Karsten Nohl University of Virginia. Henryk Plötz HU Berlin



Similar documents
Hacking Mifare Classic Cards. Márcio Almeida

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Beveiliging van de OV-Chipkaart

Reviving smart card analysis

Analysis of the MIFARE Classic used in the OV-Chipkaart project

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

More effective protection for your access control system with end-to-end security

Legic Prime Obscurity in Depth. Henryk Plötz Karsten Nohl

RFID Penetration Tests when the truth is stranger than fiction

Peeling Away Layers of an RFID Security System

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Using RFID Techniques for a Universal Identification Device

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Defending mobile phones. Karsten Nohl, Luca Melette,

GSM Risks and Countermeasures

Establishing Security Best Practices in Access Control

Strengthen RFID Tags Security Using New Data Structure

A common weakness in RSA signatures: extracting public keys from communications and embedded devices

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID based Bill Generation and Payment through Mobile

Chapter 1: Introduction

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev October Document information

Privacy and Security in library RFID Issues, Practices and Architecture

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Wireless LAN Security Mechanisms

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

What is a Smart Card?

Security in Near Field Communication (NFC)

Training MIFARE SDK. Public. MobileKnowledge June 2015

advant advanced contactless smart card system

PUF Physical Unclonable Functions

Enabling the secure use of RFID

RFID Security: Threats, solutions and open challenges

50 ways to break RFID privacy

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Gemalto Mifare 1K Datasheet

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

CIS433/533 - Computer and Network Security Cryptography

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Keep Out of My Passport: Access Control Mechanisms in E-passports

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Entrust IdentityGuard

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Back-end Server Reader Tag

All You Can Eat. Breaking a Real-World Contactless Payment System

Client Server Registration Protocol

Exercise 1: Set up the Environment

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

E-Book Security Assessment: NuvoMedia Rocket ebook TM

IronKey Data Encryption Methods

Mobile network security report: Poland

NACCU Migrating to Contactless:

A Study on the Security of RFID with Enhancing Privacy Protection

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Anatomy. Subway Hack. of a. Russell Ryan Zack Anderson Alessandro Chiesa. For updated slides and code, see:

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany

GSM security country report: USA

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

Authenticity of Public Keys

Chapter 6 CDMA/802.11i

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Mobile Phone Security. Hoang Vo Billy Ngo

Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016

SecureCom Mobile s mission is to help people keep their private communication private.

Your Wireless Network has No Clothes

ACR880 GPRS Portable Smart Card Terminal

Reverse-Engineering a Cryptographic RFID Tag

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Hardware Security Modules for Protecting Embedded Systems

Mobile network security report: Netherlands

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Secure recharge of disposable RFID tickets

F-Secure Internet Security 2014 Data Transfer Declaration

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

Secure Automatic Ticketing System

Single Sign-On Secure Authentication Password Mechanism

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Mobile network security report: Belgium

SSL A discussion of the Secure Socket Layer

Security in IEEE WLANs

CSCE 465 Computer & Network Security

The next generation of knowledge and expertise Wireless Security Basics

Implementation of biometrics, issues to be solved

Pervasive Computing und. Informationssicherheit

USB Portable Storage Device: Security Problem Definition Summary

Significance of Tokenization in Promoting Cloud Based Secure Elements

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

Transcription:

Karsten Nohl University of Virginia Henryk Plötz HU Berlin

Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2

Constant monitoring is already part of our lives Trend is amplified through pervasive electronics, RFIDs Businesses will soon be able to track individuals Karsten Nohl, Henryk Plötz - RFID Security 3

RFID tags become universal identifier For people: passports, credit cards, For products: bar code replacement Billions of RFIDs in circulations Product tagging not started yet Privacy has so far been neglected Destroying tags only realized privacy mechanism More elegant solutions considered too expensive Security building blocks on RFID tags are insufficient for privacy applications. Karsten Nohl, Henryk Plötz - RFID Security 4

Challenge RNG Response + Key stream f( ) + + 48-bit LFSR ID Mutual authentication protocol 48-bit stream cipher Karsten Nohl, Henryk Plötz - RFID Security 5

Attacks From general to Mifare Countermeasures And why they often fail Tools We release today: Sniffer, Fuzzer, Emulator Karsten Nohl, Henryk Plötz - RFID Security 6

ID, Rc Enc(Rc), Rr Enc(Rr,Rc) Karsten Nohl, Henryk Plötz - RFID Security 7

ID, Rc Enc(Rc), Rr Enc(Rr,Rc) Karsten Nohl, Henryk Plötz - RFID Security 8

Attacker Karsten Nohl, Henryk Plötz - RFID Security 9

Spoof unique data of tags such as UID Done with RFID emulator (OpenPICC) or higher-powered tag (SmartMX) Foundation for other attack vectors Karsten Nohl, Henryk Plötz - RFID Security 10

Karsten Nohl, Henryk Plötz - RFID Security 11

1. Overhear legitimate authentication 2. Force same challenge, answer with same response Requires predictable random numbers Karsten Nohl, Henryk Plötz - RFID Security 12

Mifare random numbers are completely predictable and well documented RNG Karsten Nohl, Henryk Plötz - RFID Security 13

Recover secret key: Brute Force Try all keys TMTOs Try all keys, efficiently Algebraic Attacks w/ SAT solvers Try all keys, smartly Karsten Nohl, Henryk Plötz - RFID Security 14

Try all keys Only possible for small keys Mifare easy target: Cipher complexity low, enables efficient FPGA implementation FPGA cluster finds key in 50 minutes! Source: Pico Comp. Karsten Nohl, Henryk Plötz - RFID Security 15

Basic idea: Pre-compute and compress code book Corner cases: Brute Force: O(N) time Full code book: O(N) space Trade offs exists between: Time space data/success Countermeasure: use IVs German article Kunterbuntes Schlüsselraten on heise.de Karsten Nohl, Henryk Plötz - RFID Security 16

Attacks that exploit simple feedback structure and statistical weaknesses: 1. Describe weak parts of cipher as system of equations 2. Brute-Force through complex parts: Guess-and-Determine attack. 3. Solve system of equations: MiniSAT is our friend

y f c ( ) a[0] a[1] a[2] a[3] a[4] f a ( ) f b ( ) f a ( ) f a ( ) f b ( ) Compute equations for first output bit: a[0] = fa(x[7],x[9],x[11],x[13]); a[1] =...... y = fc(a[0],a[1],a[2],a[3],a[4]) Before computing next bit, shift LFSR: tmp = x[0]^...^x[43]; for i=1:47 x[i]=x[i+1]; x[48] = tmp; Describes cipher as system of equations with 48+r 5 unknowns, terms with degree 4!

Time Memory Trade Offs Key Probing Weak Authentication Protocol Algebraic Attacks Weak Filter Function 48-Bit Stream Cipher Weak Random Number Generator Brute Force (due to small key) Replay Attacks (due to predictable random numbers) Karsten Nohl, Henryk Plötz - RFID Security 19

Hardware tokens with insufficient security include: Mifare Classic, Hitag2 very popular in payment, access control and cars Legic cards (some) popular in access control (Europe) HID cards (some) popular in access control (US) Atmel s secure memory CryptoRF access control card CryptoMemory key storage Karsten Nohl, Henryk Plötz - RFID Security 20 Source: hidglobal.com

Countermeasures for Mifare Classic include: Signing: Strongly authenticate data to prove authenticity Valid states can be tied to cards and times iff emulation is detectable Radio fingerprinting: Measure and verify physical properties of tags Potential to detect emulation (see Day1 talk RFID fingerprinting by cryptocrat, Boris Danev) Karsten Nohl, Henryk Plötz - RFID Security 21

Multi-protocol, software-extensible RFID kit Evaluation module w/ support for Tag-It, ISO 15693, 14443 A/B incl. software-based Mifare Classic encryption Excellent base for : (upgrade) reader design RFID fuzz tester Download utility and firmware patch at www.cs.virginia.edu/~kn5f Karsten Nohl, Henryk Plötz - RFID Security 22

Open source RFID tools: multi-protocol RFID reader: OpenPCD RFID emulator: OpenPICC Implemented Mifare sniffer for OpenPICC capture both directions simultaneously sniffing distance: millimeters from card, centimeters from reader Firmware at svn.openpcd.org/branches/sniffonly/ Karsten Nohl, Henryk Plötz - RFID Security 23

Next Generation RFID emulator OpenPICC2: Implements tag and reader side, and OpenBeacon! Sufficient resources for on-board crypto (cracking?): 16 MB Ram, 48 MHz ARM7, SD-card slot Won t be a sniffer, sorry Karsten Nohl, Henryk Plötz - RFID Security 24

Karsten Nohl, Henryk Plötz - RFID Security 25

Use standard protocols and ciphers, but prepare for failure Keep hardware upgradable We gave you the tools, now start fuzzing, probing, and documenting RFID system Join the TI EVM / OpenPICC / OpenPICC2 development efforts Mailing lists on openpcd.org Karsten Nohl, Henryk Plötz - RFID Security 26

For secure RFID, we need: Publicly reviewed standards Yes, this means one-size-fits-all, but requirements are generic Comprehensive threat modeling Threat = risk damage User engagement, opt-out Never force technology onto users Inform about risks Karsten Nohl, Henryk Plötz - RFID Security 27

Karsten Nohl nohl@virginia.edu Henryk Plötz ploetz@informatik. hu-berlin.de Karsten Nohl, Henryk Plötz - RFID Security 28

Mifare cards uses proprietary Crypto-1 algorithm Never publicly reviewed for 20+ years We reverse-engineered algorithm and announce insecurities at 24C3 Feb/Mar: Reports find Crypto-1 to be strong enough for a few more years We releases more details about attacks Final report recommends migration April: Dutch researchers publicly demonstrate attacks against Oyster Law suit erupts, free speech prevails Details published in October 30

Cipher Cipher Near Field Communication phone Backend Server Karsten Nohl, Henryk Plötz - RFID Security 31

NFC (=RFID + cell phone) is the next hype Dave Birch: customers like NFC (a lot) Most systems are deployed with insufficient security. Karsten Nohl, Henryk Plötz - RFID Security Picture Source: Collin Mulliner 32

Jonathan Main, Chair of NFC Technical Committee: NFC Forum's role is not to define the [security] requirements [because] a mandatory onesize-fits-all approach such as that advocated by Mr. Nohl is not viable. Many applications use smart card security [ ] specified in other consortia. On top of these many security measures, users [can] set their own security parameters and preferences. Karsten Nohl, Henryk Plötz - RFID Security 33

The void of standardized security leads to: Development of new proprietary measures Adoption of old, broken security Often broken protocols, i.e.: NFC credit cards Mifare Classic encryption!! Key storage in insecure SAMs!!! Protocols Cryptography Secret keys Karsten Nohl, Henryk Plötz - RFID Security 34

NXP Reader IC µ-controller a) Sniffing data b) Full control over timing! Karsten Nohl, Henryk Plötz - RFID Security 35

f c ( ) f a ( ) f b ( ) f a ( ) f a ( ) f b ( ) 48-bit LFSR Filter function is a network of smaller functions that are statistically biased Adversary controls inputs, can probe for internal state bits Finding key takes < 1 minute on laptop Karsten Nohl, Henryk Plötz - RFID Security 36