service Malicious Traceability

slide-12
SLIDE 12

Gildas Avoine http://sites.uclouvain.be/security/ 12

authentication 384 privacy 356 EPC 106 hash function 106 authentication protocol 104 mutual authentication 72 smart card 69 HB 58 eavesdropping 53 IDS 53 cloning 51 AES 50 supply chain 50

RFID Security and Privacy

Keyword Occurrence (since 2002, about 500 scientific papers)

slide-13
SLIDE 13

Gildas Avoine http://sites.uclouvain.be/security/ 13

Authentication in RFID

slide-14
SLIDE 14

Gildas Avoine http://sites.uclouvain.be/security/ 14

Authentication and Impersonation

Definition (Authentication). Authentication is any process by which a system verifies the identity of a user who wishes to access it. Definition (Impersonation). Impersonation is an attach where a fake tag is authenticated as a genuine one. Examples:

Clone an access control card. Modify your mass transportation pass. Create a fake passport.

slide-15
SLIDE 15

Gildas Avoine http://sites.uclouvain.be/security/ 15

Impersonation

Authentication Protocol

Authentication can be done using:

A symmetric cipher, a keyed-hash function, a public-key cipher, a

signature scheme, or a devoted authentication protocol.

  • Example: Challenge-Response Protocol.

ISO 9798-4 defines authentication protocols based on a MAC.

We know how to design a secure authentication scheme. nR IDT , Ek ( nR , nT ) Reader Tag

slide-16
SLIDE 16

Gildas Avoine http://sites.uclouvain.be/security/ 16

Impersonation

Weaknesses

Cost of the solution.

Require lightweight algorithms (wired logic).

Implementation issues.

Both sides: readers and tags. Miss-understanding of the standards.

Architecture of the solution.

Building blocks are not enough: the whole solution must be secure.

slide-17
SLIDE 17

Gildas Avoine http://sites.uclouvain.be/security/ 17

RFID Primer

Looking Inside

Many available solutions are weak.

Source : jp.digikey.com Source : www.sirlepaper.com

slide-18
SLIDE 18

Gildas Avoine http://sites.uclouvain.be/security/ 18 Source : lirent.net

RFID Primer

Looking Inside

Many available solutions are weak.

Source : jp.digikey.com Source : www.sirlepaper.com

slide-19
SLIDE 19

Gildas Avoine http://sites.uclouvain.be/security/ 19

Examples of Weak Solutions

Navigo Pass.

Security sounds fine, personal data not protected.

Texas Instruments DST.

  • Broken. 2005.

NXP Mifare Classic.

  • Broken. 2008.
slide-20
SLIDE 20

Gildas Avoine http://sites.uclouvain.be/security/ 20

Example: Leakage from the MOBIB Card

MOBIB Extractor by G. Avoine, T. Martin, and J.-P. Szikora, 2009

slide-21
SLIDE 21

Gildas Avoine http://sites.uclouvain.be/security/ 21

Impersonation

TI: Texas Instruments. DST: Digital Signature Transponder. More than 100 million DST modules sold around the world. Car ignition key (eg. Ford) and payment cards.

slide-22
SLIDE 22

Gildas Avoine http://sites.uclouvain.be/security/ 22

Impersonation

Video: Texas Instrument DST

  • 1. Query once the car’s key (tag inside).
  • 2. Try all the possible keys k until finding the one that

correctly decipher Ek ( r ).

  • 3. Steal the car simulating the car’s key.

r Ek ( r ) Reader (k) Tag (k)

Adversary goal: retrieve the secret k in order to make a clone.

slide-23
SLIDE 23

Gildas Avoine http://sites.uclouvain.be/security/ 23

Impersonation

Attack on NXP Mifare Classic

Philips Semiconductors (NXP) introduced the Mifare commercial

denomination (1994) that includes the Mifare Classic product.

Applications: public transportation, access control, ticketing… Memory read & write access are protected by some keys. Several hundreds million Mifare Classic tags sold up to now. Several attacks in 2008, Hoepman, Garcia, de Koning Gans, et

  • al. reverse-engineered the cipher Crypto1: every Mifare Classic

tag broken in a few minutes.

slide-24
SLIDE 24

Gildas Avoine http://sites.uclouvain.be/security/ 24

Relay Attacks

slide-25
SLIDE 25

Gildas Avoine http://sites.uclouvain.be/security/ 25

Impersonation

Relay Attacks

slide-26
SLIDE 26

Gildas Avoine http://sites.uclouvain.be/security/ 26

Impersonation

Relay Attacks

slide-27
SLIDE 27

Gildas Avoine http://sites.uclouvain.be/security/ 27

Impersonation

Relay Attacks

Adv Adv

10’000 km

slide-28
SLIDE 28

Gildas Avoine http://sites.uclouvain.be/security/ 28

Reader starts a timer when sending a message.

To avoid half-opened connections.

ISO 14443 “Proximity Cards”.

Used in most secure applications. Default timer is around 4 ms. Tag can require more time, up to…

Impersonation

Relay Attacks: Timing

slide-29
SLIDE 29

Gildas Avoine http://sites.uclouvain.be/security/ 29

  • Radio link over 50 meters (G. Hancke 05).
  • With some locally-connected ACR122 (A. Laurie 09).
  • With Nokia cell phones (A. Laurie 10).
  • Over Internet (libNFC 10).

Impersonation

Relay Attacks: Feasibility

slide-30
SLIDE 30

COUNTERMEASURES

slide-31
SLIDE 31

Protocol Aims in General Framework

Definition (Authentication) An authentication is a process whereby one party is assured of the identity of a second party involved in a protocol, and that the second has actually participated (i.e. is active at, or immediately prior to, the time evidence is acquired). [Handbook of Crypto] Definition (Distance Checking) A distance checking is a process whereby one party is assured that a given property on its distance to a second party involved in a protocol is satisfied at some point in the protocol. The area where the property is satisfied is called the neighborhood

  • f the verifying party.

2

slide-32
SLIDE 32

Protocol Aims in RFID Framework

Definition (Distance Bounding) A distance bounding is a process that consists of an authentication combined with a distance-checking, where the considered property is an upper-bound on the distance between the two parties.

3

slide-33
SLIDE 33

Protocol Aims in RFID Framework

Definition (Distance Bounding) A distance bounding is a process that consists of an authentication combined with a distance-checking, where the considered property is an upper-bound on the distance between the two parties. Distance bounding does not avoid relay attacks. Distance bounding check that the distance property between the verifier and the claimed prover is verified (Proximity check).

3

slide-34
SLIDE 34

No Fraud

Adversary Reader Tag Reader Tag Adversary Reader Tag 4

slide-35
SLIDE 35

Fraud

Adversary Reader Adversary Tag Reader Tag Reader Reader Adversary Tag Reader Adversary 5

slide-36
SLIDE 36

Measuring the Distance

How can one measure the distance between reader and tag?

6

slide-37
SLIDE 37

Measuring the Distance

How can one measure the distance between reader and tag? Global Positioning System (GPS). Received Signal Strength (RSS). Round Trip Time (RTT).

6

slide-38
SLIDE 38

Distance Bounding Based on the Speed of Light

Measure the round-trip-time (RTT) of a given message.

  • Provide a bound on the distance.
  • Idea introduced by Beth and Desmedt [Crypto90].

Tag Reader Neighborhood Computation 7

slide-39
SLIDE 39

Distance Bounding Based on the Speed of Light

Measure the round-trip-time (RTT) of a given message.

  • Provide a bound on the distance.
  • Idea introduced by Beth and Desmedt [Crypto90].

Reader Neighborhood computation Accelerated Tag 7

slide-40
SLIDE 40

Distance Bounding

The verifier calculates the round trip time of a message.

  • Message needs to be authenticated.
  • Authentication is time-consuming.
  • Round trip time is noised.

8

slide-41
SLIDE 41

Simplified Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na

Na

− − − − − − − → h(K, Na) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange

9

slide-42
SLIDE 42

Simplified Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na

Na

− − − − − − − → h(K, Na) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange

What is the adversary’s success probability (relay attack)?

9

slide-43
SLIDE 43

ATTACK SCENARIOS

slide-44
SLIDE 44

Attack Scenarios

Mafia Fraud

Definition (Mafia Fraud) A mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the reader and an honest tag located outside the neighborhood.

11

slide-45
SLIDE 45

Attack Scenarios

Mafia Fraud

Definition (Mafia Fraud) A mafia fraud is an attack where an adversary defeats a distance bounding protocol using a man-in-the-middle (MITM) between the reader and an honest tag located outside the neighborhood. Mafia fraud: Desmedt, Goutier, Bengio [Crypto87]. Shamir about Fiat-Shamir protocol [Crypto86]: “I can go to a Mafia-owned store a million successive times and they still will not be able to misrepresent themselves as me.” (The NY Times, February 17, 1987, James Gleick). A.k.a., relay attack, chess grandmaster, wormhole problem, passive man-in-the-middle, middleman attack...

11

slide-46
SLIDE 46

Attack Scenarios

Distance Fraud

Definition (Terrorist Fraud) Given a two party protocol executed between Alice and Bob, a terrorist fraud is a MITM, where Alice actively helps Eve to maximize her attack success probability, without giving any advantage to Eve for future attacks. Definition (Distance Fraud) A distance Fraud is a deception whereby one entity purports to be in the neighborhood of a second one.

12

slide-47
SLIDE 47

HANCKE AND KUHN’S PROTOCOL

slide-48
SLIDE 48

Simplified Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na

Na

− − − − − − − → h(K, Na) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange

14

slide-49
SLIDE 49

Simplified Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na

Na

− − − − − − − → h(K, Na) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange

What is the adversary’s success probability (mafia fraud)?

14

slide-50
SLIDE 50

Hancke and Kuhn Protocol

Common Adversary Strategies

Pre-ask strategy. The adversary queries the prover before he starts the fast phase with the legitimate verifier.

15

slide-51
SLIDE 51

Simplified Hancke and Kuhn’s Protocol

Analysis

Question Compute the success probability in the following cases:

1 Mafia fraud, pre-ask strategy. 2 Terrorist fraud, pre-ask strategy. 3 Distance fraud.

16

slide-52
SLIDE 52

Simplified Hancke and Kuhn’s Protocol

Analysis

Question Compute the success probability in the following cases:

1 Mafia fraud, pre-ask strategy. 2 Terrorist fraud, pre-ask strategy. 3 Distance fraud.

Answer 1, 3

4

n, 1.

16

slide-53
SLIDE 53

Hancke and Kuhn’s Protocol

Description

Reader Tag (secret K) (secret K) Pick a random Na Pick a random Nb

Na

− − − − − − − →

Nb

← − − − − − − − h(K, Na, Nb) =

  • v0

= 1 1 1 1 1 v1 = 1 1 1 1 1 Start of fast bit exchange for i = 1 to n Pick Ci ∈R {0, 1} Start Clock

Ci

− − − − − − − → Ri = v0

i , if Ci = 0

v1

i , if Ci = 1

Stop Clock

Ri

← − − − − − − − Check: △ti ≤ tmax Check: correctness of Ri End of fast bit exchange

17

slide-54
SLIDE 54

Hancke and Kuhn’s Protocol

Analysis

Question Compute the success probability in the following cases:

1 Mafia fraud, pre-ask strategy. 2 Terrorist fraud, pre-ask strategy. 3 Distance fraud.

18

slide-55
SLIDE 55

Hancke and Kuhn’s Protocol

Analysis

Question Compute the success probability in the following cases:

1 Mafia fraud, pre-ask strategy. 2 Terrorist fraud, pre-ask strategy. 3 Distance fraud.

Answer 3

4

n, 1, 3

4

n.

18

slide-56
SLIDE 56

Hancke and Kuhn’s Protocol

Drawbacks

Security of the protocol depends on n.

  • On-the-fly authentication should take less than 200 ms.
  • Turn-around time does not allow a large n.
  • Security is degraded.

Security of the protocol is (3/4)n instead of (1/2)n.

19

slide-57
SLIDE 57

FUTURE OF DISTANCE BOUNDING

slide-58
SLIDE 58

Existing Protocols

Brands and Chaum (Eurocrypt 1993) Hancke and Kuhn (SecureComm 2005) Munilla, Ortiz, and Peinado (RFIDsec 2006) Reid, Neito, Tang, and Senadji (ASIACCS 2007) Singel´ ee and Preneeld (ESAS 2007) Tu and Piramuthu (EURASIP RFID Technologie 2007) Munilla and Peinado (Wireless Com. and Mobile Comp. 2008) Kim, Avoine, Koeune, Standaert, and Pereira (ICISC 2008) Nikov and Vauclair (eprint 2008) Avoine and Tchamkerten (ISC 2009) Kim and Avoine (CANS 2009) Peris-Lopez, Hernandez-Castro, et al. (arXiv.org 2009) Avoine, Floerkemeier, and Martin (Indocrypt 2009) . . .

21

slide-59
SLIDE 59

Conclusion

Limits of Distance Bounding

Using a tight timeout.

  • Timeout depends on the communication layer (standardized).
  • In a closed system, reader could refuse to increase their timeout.
  • This approach is only a short-term patch.

Which parameters can be modified?

  • What is the practical radius of the neighborhood?
  • Why sending only one bit?
  • Is it more expensive to send 1 × n bits than n × 1 bit?

No practical distance bounding available yet. Relay attacks are practicable.

22

slide-60
SLIDE 60

Gildas Avoine http://sites.uclouvain.be/security/ 30

Conclusion

slide-61
SLIDE 61

Gildas Avoine http://sites.uclouvain.be/security/ 31

Conclusion

Privacy and Security from the Outset

Because of its potential to be both ubiquitous and practically

invisible, particular attention to privacy and data protection issues is required in the deployment of RFID. Consequently, privacy and information security features should be built into RFID applications before their widespread use (principle of security and privacy by design).

[Viviane Reding, EC Recommendation, 12.5.2009]

slide-62
SLIDE 62

Gildas Avoine http://sites.uclouvain.be/security/ 32

RFID Security and Privacy

Future Formalization, formalization, and formalization. Pseudo-random generators. Public-key cryptography without microprocessor. Side channel attacks. Distance bounding. Path checking. Group authentication. Compromised readers. Privacy certification. Practical attacks.

slide-63
SLIDE 63

Gildas Avoine http://sites.uclouvain.be/security/ 33

RFID Security and Privacy

A Large Body of Literature

Publications in RFID Security and Privacy

10 20 30 40 50 60 70 80 90 100 2002 2003 2004 2005 2006 2007 2008 2009 2010 year number of publications

slide-64
SLIDE 64

Gildas Avoine http://sites.uclouvain.be/security/ 34

Conclusion

RFID Security: A Large Body of Literature http://sites.uclouvain.be/security/ gildas.avoine@uclouvain.be