HiTag2 RTLab 이재근.

Slides:



Advertisements
Similar presentations
Smart Tracking: Usage of IPv6 in RFID System for Global Mobility
Advertisements

Gone in 360 Seconds: Hijacking with Hitag2
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
IWD2243 Wireless & Mobile Security
Radio-Frequency Identification MBUS 626 IT Seminar Group 5 Kevin Frei Stephen Grant.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
Chapter 2 Mobile Technologies Lecture 3 By :Jigar M Pandya
RFID Presented by Brian Ng Chun Heng The Usage of RFID in Semiconductor Automation.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Security Analysis of a Cryptographically-Enabled RFID Device Authors: Steve Bono Matthew Green Adam Stubblefield Adam Stubblefield Ari Juels Ari Juels.
Wireless# Guide to Wireless Communications
RFid Technology TELE 480 Presentation. What is RFid? RFid is an ADC technology that uses radio- frequency waves to transfer data between a reader and.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Measuring of the time consumption of the WLAN’s security functions Jaroslav Kadlec, Radek Kuchta, Radimír Vrba Dept. of Microelectronics.
Radio Frequency Identification
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Container e-seal implementation at Custom. Problems: Although cost effective – very limited function easy to be cut and replaced, can not really stop.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Radio Frequency Identification (RFID)
RFID Source Tracking Tim Durkin PPD. Legislation The Ionising Radiations Regulations act Applicable to industry, research, military, civil service.
©Contrinex JDC PPT_HF_RWMTAGCommands HF RWM and TAG Commands J.-D. Chatelain HF RWM Commands HF TAG Commands.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
TRF79xx/MSP430/Stellaris Mifare Direct Mode 0 Training Texas Instruments NFC/RFID Apps Team 12/2011 (updated 12/2012) (added slides 13, 21-24)
Flavio Garcia University of Birmingham
Prof. Alfred J Bird, Ph.D., NBCT Office – Science 3rd floor – S Office Hours – Monday and Thursday.
1. 2 Technology The Evolution Of 3 What is RFID Technology? Radio Frequency Identification - A technology that uses electronic tags placed on objects,
COMPARISON I CODE SLI versus I CODE1. 2 Semiconductors Content  Overview, Block Diagram and System Configuration  Memory Organisation (Write Access.
RADIO FREQUENCY IDENTIFICATION TECHNOLOGY. By Twesige Richard.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
3506-D WEST LAKE CENTER DRIVE,
Sensing multiple passive tags simultaneously
GSM SECURITY AND ENCRYPTION
Radio Frequency Identification (RFID)
WEP & WPA Mandy Kershishnik.
RFID Source Tracking Tim Durkin PPD.
LF Wakeup Receiver.
Zahra Ahmadian Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian
Presenter’s Name: Min-kai Hsiao EMU PGR Conference 5th July 2012
RFID - EN Transponders (TAG) Transponders (TAG) J.-D. Chatelain.
یا حقّ.
RFID - EN Transponders (TAG) Transponders (TAG) J.-D. Chatelain.
Chapter 16 - Towards Secure and Privacy-enhanced RFID Systems
IEEE i Dohwan Kim.
Protection codes and Comparison J.-D. Chatelain LF - EN
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
PREPARED BY: RIDDHI PATEL (09CE085)
Radio Frequency Identification
Security Implementation Using Present-Puffin Protocol
ONLINE SECURE DATA SERVICE
2N Access Unit 2.0 Multi-technology access control readers.
Cryptography Lecture 12.
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
An Overview of Security Issues in Sensor Network
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
LM 7. Cellular Network Security
RFID based attendance system using GSM BY MAMATA YADAV.
Presentation transcript:

HiTag2 RTLab 이재근

Contents Before Starting About HiTag2 Key Features Functionality Conclusion

Before Starting Immobilizer - electronic device fitted to an automobile which prevents the engine from running unless the correct key is present. Passive RFID Tag (125kHz) Introduced in the ‘90s Prevents hot-wiring Mandatory

HiTag2 –NXP Semiconductors HITAG is low-frequency (LF) RFID Tag. harsh environment applications, where highly reliabile, robust and safe data transmission is required. Livestock tracking, Gas cylinder logistics, Factory Automation, Loyalty cards, Vehicle Immobilizer transponder

Usage of HiTag2

Vehicle Immobilizer with HiTag2

Key Features NXP Semiconductors – 1996 Operating at 125kHz Proximity(20cm) and long range(1m) Non-volatile memory(EEPROM) of 256bits. (8page, 4bytes) Long-term proven and reliable technology (10 years non-volatile) Two coding schemes for read – Biphase, Manchester Mutual authentication function Stream cipher with 48-bit key

Functionality

3 operation mode Public mode Password mode Crypto mode contents of the user data pages are simply broadcast by the transponder Password mode reader and transponder password authentication Crypto mode mutual authentication of reader and transponder by means of a 48-bit shared key, encrypted using a proprietary stream cipher. Used in car Immobilizer transponder

Memory Map 256bits of non-volatile memory(EEPROM) Organized in 8 blocks of 4 bytes each

Command State – halted, active n0~n2 -> Block register Command with redundancy The number of msg -> 10+5r bits

Scenario Challenge – Response (Reader – Transponder) Using stream cipher Reader sends command to transponder and then transponder responds. After finish authentication, It starts engine.

Hitag2 stream cipher In crypto mode, the communication is encrypted with HiTag2 stream cipher 48-bit LFSR(Linear feedback shift register) Non-linear filter function f

Conclusion Low consumption, highly reliabile, more secure Suitable for automobile Immobilizer

Thank you