40
Soutenance Publique de Th` ese de Doctorat Cryptography in Radio Frequency Identification and Fair Exchange Protocols Gildas Avoine EPFL, Lausanne, Switzerland December 12, 2005 – www.avoine.net ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE

Cryptography in Radio Frequency Identification and Fair Exchange

Embed Size (px)

Citation preview

Page 1: Cryptography in Radio Frequency Identification and Fair Exchange

Soutenance Publique de These de Doctorat

Cryptography in Radio Frequency

Identification and Fair Exchange Protocols

Gildas Avoine

EPFL, Lausanne, Switzerland

December 12, 2005 – www.avoine.netÉCOLE POLYTECHNIQUEFÉDÉRALE DE LAUSANNE

Page 2: Cryptography in Radio Frequency Identification and Fair Exchange

Summary of my Work

. Fair Exchange

AV03a, AV03b, AV04, AGGV05, Avo03.

. Radio Frequency Identification

Avo04, ADO05, AO05a, AO05b, CA06, AB06.

. Odds and Ends

Avo05, AMP04, AJO05, AJ03, VAJ03, AJO05.

2 / 34

Page 3: Cryptography in Radio Frequency Identification and Fair Exchange

Outline of the Presentation

RFID PRIMER

IMPERSONATION OF TAGS

INFORMATION LEAKAGE

MALICIOUS TRACEABILITY

TRACEABILITY THROUGHT THE COMMUNICATION LAYERS

3 / 34

Page 4: Cryptography in Radio Frequency Identification and Fair Exchange

RFID PRIMER

Page 5: Cryptography in Radio Frequency Identification and Fair Exchange

RFID Definition and Architecture

Definition RFID

Radio Frequency IDentification (RFID) is a method of remotelyidentifying objects or subjects using transponders (tags) queriedthrough a radio frequency channel.

tag

tag

tag

tag

database

tag

reader

4 / 34

Page 6: Cryptography in Radio Frequency Identification and Fair Exchange

RFID Tags

5 / 34

Page 7: Cryptography in Radio Frequency Identification and Fair Exchange

RFID Readers

6 / 34

Page 8: Cryptography in Radio Frequency Identification and Fair Exchange

Tag Characteristics

communication distance

computation

memory

tamper−resistance

power source

symmetric

semi−passive

128 1024

meters

centim.no

yes

passive

active

asymmetricxor

7 / 34

Page 9: Cryptography in Radio Frequency Identification and Fair Exchange

Tag Specificities

. Tags cannot be switched-off

. Tags answer without the agreement of their bearers

. Increasing of the communication range

. Tags can be almost invisible

8 / 34

Page 10: Cryptography in Radio Frequency Identification and Fair Exchange

Daily Life Examples

. Management of stocks

. Libraries

. Anti-counterfeiting

. Access control

. Localization of people

. Electronic documents

. Counting cattle

9 / 34

Page 11: Cryptography in Radio Frequency Identification and Fair Exchange

Security Threat Classification

. Denial of service

. Impersonation

. Information Leakage

. Malicious traceability

10 / 34

Page 12: Cryptography in Radio Frequency Identification and Fair Exchange

IMPERSONATION OF TAGS

Page 13: Cryptography in Radio Frequency Identification and Fair Exchange

Problem and Adversary Means

Problem

An adversary should not be able to impersonate a tag.

Adversary Means

The adversary can query the targetted tag or eavesdrop (RFID)communications between the tag and readers. Then the adversarytries to simulate the tag in front of a legitimate reader.

11 / 34

Page 14: Cryptography in Radio Frequency Identification and Fair Exchange

Tag Simulator

12 / 34

Page 15: Cryptography in Radio Frequency Identification and Fair Exchange

Identification vs Authentication

Primal goal of RFID is to provide security.

Definition Authentication

The authentication consists for the reader in obtaining the identityof the tag and a proof that the claimed identity is correct.

Primal goal of RFID is to provide functionality.

Definition Identification

The identification consists for the reader in obtaining the identityof the tag, but no proof is required.

13 / 34

Page 16: Cryptography in Radio Frequency Identification and Fair Exchange

Identification Protocol

System Tag

request−−−−−−−−−−−−−−−−−→ID←−−−−−−−−−−−−−−−−−

Examples: Counting cattle, localization, stock management.

14 / 34

Page 17: Cryptography in Radio Frequency Identification and Fair Exchange

Authentication Protocol

System (K ) Tag (K )

r−−−−−−−−−−−−−−−−−→EK (r)←−−−−−−−−−−−−−−−−−

Examples: Access control, e-documents, anti-counterfeiting.

15 / 34

Page 18: Cryptography in Radio Frequency Identification and Fair Exchange

Impersonation (Example: Texas Instrument DST Module)

. Attack of Bono et al. on the Digital Signature Transpondermanufactured by TI, used in automobile ignition key.

Key (RFID)Car

r

EK (r)

. Recovering the 40-bit key requires less than 1 minute using atime-memory trade-off.

Recovering the cryptographic key / Impersonating the ignition key / Impersonating the SpeedPass card

16 / 34

Page 19: Cryptography in Radio Frequency Identification and Fair Exchange

Impersonation (Example: Relay Attack)

. The reader believes the tag is within its electromagnetic field.

. The attacker behaves as an extension cord.

adversary

tagreader

database

. The solution consists in using a distance bounding protocol.

17 / 34

Page 20: Cryptography in Radio Frequency Identification and Fair Exchange

INFORMATION LEAKAGE

Page 21: Cryptography in Radio Frequency Identification and Fair Exchange

Problem and Adversary Means

Problem

An adversary should not be able to obtain useful information aboutthe tagged object.

Adversary Means

The adversary can query the targetted tag or eavesdrop (RFID)communications between the tag and readers.

18 / 34

Page 22: Cryptography in Radio Frequency Identification and Fair Exchange

Information Leakage Problem

. Tagged books in libraries

. Tagged pharmaceutical products

. Electronic documents like passports, ID cards, etc.

19 / 34

Page 23: Cryptography in Radio Frequency Identification and Fair Exchange

MALICIOUS TRACEABILITY

Page 24: Cryptography in Radio Frequency Identification and Fair Exchange

Problem and Adversary means

Problem

An adversary should not be able to track people thanks to theRFID tags they carry.

Adversary Means

The adversary can query the targetted tag and eavesdrop (RFID)communications between his target and readers.

20 / 34

Page 25: Cryptography in Radio Frequency Identification and Fair Exchange

Avoiding Malicious Traceability

. The information sent back by the tag must be indistinguishable(by an adversary) from a random value.

. The information must be refreshed at each new identification.

21 / 34

Page 26: Cryptography in Radio Frequency Identification and Fair Exchange

Protocols

Protocol Weaknesses pointed out by[JuelsP03] [Avoine04], [ZhangK05]

[VadjaB03] [VadjaB03]

[GolleJJS04] [Avoine05], [SaitoRS04]

[Juels04] [Juels04]

[HenriciM04] [AvoineO05]

[SaitoRS04] [Avoine05]

[JuelsW05] [GilbertRS05]

[WeisSRE02]

[OhkuboSK03]

[FeldhoferDW04]

[MolnarW04]

[RheeKKW05]

22 / 34

Page 27: Cryptography in Radio Frequency Identification and Fair Exchange

Feldhofer, Dominikus, and Wolkerstorfer’s Protocol

System (K ) Tag (K )

pick aa−−−−−−−−−−−−−−−−−→

find K in itsdatabase s.t.

AES−1K (σ) is valid

σ←−−−−−−−−−−−−−−−−−

pick b andcomputeσ = AESK (a, b)

23 / 34

Page 28: Cryptography in Radio Frequency Identification and Fair Exchange

Computation Complexity of Challenge-Response Protocols

. An exhaustive search in the system’s database is required toidentify one tag.

. Complexity too high in particular in case of inventory.

. Is it possible to design an RFID protocol with a complexitybetter than linear?

. Molnar and Wagner proposed a solution that reduces thecomplexity of any challenge-response from O(n) to O(log n).

24 / 34

Page 29: Cryptography in Radio Frequency Identification and Fair Exchange

Molnar and Wagner’s Tree-Based Technique

. Each tag stores logδ(n) keys.

T2 T3 T4 T5 T6 T7 T8 T9 T10 T12 T13 T14 T15 T16T11T1

K19 K20K18K15 K16K14K12K7 K8K6

K1 K2 K3 K4

K10 K11K5 K9 K13 K17

. A challenge-response is applied at each level of the tree.

. Instead of carrying out 1 exhaustive search in a set of size n,logδ(n) exhaustive searches are performed in sets of size δ.

25 / 34

Page 30: Cryptography in Radio Frequency Identification and Fair Exchange

Drawbacks

. Tags share some keys.

. Tampering with tags gives information about the other tags.

K19 K20K18K15K14K12K7 K8K6

K1 K2 K3 K4

K10K5 K9 K13

T2 T4 T5 T6 T7 T8 T9 T10 T12 T13 T14 T15 T16T11T1

known keys unknown keys

K17K16K11

T3

26 / 34

Page 31: Cryptography in Radio Frequency Identification and Fair Exchange

How to Trace a Tag

(1) Tamper with k tags.

(2) Choose any target T and query it at will.

(3) Query T1 and T2 to determine which of the two is T .

A

T

T2T1

tamper with

RFID

RFIDRFID

(1)

(2)

(3)?

27 / 34

Page 32: Cryptography in Radio Frequency Identification and Fair Exchange

Five Cases to Analyze

. T1 on known branch and T2 on unknown branch: success.

. T2 on known branch and T1 on unknown branch: success.

. T1 and T2 both on known but different branches: success.

. T1 and T2 both on unknown: failure.

. T1 and T2 both the same known branch: failure at level i butthe attack moves on to level i + 1.

28 / 34

Page 33: Cryptography in Radio Frequency Identification and Fair Exchange

Probability of Success

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

100 200 300 400 500 600 700 800 900 1000

Pro

bab

ility

of

trac

ing

tag

T

Branching factor δ

k = 1

k = 20

k = 50

k = 100

k = 200

29 / 34

Page 34: Cryptography in Radio Frequency Identification and Fair Exchange

Using a Time-Memory Trade-Off

. Time complexity can be reduced against a memory cost.

. [AO05] as efficient as [MW04].

. [AO05] does not degrade security.

30 / 34

Page 35: Cryptography in Radio Frequency Identification and Fair Exchange

TRACEABILITY THROUGHTTHE COMMUNICATION

LAYERS

Page 36: Cryptography in Radio Frequency Identification and Fair Exchange

Problem and Adversary Means

Problem

An adversary should not be able to track people thanks to theRFID tags they carry.

Adversary Means

The adversary takes benefit of a side channel instead of usingthe RFID protocol. This side channel can be in any layer of thecommunication model.

31 / 34

Page 37: Cryptography in Radio Frequency Identification and Fair Exchange

Malicious Traceability in the Communication Layer

request

Noise

32 / 34

Page 38: Cryptography in Radio Frequency Identification and Fair Exchange

Collision-Avoidance Protocols (Example: Slotted Aloha)

. The access to the communication channel is split into timeslots.

. The number of slots is chosen by the reader which informs thetags they will have n slots to answer.

. Each tag randomly chooses one slot among the n and repliesto the reader when its slot arrives.

. If n is not sufficiently large, then some collisions occur.

. Example: Philips ICode1 Label.

33 / 34

Page 39: Cryptography in Radio Frequency Identification and Fair Exchange

CONCLUSION

Page 40: Cryptography in Radio Frequency Identification and Fair Exchange

Conclusion

. Will low cost RFID become an ubiquitous technology?

. Is malicious traceability a problem?

. Is it too late to deal with this problem?

. Are there existing solutions?

. Shall we have a drink after the presentation?

34 / 34