RFID Security and Privacy Part 2: security example.

Slides:



Advertisements
Similar presentations
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Advertisements

1 An Ultra-lightweight Authentication Protocol in RFID Speaker: 魏家惠.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
RFID Security and Privacy. RFID Radio Frequency IDentification Warning: "RFID tag" can mean a lot of things.
Sri Lanka Institute of Information Technology
Analysis of Direct Anonymous Attestation (DAA) Sudip Regmi Ilya Pirkin.
CS457 – Introduction to Information Systems Security Cryptography 1b Elias Athanasopoulos
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
Serverless Search and Authentication Protocols for RFID Chiu C. Tan, Bo Sheng and Qun Li Department of Computer Science College of William and Mary.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
Lecture 40 CSE 331 Dec 11, Announcements Solutions to HW 10 and graded HW 9 at end of the lecture Review session on Monday: see blog for details.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Quantum Key Distribution Yet another method of generating a key.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
YA-TRAP: Yet Another Trivial RFID Authentication Protocol Gene Tsudik International Conference on Pervasive Computing and Communications, PerCom 2006.
RFID Cardinality Estimation with Blocker Tags
1 Cryptographically Strong Pseudorandom Functions and Their Applications 陳昱升 碩士學位論文 中興大學 資訊科學系 2006 年 6 月.
R R FID Authentication : M inimizing Tag Computation CHES2006 Rump Session, Yokohama. Japan Ph.D. Jin Kwak Kyushu University, JAPAN
Persistent Security for RFID Mike Burmester & Breno de Medeiros RFIDSec’07.
Lecture 39: Review Session #1 Reminders –Final exam, Thursday 3:10pm Sloan 150 –Course evaluation (Blue Course Evaluation) Access through.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
- 1 - Secure and Serverless RFID Authentication and Search Protocols Chiu C. Tan, Bo Sheng, and Qun Li IEEE Transactions on Wireless Communication APRIL.
Cryptanalysis of Two Dynamic ID-based Authentication
RFID Security without Extensive Cryptography Sindhu Karthikeyan Mikhail Nesterenko Kent State University SASN November 07, 2005.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
Using ISO tags for Authentication Eddie LaCost Embedded RF.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Application of Data Compression to the MIL-STD-1553 Data Bus Scholar’s Day Feb. 1, 2008 By Bernard Lam.
EPCglobal Network Security: Research Challenges and Solutions Yingjiu Li Assistant Professor School of Information Systems Singapore Management University.
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch. Information Science & Electrical Engineering,
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Attacks and Improvements to an RFID Mutual Authentication Protocol and its Extensions Shaoying Cai 1 Yingjiu Li 1 Tieyan Li 2 Robert H. Deng 1 1 Singapore.
Giuseppe Bianchi Warm-up example 1 found on a real paper! Warm-up example 1 found on a real paper!
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
ASIACCS 2007 Protecting RFID Communications in Supply Chains Yingjiu Li & Xuhua Ding School of Information Systems Singapore Management University.
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
On The Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup Presented By Professor LI Yingjiu.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
HACNet Simulation-based Validation of Security Protocols Vinay Venkataraghavan Advisors: S.Nair, P.-M. Seidel HACNet Lab Computer Science and Engineering.
Hoda Jannati School of Computer Science
RFID SECURITY.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
RFID Paper presentation The Security of EPC Gen2 Compliant RFID Protocols Source : Applied Cryptography and Network Security, VOL. 5037, 2008, pp
OSPF WG Security Extensions for OSPFv2 when using Manual Keying Manav Bhatia, Alcatel-Lucent Sam Hartman, Huawei Dacheng Zhang, Huawei IETF 80, Prague.
Meeting Reports  A new delegation-based authentication protocol for use in portable communication systems IEEE Transactions on Wireless Communications,
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
Authors: Hung-Yu, Chi-Sung Laih
Zahra Ahmadian Recursive Linear and Differential Cryptanalysis of Ultra-lightweight Authentication Protocols Zahra Ahmadian
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
Revisting Unpredictability-Based RFID Privacy Models
Amar B. Patel , Shushan Zhao
Randomized PRF Tree Walking Algorithm for Secure RFID
An Improved Novel Key Management Protocol for RFID Systems
Presentation transcript:

RFID Security and Privacy Part 2: security example

Zoom in: Authentication Should be mutual –reader should recognise tags –tag should recognise readers EMAP: Efficient Mutual Authentication Protocol for Low-cost RFID Tags. –proposed by P. Peris-Lopez, J. C. Hernandez- Castro, J. M. Estevez-Tapiador, and A. Ribagorda, November 2006.

EMAP model IDS 1 Key 1 …… IDS n Key n Updated after each session Identification ID (m bits) Key (4m bits) = K 1 ||K 2 ||K 3 ||K 4 Pseudonym IDS (m bits) || concatenation DB

EMAP protocol Reader Tag hello IDS Database IDS K 1 ||K 2 ||K 3 ||K 4 Random n 1,n 2 A||B||C A = IDS  K 1  n 1 B = (IDS  K 2 )  n 1 C = IDS  K 3  n 2 Check A  B. Infer n 1,n 2 D||E D = IDS  K 4  n 2 E = (IDS  n 1  n 2 )  ID  K 1  K 2  K 3  K 4 Update IDS and K 1...K 4 Check D. Update IDS and K 1...K 4

Update … IDS’ = IDS  n 2  K 1. K 1 ’ = K 1  n 2  (ID 1/2 || F(K 4 ) || F(K 3 )) –ID 1/2 – first m/2 bits of ID –F(X) – parity function Divide X in m/4 4-bit blocks Compute a parity bit for each block K 2 ’ = K 2  n 2  (F(K 1 ) || F(K 4 ) || ID 2/2 ) K 3 ’ = K 3  n 1  (ID 1/2 || F(K 4 ) || F(K 2 )) K 4 ’ = K 4  n 1  (F(K 3 ) || F(K 1 ) || ID 2/2 )

EMAP is efficient Tag memory: –Rewritable memory: 4m bits (keys) + m (IDS) –ROM: m bits (ID) –Very reasonable for m = 96… Operations: –tag does cheap processing: , , , || –random number generation – reader only! –no expensive operations (e.g hash function, multiplication)

Further advantages of EMAP tag anonymity –the same ID but different messages! forward security –knowledge of K 1...K 4 does not reveal updated key

Li and Deng: EMAP is vulnerable "Vulnerability Analysis of EMAP- An Efficient RFID Mutual Authentication Protocol " April 2007

Attack 1: Desynchronisation Tag hello IDS A||B||C' infer n 2 ' instead of n 2 wrong D'||E' Update IDS and the key Reader random n 1,n 2 Update IDS and the key Intruder hello IDS j s.t. IDS(j) = 0 A||B||C Toggle j in C D||E Toggle j in D' and E' n 2 ' = n 2  e j

expected: D = (IDS  K 4 )  n 2 received: ( (IDS  K 4 )  n 2 ’ )  e j –i.e. (IDS  K 4 )  n 2  e j  e j = D Attack 1: Reader accepts D

expected: E = (IDS  n 1  n 2 )  ID  K 1  K 2  K 3  K 4 received: (IDS  n 1  n 2 ’)  ID  K 1  K 2  K 3  K 4  e j compare: IDS  n 1  n 2 vs. (IDS  n 1  n 2 ’)  e j –look at j th bit: IDS(j) = 0  (IDS  n 1  n 2 )(j) = n 2 (j) Attack 1: received E is correct

Attack 1: Tag update IDS’ = IDS  n 2  K 1. K 1 ’ = K 1  n 2  (ID 1/2 || F(K 4 ) || F(K 3 )) K 2 ’ = K 2  n 2  (F(K 1 ) || F(K 4 ) || ID 2/2 ) K 3 ’ = K 3  n 1  (ID 1/2 || F(K 4 ) || F(K 2 )) K 4 ’ = K 4  n 1  (F(K 3 ) || F(K 1 ) || ID 2/2 )  Desynchronisation on IDS, K 1 and K 2  You can also attack n 1 rather than n 2 or both (see the paper)

What kind of problem has been demonstrated? A.Ethical issues B.Illicit tracking of the tags C.Skimming D.Tag cloning E.Cross-contamination F.Tag killing G.Invasive attack / side channel attack H.Jamming

Countermeasure: Error-correcting codes? Can report/correct a number of 1-0 errors –can detect the attack as presented above BUT –the attack can be generalised to replace (n 1,n 2 ) by (n 1 ’,n 2 ’) toggling multiple bits simultaneously… –… and fooling the error-correcting codes!

Murphy’s Law Just when you think things cannot get any worse, they will.

Attack 2 Full disclosure attack Run EMAP (a number of times) and discover ID and all the keys! Want to know more? Read the paper