RFID Penetration Tests when the truth is stranger than fiction



Similar documents
Using RFID Techniques for a Universal Identification Device

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Security in Near Field Communication (NFC)

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

Gemalto Mifare 1K Datasheet

Mobile and Contactless Payment Security

A Note on the Relay Attacks on e-passports

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

RFID Security: Threats, solutions and open challenges

Exercise 1: Set up the Environment

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Atmel Innovative Silicon RFID IDIC Solutions

ACCESS CONTROL SYSTEM

NACCU Migrating to Contactless:

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

a leap ahead in analog

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

More effective protection for your access control system with end-to-end security

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin

advant advanced contactless smart card system

Near Field Communication in Cell Phones

Localization System for Roulette and other Table Games

Radio Frequency Identification (RFID)

Privacy and Security in library RFID Issues, Practices and Architecture

Security & Chip Card ICs SLE 44R35S / Mifare

Jolly Encoder Configuration Guide

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda

Secure recharge of disposable RFID tickets

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

SPYTEC 3000 The system for GSM communication monitoring

Access Professional Edition Selection Guide

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions

Chip Card & Security ICs Mifare NRG SLE 66R35

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

RFID BASED VEHICLE TRACKING SYSTEM

PUF Physical Unclonable Functions

Credit Card Fraud The Contactless Generation Kristin Paget

Computer and Network Security

ENERGY HARVESTED ELECTRONIC SHELF LABEL

How To Understand The Power Of An Freddi Tag (Rfid) System

Mobile Electronic Payments

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

Radio Frequency Identification (RFID) Vs Barcodes

BARCODE TICKET SOLUTION RF CARD SOLUTION MAGNETIC TICKET SOLUTION

Guard All Security Symposium. Identity and Access Management

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Product Information S N O. Portable VIP protection CCTV & Alarm System 2

What standards ISO/CEI ISO/CEI EPC class 1 gen 2. RFID standards. ISO14443,ISO15693 and EPCGlobal. Mate SoosINRIA.

Using ISO Compliant RFID Tags in an Inventory Control System

Using Contactless Smart Cards for Secure Applications

The Research and Application of College Student Attendance System based on RFID Technology

READER COMPONENTS. mifare (14443A) MHz RFID Proximity Antennas. November Revision 1.0 PUBLIC. Philips Semiconductors

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

50 ways to break RFID privacy

Strengthen RFID Tags Security Using New Data Structure

RECOMMENDATION ITU-R F (Question ITU-R 157/9) b) that systems using this mode of propagation are already in service for burst data transmission,

LTE Evolution for Cellular IoT Ericsson & NSN

SALTO Systems I SALTO Carriers. innovation in ID technology. MIFARE DESFire

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

The Study on RFID Security Method for Entrance Guard System

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission

RF Attendance System Framework for Faculties of Higher Education

Secure Automatic Ticketing System

RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY

Loyalty Systems over Near Field Communication (NFC)

The Future is Contactless

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

All You Can Eat. Breaking a Real-World Contactless Payment System

RFID Hacking. Live Free or RFID Hard. 01 Aug 2013 Black Hat USA 2013 Las Vegas, NV. Presented by: Francis Brown Bishop Fox

AN2866 Application note

Training MIFARE SDK. Public. MobileKnowledge June 2015

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

AppNote 404 EM MICROELECTRONIC - MARIN SA. EM4095 Application Note RFID. Title: Product Family: TABLE OF CONTENT. Application Note 404

Tire pressure monitoring

RECOMMENDATION ITU-R M * Transport information and control systems Dedicated short range communications at 5.8 GHz

Single channel data transceiver module WIZ2-434

How To Secure A Paypass Card From Being Hacked By A Hacker

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

About Me" List of Lectures" In This Course" Mobile and Sensor Systems. Lecture 1: Introduction to Wireless Systems" " Dr. Cecilia Mascolo" "

Security Challenges for User-Oriented RFID Applications within the Internet of Things

RFID Design Principles

AIR DRM. DRM+ Showcase

UHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2014

Transcription:

RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s.

Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon Penetration tests selected aspects Where the security of transponders comes from The LF band Q5 takes it all The HF band MIFARE: two ways to use, both of them bad Conclusion Side / 2

Radio Classification of Transponders Frequency band Sub-class Typical sort Typical deployment Operation Distance (order) LF (100 to 150 khz) - Memory card Access system, immobilizer, implant, loyalty card cm to m(*) HF (13.56 MHz) Vicinity card Proximity card Memory card Contact-less smartcard Access system, skipass, loyalty card Access system, payment card, e-passport cm to m cm UHF (430 2450 MHz) - Memory card Stock control cm to 10s m Side / 3 (*) rare configurations with low consumption read-only cards and high power, high dimension readers

LF and HF Band Physical Layer Employs the behavior of so-called near field of the transmitter Threshold is approx. λ/2π, λ = 300/f [m, -, MHz] Uses the well known effect of inductive coupling Arrangement terminal antenna chip antenna can be viewed as a high frequency transformer Side / 4

Feeding Up a LF/HF Transponder V = V 0 cos(ωt) [Lee: AN710, Microchip 2003] Side / 5

Near Field Illustration Biot-Savart: db = µ 0 NI(R x dc)/(4π R 3 ) Solution for an ideal circular loop antenna. dc = a*dϕ [Lee: AN710, Microchip 2003] Side / 6

B z vs. Distance vs. Loop Diameter HF band: 13.56 MHz Current: 5 ampere-turns Loop diameter: 20 cm a 1 m Intensity bounds: ISO 14443 Side / 7

Talking with the LF/HF Transponder transponder RFID terminal RFID internal network transponder field terminal field Terminal: direct amplitude modulation of the basic carrier Chip: load modulation resulting in indirect amplitude/phase modulation of the basic carrier Side / 8

When the Distance Matters Method Active communication with the chip Passive reception chip and terminal Passive reception terminal only Active communication with the terminal Distance dozens of cm units of m dozens of m dozens of m Side / 9

RFID in Access Control Systems A huge majority of access control systems in Czech Republic uses: either so called Unique ID transponders in LF band, or MIFARE (Classic) chips in HF band. Side / 10

Unique ID Transponders Serial memory programmed during the chip manufacturing or personalization phase When in the terminal (reader) field, they transmit the memory content automatically in a cycle There is no communication origin authentication The transponder talks to anybody The terminal listens to anybody Examples: EM Unique, HID Prox, INDALA Side / 11

MIFARE Classic Two basic ways of usage: So-called UID only mode which is functionally equivalent to the unique-id transponders. Easy to break using a transponder emulator. So-called cryptographic mode that uses i.a. mutual authentication of transponder and terminal. Broken totally in 2007-2009. At present, there are dozens of practically feasible devastating attacks. Side / 12

MF Classic Cryptanalysis I Known weaknesses Insufficient key length of Crypto1 alg. (48 bits) Possibility to stabilize the PRNG state Non-linear filter tap symmetry in LFSR of Crypto1 Conditional multidifferential property of Crypto1 Fault side channel in the authentication protocol Inappropriate order of encryption and error control codes Side / 13

MF Classic Cryptanalysis II Implications Secret key recovery basing on an interaction with the terminal (reader) only Secret key recovery from an intercepted terminaltransponder relation (it is enough to hear the terminal part only feasible dozens of meters away) Secret key recovery basing on an interaction with the transponder only Totally devastating for a huge amount of micro-payment and public transportation applications. Side / 14

MIFARE Classic What next? MIFARE DESFire Defeats number of attacks while (!) introducing large amount of another possible weaknesses. Obviously spoiled interconnection in between cryptography and the application protocol. There is a threat of attacks based on erred configurations (the architecture encourages them) MIFARE Plus Up to now (spring 2009) there is no technical documentation nor engineering samples available (should have been available in Q3 of 2008). Side / 15

MIFARE Classic and NFC Despite no necessary dependence, the majority of applications offer the MF Classic profile only. Thus sharing a number of original weaknesses as well. It is a question whether these profiles eliminate at least those weakness, that are possible to fix without a compatibility loss. Weak PRNG and the fault side channel in the authentication procedure. Side / 16

Penetration Test Scope The aim was to try to make a functionally equivalent duplicate of an existing access control card. That is a theft of identity of some employee or temporary worker or an external supplier, etc. Side / 17

Unique ID Transponder Overview R/W variant only load modulation UID transmit path Side / 18

Where the Security Comes From It is important to note what the attacker really does not have to do: To understand the meaning of the data stored in the transponder memory. The data can even be encrypted (and it still does not matter here). Necessary and sufficient condition to make the duplicate of the transponder is: To effectively describe the control sequence driving the load modulator and to repeat this action in the terminal (reader) field later on. Side / 19

Q5 Queen of the LF Band Programmable LF transponder called Q5 224 user defined EEPROM bits (330 b in total) wide support of modulation and encoding schemes Variable chip packing key fob, ISO card, etc. It was able to emulate all those LF Unique ID transponders tested, so far Widely available on the market E.g. http://www.therfidshop.com/product_info.php?products_id=373 Side / 20

Q5 Output Encoder Part Manchester PSK1 EE data xor PSK2 PSK3 FSK1 M U X modulating seq. FSK2 Biphase Direct/NRZ data inversion modulation encoding selection Side / 21

Using Q5 for an Attack Phase I describing the modulating seq. of the original transponder In theory, this can be a very hard problem, but in practice, we seldom meet something unique. Let us be led by all those possible Q5 configurations! Phase II making the duplicate We store the modulating seq. into Q5 memory and program its output encoder/modulator Side / 22

Examples of the Phase I follow Side / 23

LAB Example: The Effect of Using a Subcarrier Frequency Side / 24

LAB Example: Subcarrier with Phase Modulation Side / 25

LAB Example: Ad Hoc Spyware EM4095 battery PIC16F628A Side / 26

LAB Example: Frequency Modulation Disclosed by EM4095 (green) Side / 27

Another Practical Scenario: Eavesdropping in Elevator LF band transponder data intercepted while its holder was authenticating to the reader in an elevator Distance: cca 0,5 m. Receiver: Sangean ATS 909W. Side / 28

Disclosing The Secret EM Unique direct manchester encoding, bitrate f/64, 64 bits in total Q5 configuration word: 60 01 F0 04 INDALA (1 particular setup) subcarrier f/2 with phase shift keying, modulating sequence length of 64 bits Q5 configuration word: 60 00 F0 A4 HID Prox (1 particular setup) 2 subcarriers f/8 and f/10 with frequency shift keying, modulating sequence length of 96 bits Q5 configuration word: 60 01 80 56 Side / 29

MIFARE UID only In practice, huge amount of MF installations use this approach. In many aspects, the security of this approach is even worse than of the transponders in LF discussed before. The communication protocol is standardized (ISO14443A) UID interception is possible up to dozens of meters away Only one obstacle here there is no Q5 analogue for the HF band... We need to build our own emulator e.g. PicNic. Side / 30

PicNic: HF Band Transponder Emulator For details cf. crypto.hyperlink.cz/picnic.htm Side / 31

On MF UID Interception Yellow trace: basic carrier Green trace: AM detector primary transfer repetition Side / 32

Real Life Experiment Receiver AOR AR8600MK2, HF output at i.f. 10,7 MHz. Distance cca 2 m, at least two readers in the field. UID can be read clearly, still without any preprocessing (becomes necessary with increasing distance). Side / 33

Another Real Life Scenario or The whole chain is as weak as UID here Besides paying in the canteen, the same card opens the office door. Of course So, lets feel the power of technology convergence take a lunch and go for a walk around the office Side / 34

Conclusion Huge majority of contemporary access control systems is vulnerable to an identity theft attack. Transponders serve the role of subject identification only. They do not provide any reasonable subject authentication! Huge majority of physical security managers is not aware of such risk. Seeing the risk requires noting that computer systems play a crucial role (even) in the area of physical security. Material engineering is just not enough for physical security risk assessment any more. Common principles of information security have to be applied as well. Especially, RFID systems shall be subject to the penetration testing. Side / 35

Thank you for your attention For more cf.: crypto.hyperlink.cz/cryptoprax.htm Dr. Tomáš Rosa Raiffeisenbank, a.s. tomas.rosa@rb.cz Side / 36