Security Analysis of a Cryptographically-Enabled RFID Device Authors: Steve Bono Matthew Green Adam Stubblefield Adam Stubblefield Ari Juels Ari Juels.

Slides:



Advertisements
Similar presentations
Ryan Kagin University of Illinois Fall 2007
Advertisements

Made Harta Dwijaksara Park, Yi Jae
Gone in 360 Seconds: Hijacking with Hitag2
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Lecture 6 User Authentication (cont)
Technical Issues Regarding Near Field Communication Group 16 Tyler Swofford Matthew Kotan.
Differential Power Analysis of Smartcards How secure is your private information? Author: Ryan Junee Supervisor: Matt Barrie.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
1 RFID technology for automatic payment Performed by: Teb David Krelshtein Leonid Supervisor: Michael Itzkovitz. המעבדה למערכות ספרתיות מהירות High speed.
Security in RFID Presented By… NetSecurity-Spring07
Steve Bono1 Matthew Green1 Adam Stubblefield1 Avi Rubin1
Risk of Using RFID chips in Passports Oscar Mendez.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
Cycling Timing System SDP /10/03 Patrick Bell Emilio Gaudette Eric Johnson Advisor: Ramakrishna Janaswamy.
RFID Devices and Cryptography Analysis of the DST40
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Wireless Data Acquisition for SAE Car Project by: J.P. Haberkorn & Jon Trainor Advised by: Mr. Steven Gutschlag.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum & Avishai Wool 15 th Usenix Security Symposium,2006 Kishore Padma Raju.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
IWD2243 Wireless & Mobile Security
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Chapter 12 Designing the Inputs and User Interface.
Neighborhood Watch: Security and Privacy Analysis of Automatic Meter Reading Systems Ishtiaq Rouf, Hossen Mustafa Rob Miller Marco Grutese Presented By.
ANTI THEFT PROTECTION SYSTEMS IMMOBILISER LECTURER NAME: MR
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Using ISO tags for Authentication Eddie LaCost Embedded RF.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
8 Channel Fiber Optically Linked Data Acquisition System for Booster Modulators Tsatsu Nyamadi Norfolk State University Supervisor Rene Padilla Fermilab.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Week #6: Discussion results NFC technology and its components Group #33 Group member: Tianhao Han Ximeng Sun(Susie) Xing Cao(Star) Zhuoran Yang.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Practical Attacks on a Proximity Card Jonathan Westhues June
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels, Ronald Rivest, and Michael Szydlo ACM CCS, October 2003 Presented by Himanshu.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum & Avishai Wool 15 th Usenix Security Symposium, 2006 * Presented by Justin Miller.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Azam Supervisor : Prof. Raj Jain
COMPUTER SCIENCE Computer science (CS) is The systematic study of algorithmic.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
1. 2 Technology The Evolution Of 3 What is RFID Technology? Radio Frequency Identification - A technology that uses electronic tags placed on objects,
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Radio frequency identification (RFID) Opportunities for mobile telecommunication services ______________ ______________.
DALCON RFID IMPROVEMENT ECE 599, SPRING 2011 Brad Gasior, ECE Mike Fradkin, ECE Richard Young, ECE Sean Rinehart, ECE.
Designing the Inputs and User Interface
HiTag2 RTLab 이재근.
Overview on Hardware Security
Radio Frequency Identification (RFID)
By Theodora Kontogianni
Radio Frequency Identification
Security Implementation Using Present-Puffin Protocol
Selective Blocking of RFID Tags for Consumer Privacy
Mobile Computing Lecture Materials By Bintang Eka Putera.
♪ Embedded System Design: Synthesizing Music Using Programmable Logic
Presentation transcript:

Security Analysis of a Cryptographically-Enabled RFID Device Authors: Steve Bono Matthew Green Adam Stubblefield Adam Stubblefield Ari Juels Ari Juels Avi Rubin Michael Szydlo Avi Rubin Michael Szydlo Publisher: Usenix Security Symposium 2005 Presented by: Chowdhury, Abu Rahat Chowdhury, Abu Rahat

Today’s Outline The Authors and the Main Theme Recap, DST & Objective Attack Range, Scenarios & three step Process the authors used Reverse Engineering Key Cracking Simulation Comments.

Adam Stubblefield Assistant Research Professor Johns Hopkins University Steve Bono Grad Student/ Musician ????? Johns Hopkins University Matthew D. Green PhD Student - Johns Hopkins University The Authors Dr. Ari Juels Chief Scientist Director, RSA Laboratories Michael Szydlo Senior Software Developer. Akamai, Cambridge Aviel D. Rubin Professor Johns Hopkins University

The Main Theme This paper describes the success in defeating the security of an RFID device known as a Digital Signature Transponder (DST) which is produced by Texas Instrument. The paper concludes that the cryptographic protection afforded by the DST device is relatively weak.

The Authors – Headlined Students crack the Code

Today’s Outline The Authors and the Main Theme Recap, DST & ObjectiveRecap, DST & Objective Attack Range, Scenarios & Three step Process the authors used Reverse Engineering Key Cracking Simulation Comments.

Recap RFID Various technologies are used to track and automatically ID people, products, and other objects – Barcodes – Optical Character Recognition (OCR) – Biometrics Voice recognition and ID systems Voice recognition and ID systems Fingerprint ID systems Fingerprint ID systems – Smart cards – Memory cards – Microprocessor cards Tracking Technologies and Automatic ID Systems

RFID: What is it ? RFID combines many of the features of several of these technologies – Like barcodes, RFID is used to identify and track objects – RFID also can be used like smart cards, memory card, and microprocessor cards to store information and provide interactive data processing

Current Technology

Market & Application Key Industry Drivers Leading Us Toward RFID Industrial Products Logistics/ Trans. Retail Products Retail Products Consumer Products Homeland Security Other Service

Review DST Sophisticated RFID devices can offer cryptographic functionality Digital Signature Transponder (DST) is such a device Manufactured by Texas Instruments

Application of DST Vehicle Immobilizers 150 million immobilizer keys use RFID150 million immobilizer keys use RFID Older keys use fixed-code transponders with no cryptographic securityOlder keys use fixed-code transponders with no cryptographic security Newer model use DSTNewer model use DST Electronic Payment Exxon-Mobil SpeedPass systemExxon-Mobil SpeedPass system Seven million cryptographically-enabled keychain tags accepted at 10k locations worldwideSeven million cryptographically-enabled keychain tags accepted at 10k locations worldwide

Characteristics of a DST DST emits a 24-bit, factory set ID DST emits a 24-bit, factory set ID Then authentication process starts Then authentication process starts Reader sends a 40-bit challenge Reader sends a 40-bit challenge Small microchip and antenna coil with no onboard power source Contains a secret 40-bit cryptographic key that is field- programmable via RF command Interaction with a reader:

Objective Several attacking steps were accomplished using inexpensive off-the- shelf equipment, and with minimal RF expertise. Manufactured by Texas Instruments, DST (and variant) devices help secure millions of SpeedPass payment transponders and automobile ignition keys.

Questions that the paper answers How to stage the Attack? (Details) What resources are needed to stage such an Attack? (Hardware/software/network) How serious is this threat? What are the counter measures ? Why was the attack possible? Is Texas Instruments Listening?

The Big Picture

Source : Pagey

Today’s Outline The Authors and the Main ThemeThe Authors and the Main Theme Recap, DST & ObjectiveRecap, DST & Objective Attack Range, Scenarios & Three step Process the authors usedAttack Range, Scenarios & Three step Process the authors used Reverse Engineering Key Cracking Simulation Comments.Comments.

Effective Attack Range DSTs are designed for short range scanning, only few centimeters DSTs can respond to as many as 8 queries/sec Active scanning –Attacker brings her own reader within scanning range of the victim –Permits a chosen-challenge attack Passive eavesdropping –Eavesdrop on the communication between the victim and a legitimate reader

Example Attack Scenarios Auto theft via eavesdroppingAuto theft via eavesdropping –Own a van with eavesdropping equipment –Park near victim’s car and wait to capture key to reader transmissions –Make a key based on data collected Auto theft via active attackAuto theft via active attack –Suborn/bribe a valet at a parking facility to scan immobilizer keys while parking their cars SpeedPass theft via active attackSpeedPass theft via active attack –Carry a reader and a short-range antenna and scan nearby passengers in a subway

Attack process Reverse engineering –Experimental observation of responses output by the device –Aim was to get a schematic if the block cipher used in the challenge-response protocol Key cracking –Recover a key in under an hour Simulation –Given the key, a simulator for the RF output was constructed so as to spoof readers

Reverse Engineering Where to start? –Can purchase TI software (but license agreements issue) –Only Information – rough schematic by Dr. Ulrich Kaiser Black-box testing (to uncover the DST technique) –With a TI 2000 LF RFID kit –Remember, DST is field-programmable!

The Rough Schematic

Reverse Engineering They observed the logical output of the DST by specifying varying inputs and predicted output of the hardware circuit TI has not published their algorithm or Block Diagram, citing “ security by obscurity”. The authors’ aim was to figure out the cipher used by the DST by reverse engineering under constraint of minimum resource requirement. (Software packages were not used due to copyright issues).

Such reverse engineering efforts have been successfully attempted in the past. For e.g. Bunny Huang Reverse engineered a XBOX to allow it to run Linux. With the help of block DST block Diagram published in the Dr Kaisers publication and after much trial and error effort the authors were able to extract all the required information. Reverse Engineering

Key Cracking The authors compiled a hardware circuit to crack the key (40 Bit key). A single circuit was able to crack the 40 bit key in under 21 hours. To speed up search (under 1 hour for realistic scenarios) the authors assembled 16 such circuits in parallel(<3500$).

Simulation

Conclusion It describe the success of defeating the security of an RFID device The authors hope that future cryptographic RFID system designers will embrace a critical lesson preached by the scientific community

Today’s Outline The Authors and the Main Theme Recap, DST & Objective Attack Range, Scenarios & Three step Process the authors used Reverse Engineering Key Cracking Simulation CommentsComments

Strengths Exploits a realistic weakness in a production system. (Texas Instruments) They make their results available to TI. They actually stage on attack on “SpeedPass” System.

Weaknesses The authors probably had enough working knowledge of a cipher implementation to decipher the structure of the hardware A Thief should have enough technical knowledge to register such an attack, hence current 40 bit key Immobilizers still act as deterrent

Suggestion Adequate key-length of the underlying DST40 cipher At the time of publication, TI had plans to ship DST with 128 bit keys Can we still register an successful attack with this change?

Reference & Back up Slide

References Security Analysis of a Cryptographically-Enabled RFID Device – Usenix Security '05 Paper Automotive immobilizer anti-theft systems experience rapid growth in 1999, 1 June Texas Instruments Press Release. Available at releases/ 90s/rel shtml. Figure by Dr. Ulrich Kaiser, Texas Instruments Deutschland Google, Wikipedia,

Extra: The full DST protocol Reader transmits a challenge to the transponder consisting of a 8-bit opcode and 40-bit challenge The transponder encrypts the challenge using the secret 40-bit key it shares with the reader The transponder replies to the reader with its 24- bit serial number, the 24 least significant bits of encryption’s result and a 16-bit CRC –16-bit reverse CRC-CCITT initialized with a secret 16-bit value

Extra: Simulating a DST device PC equipped with a DAC board (digital-to-analog converter) Input and output of DAC board connected to an antenna tuned at 134 KHz Steps: –Analyze the A/D conversions received by the DAC board –Decode the AM signal containing the challenge sent from the reader –Perform an encryption of this challenge using the recovered secret DST key –Code the FM-FSK signal representing the correct response –Output this FM-FSK signal to the DAC board

Extra: Immobilizer

Thank You