Using ISO 15693 tags for Authentication Eddie LaCost Embedded RF.

Slides:



Advertisements
Similar presentations
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Advertisements

Authentication Applications Kerberos And X.509. Kerberos Motivation –Secure against eavesdropping –Reliable – distributed architecture –Transparent –
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13
DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 DIGITAL SIGNATURES and AUTHENTICATION PROTOCOLS - Chapter 13 Digital Signatures Authentication.
Lecture 6 User Authentication (cont)
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Physical Unclonable Functions and Applications
Software Certification and Attestation Rajat Moona Director General, C-DAC.
A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme Divyan M. Konidala, Zeen Kim, Kwangjo Kim {divyan, zeenkim, International.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Embedded Wireless Sensors Tony Arous Vincent Yu. Recap  RFID– Radio Frequency Identification  Sensors help to easily keep track of various information.
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
RFID Security and Privacy Part 2: security example.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daniel W. Engels.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Final Project Review Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root.
CMSC 414 Computer and Network Security Lecture 14 Jonathan Katz.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
E*Tag ® RFID System e*Tag ® Host Preview. What is e*Tag ® Host? A graphic user interface designed to demonstrate the commands and responses available.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
Authentication Approaches over Internet Jia Li
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Practices in Security Bruhadeshwar Bezawada. Key Management Set of techniques and procedures supporting the establishment and maintenance of keying relationships.
Hospital Automation using RFID Technology University of Colorado at Colorado Springs College of Engineering & Applied Science Gustavo Florentino.
10. Key Management. Contents Key Management  Public-key distribution  Secret-key distribution via public-key cryptography.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Manipulating data Data management: validation and verification.
Primitive Operations. Communication Operations –Reader to tag Read Write –Tag to Tag Read Write Hash and Encryption Operations –Hash: MD5, Sha-1, Sha-256,
Practical Attacks on a Proximity Card Jonathan Westhues June
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Broken Authentication & Session Management. What is it ? Bad implementation of authentication and session management. If an attacker can get your session.
Shanti Bramhacharya and Nick McCarty. This paper deals with the vulnerability of RFIDs A Radio Frequency Identifier or RFID is a small device used to.
Lecture 2: Introduction to Cryptography
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Database Management Systems (DBMS)
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Computer Networks Volume: 44, Issue: 2, February.
Potential vulnerabilities of IPsec-based VPN
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
Physical Database Design Purpose- translate the logical description of data into the technical specifications for storing and retrieving data Goal - create.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
©Contrinex JDC PPT_HF_RWMTAGCommands HF RWM and TAG Commands J.-D. Chatelain HF RWM Commands HF TAG Commands.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Information Systems Design and Development Security Precautions Computing Science.
COMPARISON I CODE SLI versus I CODE1. 2 Semiconductors Content  Overview, Block Diagram and System Configuration  Memory Organisation (Write Access.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
HiTag2 RTLab 이재근.
Cryptographic Hash Function
NET 311 Information Security
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
Presentation transcript:

Using ISO tags for Authentication Eddie LaCost Embedded RF

Authenticated RFID Model Signature is generated using hash of tag UID and private key. This signature is programmed and locked to the tag during manufacturing. Reader must also know private key. To authenticate tag, reader will first read the UID and all memory blocks of the tag. Reader will hash the UID with the secret key to generate the signature and compare to the signature of the tag. HASH Suggestion: SHA1 (160bit) Time for Authentication (28.8 ms) MSP430 UID HASH Secret KeySignature TAG Reader UID HASH Secret Key Tag Signature If equal Authenticate

Authentication Time UID Inventory = 6mS, Read Single Block x5=22.8mS. Total time of 28.8mS Perform SHA1 Hash in Reader as soon as UID from Tag is read. It would run in parallel to reading out Hash from Tag. Estimated time for HASH operation in 1ms

Advantages Security: proposed scheme offers a certain level of security using Private Key Authentication compared to simple UID verification Memory Saving: With Hash function technique, the Reader needs to know the Private Key only and there is no need to store UID of every Tag in the reader Authentication time in ms – very fast and suitable for application Small form factor of tags may make counterfeit tags difficult Extra “road block to counterfeiting” available using custom commands (next slide)

“Road blocks to Counterfeiting” Tag-it HF-I Pro offers “write block with password” command. Password is 32 bits long. Tag must be programmed & locked with password and Reader must also know password Using “Inventory with AFI”. If correct AFI(application family identifier) is not written to the tag, it will not respond to the readers “inventory” command. This is an 8 bit block. Can be locked. Using DSFID(data storage field ID) block. DSFID is not a part of the main user memory blocks. Using this memory to write some extra data could deter cloning as this field may not always be checked. This is an 8 bit block.

Vulnerabilities Data is not encrypted over the air - deemed low risk of exposure. Unless used UID are checked against a database for duplicates & follow up revocation, counterfeited tags could still be validated. Public key would not provide higher level of security for anti-counterfeiting. Vulnerabilities for exposure of information on the Tag and scheme to access a database for comparison and revocation remain weak points in both public and private key.

TI IC & Software Offerings In addition to Tag, Reader and MSP430 solutions, TI can provide optimized SHA1 code