下载本文档
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Nijmegen,March12,DismantlingcontactlessOnMarch7,2008researchersandstudentsoftheDigitalSecuritygroupoftheRadboudUniversityNijmegenhavediscoveredaserioussecurityflawinawidelyusedtypeofcontactlesssmartcard,alsocalledRFIDtag.Itconcernsthe"MifareClassic"RFIDcardproducedbyNXP(formerlyPhilipsSemiconductors).Earlier,GermanresearchersNohlandPlötzpointedoutsecurityweaknessesofthiscards.Worldwidearound1billionofthesecardshavebeensold.ThistypeofcardisusedfortheDutch`ov-chipkaart'[theRFIDcardforpublictransportthroughouttheNetherlands]andpublictransportsystemsinothercountries(forinstancethesubwayinLondonandHongKong).Mifarecardsarealsowidelyusedascardstocontrolaccesstobuildingsandfacilities.Allthismeansthattheflawhasabroadimpact.Becausesomecardscanbecloned,itisinpriplepossibletoaccessbuildingsandfacilitieswithastolenidentity.Thishasbeendemonstratedonanactualsystem.Inmanysituationswherethesecardsareusedtherewillbeadditionalsecuritymeasures;itisadvisabletostrengthenthesewherepossible.TheDigitalSecuritygroupfoundweaknessesintheauthenticationmechanismoftheMifareClassic.InTheworkingoftheCRYPTO-1encryptionalgorithmhasbeenreconstructedinThereisarelativelyeasymethodtoretrievecryptographickeys,whichdoesnotrelyonexpensiveCombiningtheseingredientswesucceededonmountinganactualattack,inwhichaMifareClassicaccesscontrolcardwassuccessfullycloned.Insituationwheretherearenoadditionalsecuritymeasures,thiswouldallowunauthorisedaccessbypeoplewithbadintentions.TheMifareClassicisacontactlesssmartcarddevelopedinthemid90s.Itisamemorycardthatofferssomememoryprotection.Thecardisnotprogr ble.Thecryptographicoperationsitcanperformareimplementedinhardware,usingaso-calledlinearshiftfeedbackregister(LSFR)anda"filterfunction".TheencryptionalgorithmthisimplementsisaproprietaryalgorithmCRYPTO-1whichisatradesecretofNXP.ThesecurityofthecardreliesinpartonthesecrecyofCRYPTO-1algorithm,whichisknownas"securitybyobscurity".MifareClassiccardsaretypicallyusedforauthentication.Herethegoalisthattwopartiesprovewhotheyare.Thisisdonebydemonstratingthattheyknowsomecommonsecretinformation,aso-calledsharedsecret(cryptographic)key.Bothparties,inthiscasetheMifarecardandthecardreader,carryoutcertainoperationsandthencheckeachother'sresultstobesureofwhomtheyaredealingwith.Authenticationisneededtocontrolaccesstofacilitiesandbuildings,andMifarecardsarecommonlyusedforthispurpose.SuccessfulAuthenticationisalsoaprerequisitetoreadingorwritingpartofthememoryoftheMifareClassic.Thecard'smemoryisdividedintosectors,eachprotectedbytwocryptographickeys.Properkeymanagementisasubjectinitsownright.Roughlyspeaking,therearetwoAllcardsandallcardreadersusedforasomeapplicationhave thesamekeysforauthentication.Thisiscommonwhencardsare usedforaccesscontrol.Eachcardhasitsowncryptographickeys.Tocheckthekeysof acard,thecardreadershouldthenfirstdeterminewhichcard itistalkingtoandthenlookuporcalculatetheassociated key(s).Thisiscalledkeydiversification.Itiedthat thisapproachisusedfortheDutchpublictransportcard.SecurityweaknessoftheMifareTheDigitalSecuritygroupfoundweaknessesintheauthenticationmechanismoftheMifareClassic.InTheworkingoftheCRYPTO-1encryptionalgorithmhasbeenreverseengineered,andwedevelopedourownimplementationofthealgorithm.Wefoundarelativelyeasymethodtoretrievecryptographickeys,whichdoesnotrelyonexpensiveToreverseengineertheCRYPTO-1encryptionalgorithmweusedflawedauthenticationattempts.Ifonedoesnotpreciselyfollowtherulesoftheprescribedprotocol,onecanobtainsomeinformationaboutofthewayitworks.Combiningsuchinformationiswaspossibletoreconstructthealgorithm.Oncethealgorithmisknown,onecanfindoutthekeysthatareusedbyaso-calledbruteattack,i.e.simplytryingallpossiblekeys.Inthiscasethekeysare48bitslong.Tryingallthekeysthenrequiresaroundninehoursonadvancedequipment,accordingtotherecentTNOreport34643"SecurityysisoftheDutchOV-chipkaart",publishedFebruary26th2008.However,heretoocertainflawsintheauthenticationprotocolcouldbeexploited,aswediscovered.Thisleadsustothesecondpoint:thereisawaytorelativelyeasilyretrievethekeywithoutcarryingoutalengthybruteattack.Thiscanbedonebyfirstcarryingoutmanyfailedauthenticationattempts,whichdoprovidesomeinformation.Storingtheresultsofthisinabigtable,onecanlookforamatchandretrievethekey.Thetableonlyhastobeconstructedonce,andcanbepreparedinadvancebyrepeatedlyrunningtheCRYPTO-1algorithmonafixedinput.Ourproof-of-conceptdemonstrationofthisattackstillrequiredmanyauthenticationattemptsoncethistablehadbeenconstructed.Recordingtheseattemptstookseveralhours,butcouldbecarriedoutbyahiddenantennatoeavesdroponacardreader.Itseemsthatthecomplexitycanbefurtherreduced,possiblydramaticallyso,makingtheattackmuchsimpler.ExploitingtheseOncethesecretcryptographickeyisretrieved,therewillbepossibilitiesforabuse.Howseverethesepossibilitiesarewilldependonthesituation.Ifallcardssharethesamekey,thenthesystemwillbeextremelyvulnerable.Thismaybethecaseifcardsareusedforaccesscontroltobuildingsandfacilities,bothintheprivateandpublicsector.Thereishowevernoinformationonhowcommonthisis.Forsuchasettingwedemonstratedanactualattack,whereacardof,say,anemployeecanbeclonedbybumintothatwithaportablecardreader.Thewhoseidentityisbeingstolenmaythenbecompleyunawarethatanythinghashappened.Inasituationwherediversifiedkeysareused,abusewillbemoredifficult,butnotimpossible.Noactualattackshavebeendemonstratedforsuchascenario.Atthetechnicalleveltherearecurrentlynoknowncountermeasures.Shieldingcardswhentheyarenotinuse,e.g.inametalcontainer,reducestheriskofanattackersecretlyreadingoutacard.However,whenthecardisbeingused,itisstillpossiblytoeavesdroponthecommunication,withahiddenantennaneartheaccesspoint.Strengtheningoftraditionalaccesscontrolmeasuresisthereforeadvisable.Accesstosensitivefacilitieswill(orshould)beprotectedbyseveralprotectionmechanismsanyway,ofwhichtheRFIDtagisonlyone.GermanInDecember2007,KartenNohlandHenrykPlötzannouncedthattheyhadreconstructedCRYPTO-1atahackers'conferenceinBerlin.Wehavebeenintouchwiththem,andourworkbuildsontheirresults.However,NohlandPlötzkeptsomeinformationaboutCRYPTO-1tothemselves.ToreverseengineerCRYPTO-1,theycarriedoutaphysicalattack,wheretheystudiedthelayoutofthehardwareimplementingthealgorithmonanactualMifareClassicchip.Theirapproachiscompleydifferentfromours,asweonlyexploitedweaknessesoftheprotocolanddidnotlooklookingatthehardwareWhendiscoveringasecurityflawthereisadilemmaonhowtohandlethisinformation.Immediatepublicationofthedetailscanencourageattacksanddoseriousdamage.Keetheflawsecretforalongperiodmaymeanthatnecessarystepstocounterthevulnerabilityarenottaken.Itiscommonpracticeinthesecuritycommunitytotrytostrikeabalancweentheseconcerns,andrevealflawsaftersomedelay.Thisistheapproachwehavetaken.OnFriday,March72008,theernmentwasinformed,becausenationalsecurityissuesmightbeatstake.OnSaturday,March8,expertsoftheDutchSignalsSecurityBureau(NBV)oftheGeneralInligenceandSecurityService(AIVD)visitedNijmegentoassessthesituation,wheretheyconcludedthattheapproachwedemonstratedwasaneffectiveattack.OnSunday,March9,NXPwasinformed,andonMonday,March10,TransLinkSystems(thedevelotheDutchpublictransportcard).Wespoketorepresentativesofbothcompaniesaboutthetechnicaldetails,andarecollaboratingwiththemtoysetheimpactandthinkofpossiblecountermeasures.OnWednesday,March12,ministerTerHorsthasinformedAbouttheDigitalSecurityTheDigitalSecurityGroupattheRadboudUniversityNijmegenconsistsofabout25researchers.Theresearchfocusesontwothemes:softwaresecurityandidentity-centricsecurity.Overtime,thegrouphasdevelopedaconsiderableexpertiseinthefieldofsmartcards.Thegrouphasforinstanceadvisedontechnicalaspectsoftheelectronicpassportthatwasintroducedlastyear.Thegroupisalsoactiveintheareasofelectron
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 屋顶修复质保合同
- 房子租给民宿出租合同
- 商贸城买房合同电子版
- 工程肢解合同
- 监理合同讲解范文
- 2024一年级数学下册第7单元100以内的加法和减法二2两位数减两位数第1课时不退位的两位数减两位数习题课件新人教版
- 办公室档案保密管理制度改
- 餐饮部三锅岗位职责
- SQLServer2016数据库原理及应用(微课版) 20第四章实验5(2)-分组排序
- 建筑装修合同协议范本
- 作文讲座:创意写作与作文教学课件(共35张PPT)
- LY/T 1382-2008人造板机械分类术语
- GB/T 7095.1-2008漆包铜扁绕组线第1部分:一般规定
- GB/T 5976-2006钢丝绳夹
- 羽毛球校本教材
- GB/T 14209-1993纺织玻璃纤维无捻粗纱棒状复合材料压缩强度的测定
- 2022年全国新高考1卷英语听力官方正版答案
- 稀浆封层施工方案及施工工艺方法
- 《庖丁解牛》课件25张-统编版高中语文必修下册
- 江苏省南通市南通中学高一数学等差数列的前n项和 说课课件
- 员工辞职申请书
评论
0/150
提交评论