A Note on the Relay Attacks on e-passports
|
|
|
- Esmond Clark
- 9 years ago
- Views:
Transcription
1 A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University in Prague, Sokolovská 83, Prague 8, Czech Republic, 2 ebanka, a.s., Na Příkopě 19, Prague 1, Czech Republic Abstract. The threat of relay attacks on authentication protocols is often well recognized, especially for contactless applications like RFID chips. It is, therefore, a bit surprising to meet an implementation that actually encourages rather than eliminates these attacks. We present our experimental observations concerning Czech e-passports. These show clearly an inherent weakness rooted in lower layers of ISO As the behavior is unavoidable, it induces a question on whether the e- passport should not have used a different communication protocol or authentication scheme. Keywords : RFID, e-passport, relay attack Introduction Electronic passports based on a contactless proximity coupling smartcard technology (in short and a bit inaccurately called as RFID chips) according to ICAO standards [1] seem to be on an unstoppable rise. Long story short [2], these machine readable travel documents are equipped with an RF chip that stores a personal data of their owner. Access to this data shall be (at least in European Union countries) protected via a basic access control (BAC) mechanism to prevent their accidental skimming. The data are also digitally signed by an issuing authority to prevent their unauthorized change. This, of course, does not prevent copying these data into a cloned passport. Therefore, some countries decided to introduce so called active authentication (AA) protocol. Informally speaking, it is a challenge-response authentication based on RSA signature scheme with message recovery (ISO ). The RSA private key is protected by the chip, so it should be impossible to make a duplicate that passes AA verification. Obviously, the scheme of AA can hardly avoid a relay attack as described e.g. in [3]. The approach described there actually behaves similarly to a plain wireextender for a contact card. Using this technique, we can present an e-passport resting in somebody s pocket to a customs service without disturbing its holder The authors were supported by the grant from GAUK n. 7302/2007.
2 in any way. Therefore, the authentication scheme obviously does not assure the travel document authentication as was perhaps deemed by its architects. Unless we use distance bounding protocols [4], it is really hard to defeat these attacks. On the other hand, the distance for the attack seems to be limited physically as it is hard to imagine that it uses a TCP/IP or similar connection, since the relaying occurs on the link layer. Our contribution is to show that it is not necessary to follow as general approach as in [3] to bypass the authentication protocol of a certain e-passport. We did this observation for Czech passports, but it is reasonable to expect that it will work for many other e-passports equipped with AA as well. First, it is easy to observe that all the data that needs to be relayed is the challenge and the response of AA. Everything else can be stored in the cloned chip locally. The core of the attack is that, due to a certain protocol behavior, there is much more time left for the resting transfers that what we would recognize in the general bit-by-bit approach. The short note elaboration presented here is an extension of the idea sketched in [5]. In section 1, the particular part of the ISO protocol used in the attack is described. Its concrete realization in chips of Czech e-passports is shown in section 2. One possible attack scenario is then given in 3. Finally, we conclude in the last section. 1 Frame Waiting Time Extension The transmission protocol between the terminal (the reader) and the RFID chip (the e-passport) is described in ISO After the successful initialization and anticollision procedure, the reader determines a communication attribute denoted FWI (Frame Waiting time Integer). The value of FWI is an integer in the range 0 to 14 (15 is RFU). For ISO A, it is obtained by sending RATS command (Request for Answer To Select) to the e-passport. When present, the interface byte TB(1) included in the e-passport s response ATS (Answer To Select) contains 4-bit value FWI. When TB(1) is not present, the default value 4 is used. For ISO B, the value of FWI is obtained during the anticollision procedure via ATQB (Answer To request type B) response. The FWT (Frame Waiting Time) is the ordinary maximum time period within which the passport has to start its responses to the terminal s commands during the protocol flow. It is defined as FWT = (256 16/f c ) 2 FWI, where f c = MHz is the carrier frequency. The allowable range for FWI yields the range for FWT, i.e. the minimal value is 302 µs and the maximal is s. As written in the standard: When the PICC needs more time than the defined FWT to process the received block it shall use an S(WTX) request for a waiting time extension. This request contains 6-bit value WTXM (Waiting Time extension
3 Multiplier) that yields a temporary value of FWT defined as FWT TEMP = FWT WTXM. By the standard, the allowable values for WTXM are in the range 1 to 59. The reader has to acknowledge this temporary change by sending S(WTX) response containing the same value WTXM. 2 Czech e-passport and S(WTX) When communicating with a Czech e-passport, it sets FWI = 10 within its ATS which yields FWT = 309 ms. After the BAC authentication is completed based on knowledge of (a part of) the machine readable zone (MRZ) of the passport, the active authentication protocol can start. The reader generates a random 8 byte challenge and sends it (encapsulated via a secure messaging) to the passport. Almost instantly (< 36ms), the passport sends back S(WTX) request with WTXM = 16, i.e. asking the reader to wait nearly 5 seconds for the answer. In order to be compliant with the standard, the reader has to accept this value. In our experiments, the e-passport was usually able to start transmitting the AA response within 950 ms. When we provided it with limited field intensity, the response took less then 1250 ms (it probably saves energy by slowing down). One way or the other, there is roughly 4 s gap between the requested response period and actual response period opening the door to relay attacks. This issue is not an easy task to solve, as the readers have to be compatible with the existing e-passports. 3 Relay Attack Scenario To exploit the unnecessary gap of 4 seconds in active authentication procedure, we can think of following scenario. A Czech visitor in a hotel in a foreign country leaves her passport at the hotel s reception. Having physical access to the passport (and its MRZ), the receptionist can access and copy all of the public data, i.e. namely the files DG1 (copy of machine readable zone), DG2 (biometric photography of the holder), DG15 (public key for AA) and EF.SOD (digital signature of the DG files by national authority). Leaving the passport at the reception, one can cross the border identifying himself with the victim s passport in the following way. The attacker passes the BAC procedure simply by using the known MRZ data and provides the copy of DG files to the reader at the border. Consequently, he enters the AA protocol by receiving the AA challenge and relays it by a intermediate channel (e.g. TCP/IP) to a device at the reception which transmits it to the victim s passport. As the reader at the border has to be standard compliant and has to wait 5 seconds for the answer, there is enough time to relay the passport s answer back to it. We should also emphasize the possibility of using side band emulation technique to communicate with the passport reader [6]. That means that there does not have
4 to be any active chip in the document passed to customs. The communication can be established with a device held undisclosed in a handbag. Therefore, we can omit the demand that the cloned passport chip must fit into the cloned document itself. That, in turn, increases the chance of carrying out the whole attack in a practice considerably. Note that the only two relayed messages are AA challenge and response, contrary to the approach described in [3]. All of the other commands can be done off-line, i.e. without the communication with the victim s passport. terminal fake passport fake terminal passport RF channel 1 channel 2 RF channel 3 initialisation initialisation file reading AA challenge challenge relay AA challenge S(WTX) S(WTX) AA response response relay AA response Fig. 1. Relay attack on active authentication (AA) Conclusion If we forget side channel techniques for a moment, then there is no known cryptanalytic method allowing a practically feasible attack on the active authentication scheme of e-passports. On the other hand, the general relay attacks clearly show that the proof of private key possession does not imply a proof of the travel document originality. We showed that particular communication protocol properties can even make these attack considerably more dangerous. The question arises whether a protocol like ISO that was obviously designed with very little or no security concerns is the right choice for such applications. A tighter union of the protocol itself and the used cryptographic schemes would be perhaps desirable. References 1. International Civil Aviation Organization Gildas A. Security and Privacy in RFID Systems. gavoine/rfid/, 2007.
5 3. Hancke G. A Practical Relay Attack on ISO Proximity Cards. gh275/relay.pdf, Brands S. and Chaum D. Distance-bounding protocols. In EUROCRYPT 93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages , Secaucus, NJ, USA, Springer-Verlag New York, Inc. 5. Klíma V. and Rosa T. Elektronický cestovní pas: autentizace. Sdělovací Technika, (5), Kfir Z. and Wool A. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. Cryptology eprint Archive, Report 2005/052,
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
MIFARE ISO/IEC 14443 PICC
Rev. 3.0 26 June 2009 130830 Application note PUBLIC Document information Info Keywords Abstract Content Activate Card, MIFARE, Select Card This Application te shows the elementary communication for selecting
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
50 ways to break RFID privacy
50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg [email protected] 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Risks of Offline Verify PIN on Contactless Cards
Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nicholas Little, and Aad van Moorsel School of Computing Science, Newcastle University, Newcastle upon Tyne, UK {martin.emms,budi.arief,n.little,aad.vanmoorsel}@ncl.ac.uk
Electronic machine-readable travel documents (emrtds) The importance of digital certificates
Electronic machine-readable travel documents (emrtds) The importance of digital certificates Superior security Electronic machine-readable travel documents (emrtds) are well-known for their good security.
Moving to the third generation of electronic passports
Moving to the third generation of electronic passports A new dimension in electronic passport security with Supplemental Access Control (SAC) > WHITE PAPER 2 Gemalto in brief Gemalto is the world leader
E-Passport Testing. Ensuring Global Acceptance. Jos Chehin Date: 17 November 2006 Location: ASML
E-assport Testing Ensuring Global Acceptance By: Jos Chehin Date: 17 ovember 2006 Location: ASML Global Acceptance of the e-assport Global Acceptance Interoperability Functionality Security Test Standards
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
Localization System for Roulette and other Table Games
Localization System for Roulette and other Table Games Christoph Ruland 1 1 University of Siegen, Hoelderlinstrasse 3, D-57076 Siegen/Germany; E-Mail: [email protected] Tel.: +49-271-740-2522;
E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption
Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,
New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
A Survey on Untransferable Anonymous Credentials
A Survey on Untransferable Anonymous Credentials extended abstract Sebastian Pape Databases and Interactive Systems Research Group, University of Kassel Abstract. There are at least two principal approaches
Measurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
Modular biometric architecture with secunet biomiddle
Version 2.1 Modular biometric architecture with secunet biomiddle White Paper Version 2.0, 25/03/10 secunet Security Networks AG Copyright 2010 by secunet Security Networks AG This document is for information
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Relay attacks on card payment: vulnerabilities and defences
Relay attacks on card payment: vulnerabilities and defences Saar Drimer, Steven J. Murdoch http://www.cl.cam.ac.uk/users/{sd410, sjm217} Computer Laboratory www.torproject.org 24C3, 29 December 2007, Berlin,
Discover Germany s Electronic Passport
Discover Germany s Electronic Passport Starting 1 Nov. 2007 E-Passport 2nd Generation www.epass.de 1 Introducing Germany s e-passport If you want to know why there are electronic passports and how to recognize
Establishing and Managing the Schengen Masterlist of CSCAs
Establishing and Managing the Schengen Masterlist of CSCAs Big City 21/04/2015 European Commission Directorate-General HOME Unit B3 Information Systems for Borders and Security [email protected]
Mobile Electronic Payments
Chapter 7 Mobile Electronic Payments 7.1 Rationale and Motivation Mobile electronic payments are rapidly becoming a reality. There is no doubt that users of mobile phones are willing and even asking to
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
CETECOM ICT Services GmbH Untertürkheimer Straße 6-10, D-66117 Saarbrücken Phone: +49 (0) 681-598-0 Fax:-9075
Untertürkheimer Straße 6-10, D-66117 Saarbrücken Phone: +49 (0) 681-598-0 Fax:-9075 CETECOM ICT Services GmbH Untertürkheimer Str. 6 10 66117 Saarbrücken Germany Test report no. : 1-0510-01-01/08 Type
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
Overview of Contactless Payment Cards. Peter Fillmore. July 20, 2015
Overview of Contactless Payment Cards Peter Fillmore July 20, 2015 Blackhat USA 2015 Introduction Contactless payments have exploded in popularity over the last 10 years with various schemes being popular
Common Criteria Protection Profile for Inspection Systems (IS) BSI-CC-PP-0064. Version 1.01 (15 th April 2010)
Common Criteria Protection Profile for BSI-CC-PP-0064 Version 1.01 (15 th April 2010) Federal Office for Information Security Postfach 20 03 63 53133 Bonn Phone: +49 228 99 9582-0 e-mail: [email protected]
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Operational and Technical security of Electronic Passports
European Agency for the Management of Operational Cooperation at the External Borders of the Member States of the European Union Operational and Technical security of Electronic Passports Warsaw, Legal
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
Smart Card Application Standard Draft
Smart Card Application Standard Draft Contents 1 SCOPE... 6 1.1 DEFINITIONS / DOCUMENT CONVENTIONS... 6 2 KEY DATA ELEMENTS AND CONCEPTS... 7 2.1 STATIC CARD INFORMATION... 7 2.1.1 Card ID (CdID)... 7
Cryptography: Authentication, Blind Signatures, and Digital Cash
Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,
Location Aware Selective Unlocking for Enhancing RFID Security
Location Aware Selective Unlocking for Enhancing RFID Security Sagar Dakhore, Padma Lohiya Dept. of E &TC, D.Y. Patil College of Engineering, Akurdi, Pune, Maharashtra, India Abstract: In this paper, a
Hacking Mifare Classic Cards. Márcio Almeida ([email protected])
Hacking Mifare Classic Cards Márcio Almeida ([email protected]) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of
Mobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
ON IDENTITY CARDS. Based on Article 65 (1) of the Constitution of the Republic of Kosovo, LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS
LAW Nо. 05/L-015 ON IDENTITY CARDS The Assembly of the Republic of Kosovo, Based on Article 65 (1) of the Constitution of the Republic of Kosovo, Approves LAW ON IDENTITY CARDS CHAPTER I GENERAL PROVISIONS
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
E-passport testing equipment
E-passport testing equipment Passport industry has gone into RFID now. Latest passport released are called «e-passport», being equipped with storage contactless chips. Quality of the finished booklets
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
Best Solutions for Biometrics and eid
Best Solutions for Biometrics and eid In times of virtual communication even a person s identity is converted into an electronic form with the help of biometrics and then organised through intricate technical
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
Chapter 5. Simple Ad hoc Key Management. 5.1 Introduction
Chapter 5 Simple Ad hoc Key Management 5.1 Introduction One of the most important consequences of the nature of the MANET networks is that one cannot assume that a node that is part of a network will be
SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise
w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace
A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE
27 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE FENG Ziliang*, PAN Weijun* / ** 1, WANG Yang* * Institute of Image and
Landscape of eid in Europe in 2013
Landscape of eid in Europe in 2013 July 2013 Eurosmart White Paper Contents Executive Summary 3 1. Purpose of the document 3 2. EU regulation 3 3. EU Member States identification policies 4 3.1. National
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013
Sub- Regional Workshop and Consulta;ons on Capacity- Building in Travel Document Security: Colombia, 2013 Carlos Gómez Head of R&D and Innova.on, FNMT- RCM, Spain ICAO TRIP: Building Trust in Travel Document
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Mobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
European Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso [email protected] Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Requirements for an EMVCo Common Contactless Application (CCA)
Requirements for an EMVCo 20.01.2009 CIR Technical Working Group Table of Contents 1 Introduction...1 2 Common Contactless Application Business Requirements...2 3 Card Requirements...3 4 Terminal Requirements...4
MOBILE IDENTIFICATION:
MOBILE IDENTIFICATION: FROM FUNCTIONAL REQUIREMENTS, TO TESTING FOR INTEROPERABILITY AND SECURITY Antonia Rana*, Alessandro Alessandroni** *Joint Research Centre, **DigitPA EUR 25037 EN - 2011 The mission
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Security in RFID Networks and Protocols
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security
An Overview of Approaches to Privacy Protection in RFID
An Overview of Approaches to Privacy Protection in RFID Jimmy Kjällman Helsinki University of Technology [email protected] Abstract Radio Frequency Identification (RFID) is a common term for technologies
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS
THREAT MODELLING FOR SECURITY TOKENS IN WEB APPLICATIONS Danny De Cock, Karel Wouters, Dries Schellekens, Dave Singelee and Bart Preneel COSIC Research Group, Dept. Electrical Engineering-ESAT, Katholieke
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy
Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (
RFID and Privacy Impact Assessment (PIA)
URSI-France Journées scientifiques 25/26 mars 2014 Claude Tételin RFID and Privacy Impact Assessment (PIA) Centre National de Référence RFID, [email protected] Mots clés : RFID, privacy,
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
COMPUTING SCIENCE. Risks of Offline Verify PIN on Contactless Cards. Martin Emms, Budi Arief, Nicholas Little and Aad van Moorsel
COMPUTING SCIENCE Risks of Offline Verify PIN on Contactless Cards Martin Emms, Budi Arief, Nicholas Little and Aad van Moorsel TECHNICAL REPORT SERIES No. CS-TR-1369 February 2013 TECHNICAL REPORT SERIES
Chip & PIN is definitely broken. Credit Card skimming and PIN harvesting in an EMV world
Chip & PIN is definitely broken Credit Card skimming and PIN harvesting in an EMV world Andrea Barisani Daniele Bianco Adam Laurie Zac Franken
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare?
Software Card Emulation in NFC-enabled Mobile Phones: Great Advantage or Security Nightmare? Michael Roland University of Applied Sciences Upper Austria,, Austria IWSSISPMU2012 International Workshop on
Keywords: German electronic ID card, e-government and e-business applications, identity management
From Student Smartcard Applications to the German Electronic Identity Card Lucie Langer, Axel Schmidt, Alex Wiesmaier Technische Universität Darmstadt, Department of Computer Science, Darmstadt, Germany
Encrypting Network Traffic
Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors
INTEGRATED CIRCUITS I CODE SLI Smart Label IC SL2 ICS20 Product Specification Revision 3.1 February July 2005 2001 Public Philips Semiconductors CONTENTS 1 FEATURES...4 1.1 I CODE SLI RF Interface (ISO/IEC
NFC APPLICATIONS IN THE TRACKING SYSTEMS
Advanced Logistic Systems, Vol. 7, No. 2 (2013), pp. 41 48. NFC APPLICATIONS IN THE TRACKING SYSTEMS TAMÁS HARTVÁNYI 1 CSABA I. HENCZ 2 Abstract: Radio Frequency Identification (RFID) and a Near Field
SECURITY IN LOW RESOURCE ENVIRONMENTS
SECURITY IN LOW RESOURCE ENVIRONMENTS SECURERF WHITE PAPER The discovery of a decades old technology is now promoted by many as the Next Big Thing. This discovery, Radio Frequency Identification (RFID),
