Title: RFID Security
1RFID Security
B. Karthik
MTech 05 KReSIT, IIT Bombay
2What is RFID?
- Radio-Frequency Identification Tag
- Holds a small amount of unique data a serial
number or other unique attribute of the item - The data can be read from a distance no contact
or even line of sight necessary
Antenna
Chip
3How Does RFID Work?
02.3DFEX4.78AF51
EasyToll card 816
Radio signal (contactless) Range from 3-5 inches
to 3 yards
Tags (transponders) Attached to objects, call out
their (unique) name and/or static data on a
special radio frequency
Reader (transceiver) Reads data off the
tags without direct contact
Database Matches tag IDs to physical objects
4RFID Tag Power Sources
- Passive (this is what mostly used now)
- Tags are inactive until the readers
interrogation signal wakes them up - Cheap, but short range only
- Semi-passive
- On-board battery, but cannot initiate
communication - Can serve as sensors, collect information from
environment for example, smart dust for
military applications - More expensive, longer range
- Active
- On-board battery, can initiate communication
5The capabilities of a basic RFID tag
- Little memory
- Static 64-to-128-bit identifier in current
ultra-cheap generation - Little computational power
- A few thousand gates
- Static keys for read/write permission
- Not enough resources to support public- or
symmetric-key cryptography - Cannot support modular arithmetic (RSA, DSS),
elliptic curves, DES, AES - Hash functions barely feasible
- Recent progress on putting AES on RFID tag
6RFID is the Barcode of the Future
Barcode
RFID
Fast, automated scanning (object doesnt have to
leave pocket, shelf or container)
- Line-of-sight reading
- Reader must be looking at the barcode
- Reading by radio contact
- Reader can be anywhere within range
- Write Capabilities
- Products carry updated info as they move through
the supply chain
- Static Data
- No cryptographic operations possible
- Specifies object type
- E.g., I am a pack of Juicy Fruit
- Specifies unique object id
- E.g., I am a pack of Juicy Fruit 86715-A
Can look up this object in the database
7Commercial Applications of RFID
- Physical-access cards
- Inventory control
- Gillette Mach3 razor blades, pet tracking
- Logistics and supply-chain management
- Track a product from manufacturing through
shipping to the retail shelf - Gas station and highway toll payment
- Libraries
- Euro banknotes
8The consumer privacy problem
9and the tracking problem
Wig serial A817TS8
- Mr. Jones pays with a credit card his RFID tags
now linked to his identity determines level of
customer service - Think of car dealerships using drivers licenses
to run credit checks - Mr. Jones attends a political rally law
enforcement scans his RFID tags
10Risks
- Personal privacy
- Ill furtively scan your briefcase and learn how
much cash you are carrying and which prescription
medications you are taking - Corporate espionage Privacy is not just a
consumer issue - Track your competitors inventory
- Skimming read your tag and make my own
- In February, JHU-RSA Labs team skimmed and cloned
Texas Instruments RFID device used in car
anti-theft protection and SpeedPass gas station
tokens
11Blocking Unwanted Scanning
- FARADAY CAGE
- Container made of foil or metal mesh,
impenetrable by radio signals of certain
frequencies - May be works for a wallet, but huge hassle in
general locomotion difficult
12Blocking Unwanted Scanning (Contd.)
- KILL tag after purchase
- Special command permanently de-activates tag
after the product is purchased - RFID tags are much too useful in live state
Disables many futuristic applications.
13Futuristic Applications
- Tagged products
- Clothing, appliances, CDs, etc. tagged for store
returns and locatable in house - Smart appliances
- Refrigerators that automatically create shopping
lists and when milk expires - Closets that tell you what clothes you have
available, and search the Web for advice on
current styles, etc. - Washing machines that detect improper wash cycle
- Smart print
- Airline tickets that indicate your location in
the airport - Business cards
- Recycling
- Plastics that sort themselves
- Consumers will not want their tags killed,
but should still have a right to privacy!
14Blocking Unwanted Scanning (Contd.)
The BLOCKER TAG Blocker simulates all
(billions of) possible tag serial numbers!!
15Tree-walking anti-collision protocol for RFID
tags
0
1
00
01
10
11
000
010
111
101
001
011
100
110
16Example Supermarket Cart
1. Prefixempty
prefix0
prefix1
1a. Prefix0
1b. Prefix1
2. Prefix00
2. Prefix11
prefix00
prefix01
prefix10
prefix11
000
001
010
011
100
101
110
111
17What a protocol should posses?
- Untraceability
- Tag should reproduce different output every time
it is queried - Forward Security
- Compromise of Tag must not mean compromise of all
its previous interactions - Database Desynchronization
- Attacker desynchronizes the sequence followed by
Tag and Backend Database
18Weis, Sarma, Rivest, Engels Protocol
19Attack on Weis, Sarma, Rivest, Engels Protocol
- Untraceability
- The tag gives no useful information when an
adversary queries it or re-queries it - Forward Security
- If the adversary break opens the tag, then the
tags ID gets compromised
20Ohkubu, Suzuki, and Kinoshita Protocol
- Internally, h2(ID) is stored as the next ID
21Attack on Ohkubu, Suzuki, and Kinoshita Protocol
- Untraceability
- Response of the tag neither repeats nor is useful
for the adversary - Forward Security
- ID is not static
- Revealing the tag will only give out the current
ID of the tag
22Delegatable, Pseudonym Protocol
- David MolnarAndrea Soppera,and David Wagner
23Tree of Secrets
- If n is the total number of tags, and b the
branching factor, then d1 logb n - Each of these nodes have a randomly generated key
24How it works?
- On querying the tag responds with the following
- r, P r, F1(r), F2(r), F3(r),
- Here F1, F2, F3 encrypt r using the secrets
along the path from root node to the current
tags node - TC proceeds by finding F(r) at each level
- Thus for a binary tree, the TC does (2d1)
comparisons
25Tree of Secrets (contd.)
- Every tag has a sub-tree of depth d2
- Nodes in this sub-tree get their key by
performing PRF on their parent - Tags store the path from the root node to the tag
node and the tags sub-tree
26The Protocol
- Tag maintains a counter to determine current leaf
node - On querying, Tag responds with
- r, P r, F1(r), F2(r), F3(r),
- Here F1, F2, F3 encrypt r using the secrets
along the path from root node to the current leaf
node - The TC performs F(r) at each level and determines
the next node to traverse
27Why Delegation?
- Pseudonym Protocol
- Trusted Center TC authorizes the reader and
gives out the ID - Problem when readers continuously query the TC
- Solution is to delegate the authority to the
readers - Pass on a set of keys from the sub-tree to the
readers
28Attacking Molnars Protocol
- Untraceability
- Tag responds with (r, P) which is different every
time - Forward Security
- Tag stores the sub-tree used for encryption
- On Reveal, Tag loses all its secret, and hence
all its previous interactions can be traced
29References
- David Molnar, Andrea Soppera, and David Wagner. A
scalable, delegatable pseudonym protocol enabling
ownership transfer of RFID tags. In Bart Preneel
and Stafford Tavares, editors, Selected Areas in
Cryptography SAC 2005, Lecture Notes in
Computer Science, Kingston, Canada, August 2005.
Springer-Verlag. - Gildas Avoine. Adversary model for radio
frequency identification. Technical Report
LASEC-REPORT-2005-001, Swiss Federal Institute of
Technology (EPFL), Security and Cryptography
Laboratory (LASEC), Lausanne, Switzerland,
September 2005. - Dirk Henrici and Paul Muller. Hash-based
enhancement of location privacy for
radiofrequency identification devices using
varying identifiers. In Ravi Sandhu and Roshan
Thomas, editors, International Workshop on
Pervasive Computing and Communication Security
PerSec 2004, pages 149153, Orlando, Florida,
USA, March 2004. IEEE, IEEE Computer Society. - Miyako Ohkubo, Koutarou Suzuki, and Shingo
Kinoshita. Cryptographic approach to
privacy-friendly tags. In RFID Privacy Workshop,
MIT, MA, USA, November 2003. - Stephen A. Weis, Sanjay E.Sarma, Ronald L.
Rivest, and Daiel W. Engels. Security and privacy
aspects of low-cost radio frequency
identification systems. In First International
Conference on Security in Pervasive Computing,
2003.