Vulnerabilities in First- Generation RFID-Enabled Credit Cards - - PowerPoint PPT Presentation

vulnerabilities in first generation rfid enabled credit
SMART_READER_LITE
LIVE PREVIEW

Vulnerabilities in First- Generation RFID-Enabled Credit Cards - - PowerPoint PPT Presentation

Vulnerabilities in First- Generation RFID-Enabled Credit Cards Kevin Fu kevinfu@cs.umass.edu Berkeley TRUST Seminar Assistant Professor March 22, 2007 Department of Computer Science University of Massachusetts Amherst, USA


slide-1
SLIDE 1

Computer Science

Assistant Professor Department of Computer Science University of Massachusetts Amherst, USA www.rfid-cusp.org

Kevin Fu

kevinfu@cs.umass.edu

Vulnerabilities in First- Generation RFID-Enabled Credit Cards

Supported by NSF CNS-0627529

Berkeley TRUST Seminar March 22, 2007

slide-2
SLIDE 2

rfid-cusp.org

Computer Science

Outline of Today’s Talk(s)

  • Real World: Security in RFID Credit Cards

[“Vulnerabilities in First-Generation RFID-Enabled Credit Cards” by Heydt-Benjamin, Bailey, Fu, Juels, O'Hare; Financial Crypto 2007]

  • Ivory Tower: Security of creative RFID crypto

[“Cryptanalysis of Two Lightweight Authentication Schemes” by Defend, Fu, Juels; IEEE PerSec 2007]

slide-3
SLIDE 3

rfid-cusp.org

Computer Science

RFID Readers Everywhere

slide-4
SLIDE 4

rfid-cusp.org

Computer Science

Japan Public Transportation

Details of merchandise purchase

Current Balance

Beginning Balance

Entrance and exit date and station

slide-5
SLIDE 5
slide-6
SLIDE 6

rfid-cusp.org

Computer Science

What are RFID Credit Cards?

  • Small mobile computing devices
  • Transmit credit card information to reader over RF
  • Passive 13.56MHz RFID transponder (ISO 14443-B)
  • Read range unknown, suspected to be around 10cm to 30cm
  • “fastest acceptance of new payment technology in the history of

the industry.” [VISA; As reported in the Boston Globe, August 14th 2006]

slide-7
SLIDE 7

rfid-cusp.org

Computer Science

Purchasing with an RFID CC

COMPLEX!

  • Consumer authorizes purchase by bringing card near reader
  • Some fraud can be detected or prevented by the network
  • Charge processing networks are complex and heterogeneous
  • This talk primarily considers the security of the RF transaction
slide-8
SLIDE 8

rfid-cusp.org

Computer Science

Credit card number

What do RFID CCs Reveal?

Cardholder name Expiration date

  • One type of card uses an RF-only CC number
  • Newer cards are beginning to withhold the cardholder name
slide-9
SLIDE 9

rfid-cusp.org

Computer Science

Outline of Today’s Talk(s)

  • Real World: Security in RFID Credit Cards
  • Public perceptions
  • What vulnerabilities exist?
  • Experiments
  • Countermeasures
  • Ivory Tower: Security of creative RFID crypto
slide-10
SLIDE 10

rfid-cusp.org

Computer Science

What Vulnerabilities Exist?

  • Disclosure of personal information on credit card
  • Financial fraud, but also
  • Distrust and lost consumer confidence
  • Cross-Contamination
  • Data from RF transmission used in a different context
  • Example: A Web purchase
slide-11
SLIDE 11

rfid-cusp.org

Computer Science

  • Replay:

Data obtained over RF are played back by adversary

  • Relay:

Queries from reader relayed by adversary to credit card without Alice’s knowledge or consent

  • Many other RFID privacy vulnerabilities [JMW05]

What Vulnerabilities Exist?

slide-12
SLIDE 12

rfid-cusp.org

Computer Science

Eavesdropping

  • Equipment: Antenna, oscilloscope, laptop, grad student
  • Data disclosed before any challenge-response!
  • No authentication of reader!
slide-13
SLIDE 13

rfid-cusp.org

Computer Science

Cross-Contamination

  • Disclosed PID sufficient for financial fraud?
  • Maybe…
  • CVC absent on RF, card face, mag-stripe
  • Collection of CVC varies
  • But we bought toys with a skimmed card
  • New credit card in sealed envelope
  • Scanned with programmable reader
  • Address retrieved from phone book
slide-14
SLIDE 14

rfid-cusp.org

Computer Science

Replay: Credit Card Cloning

  • Some cards send static data w/ different transactions
  • Our device below can replay these data
  • Commercial readers accept the replay

“CS style” modulation Gumstix w/ Linux George Washington

slide-15
SLIDE 15

rfid-cusp.org

Computer Science

Replay: Transaction Counters

  • Some cards use a transaction counter that increases

with each RF transaction

  • Transaction counter creates a race condition

“1”

slide-16
SLIDE 16

rfid-cusp.org

Computer Science

Replay: Transaction Counters

  • Under some circumstances counter prevents replay

“1” “2” “Alarm!” “Approved”

slide-17
SLIDE 17

rfid-cusp.org

Computer Science

Replay: Transaction Counters

  • Some times the counter will not prevent replay

“1” “2” “Approved” “Approved”

slide-18
SLIDE 18

rfid-cusp.org

Computer Science

Replay: Challenge-Response

  • Some cards use a challenge-response protocol
  • Details of algorithm unknown
  • Can protect against replay if back-end network is

configured correctly

  • Challenge-response not used for protecting PID
slide-19
SLIDE 19

rfid-cusp.org

Computer Science

Countermeasures

  • Recent cards omit cardholder name
  • Caution: This lowers the bar on other attacks
  • The venerable Faraday cage

– Does not protect during use

???

slide-20
SLIDE 20

rfid-cusp.org

Computer Science

Countermeasures

  • Better use of cryptography
  • Some current cards may use

cryptography

  • All we have seen transmit credit card

data in the clear

  • Smarter devices [Chaum 85]
  • Easier to assure user consent
  • More resources for cryptographic

protocols

slide-21
SLIDE 21

rfid-cusp.org

Computer Science

How to disable an RFID CC

slide-22
SLIDE 22

rfid-cusp.org

Computer Science

=

Wireless threat model Wired threat model

slide-23
SLIDE 23

rfid-cusp.org

Computer Science

Summary of RFID CCs

  • More convenient? (debatable)
  • Good fraud control? (maybe)
  • Consumer privacy? (not yet)
slide-24
SLIDE 24

rfid-cusp.org

Computer Science

How to improve privacy

  • Consumers need

✓Justified confidence

  • Not just “security theater” marketing
  • Technology should be open to public scrutiny
  • RFID CCs use proprietary protocols

✓Ex: Secure Web sites use public protocols

slide-25
SLIDE 25

rfid-cusp.org

Computer Science

Outline of Today’s Talk(s)

  • Real World: Security in RFID Credit Cards
  • Ivory Tower: Security of creative RFID crypto
  • Protocol to authenticate a low-cost tag
  • Crypto being proposed without sufficient

analysis

slide-26
SLIDE 26

rfid-cusp.org

Computer Science

Low Cost vs. Higher Cost

Low Cost Higher Cost Storage Few 100 bits Few kB Computational Capabilities XOR, simple

  • perations

RSA, AES, Triple DES Cost Few cents Few dollars

slide-27
SLIDE 27

rfid-cusp.org

Computer Science

Vajda and Buttyán Protocol 1

  • Challenge/Response Protocol
  • Authenticates tag to reader
  • Evolves shared secret with XOR operations
  • Tag sends reader a function of evolving secret

to authenticate

  • Think PRNG

[“Lightweight Authentication Protocols for Low-Cost RFID Tags” by I. Vajda and L.

  • Buttyan. In UBICOMP, 2003.]
slide-28
SLIDE 28

rfid-cusp.org

Computer Science

Vajda and Buttyán Protocol 1

  • 3. Tag Computes
  • 4. Tag Sends
  • 1. Reader Computes
  • 2. Reader Sends
  • 5. Reader Verifies

response from tag

slide-29
SLIDE 29

rfid-cusp.org

Computer Science

Key Repetition

  • Average 68 transactions until 128-bit key repeats
  • Average cycle length is 2 keys (the head of \rho)
slide-30
SLIDE 30

rfid-cusp.org

Computer Science

Implementation Results

  • With 128-bit key length and 1,000 trials with 10,000 sessions/trial
  • After an average of 68 keys, the session key repeats
  • Average: 68.7%, cycle period = 2, i.e. k(i)=k(i-2)
  • Minimum: 31.9%, cycle period = 1
  • Maximum: 0.1%, cycle period = 36
slide-31
SLIDE 31

rfid-cusp.org

Computer Science

Implications of Repeated Keys Attack

  • A passive eavesdropper can impersonate the tag

after an average of:

  • 70 transactions if listening from start
  • 3 transactions if listening after 68th transaction
  • Theoretical maximum before cycle:

16!×2 = 4.18455798 ×1013 transactions

  • But empirical measurement = 68
slide-32
SLIDE 32

rfid-cusp.org

Computer Science

Conclusions on RFID S&P

  • Real World: RFID credit cards
  • Disclose personal information
  • Vulnerable to replay and relay
  • Threat model not understood by industry
  • Ivory Tower: RFID crypto protocols
  • There’s a lot of squishy RFID crypto out there
  • Protocols failing statistical tests will never be

cryptographically secure

slide-33
SLIDE 33

rfid-cusp.org

Computer Science

RFID CC in Fiction