27
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February 5, 2010, Leuven

Low-Cost Untraceable Authentication Protocols for RFID

Embed Size (px)

DESCRIPTION

Low-Cost Untraceable Authentication Protocols for RFID. Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February 5, 2010, Leuven. Outline of the talk. Challenges in RFID networks Security problems Privacy problems Cryptographic building blocks - PowerPoint PPT Presentation

Citation preview

Page 1: Low-Cost Untraceable Authentication Protocols for RFID

Low-Cost Untraceable Authentication Protocols for

RFID

Yong Ki Lee, Lejla Batina,Dave Singelée, Ingrid

Verbauwhede

BCRYPT workshop on RFID SecurityFebruary 5, 2010, Leuven

Page 2: Low-Cost Untraceable Authentication Protocols for RFID

Outline of the talk Challenges in RFID networks

Security problems Privacy problems

Cryptographic building blocks ECC-based authentication protocols Search protocol Hardware architecture Conclusion

Page 3: Low-Cost Untraceable Authentication Protocols for RFID

RFID technology

Radio Frequency Identification as we explain it to Dave’s tech-savvy grandmother:

1. Passive tag2. Battery assisted (BAP)3. Active tag with onboard power source

Page 4: Low-Cost Untraceable Authentication Protocols for RFID

RFID applications Asset tracking Barcode replacement RFID passports Mobile credit card payment systems Transportation payment systems Sporting events (timing / tracing) Animal identification …

Page 5: Low-Cost Untraceable Authentication Protocols for RFID

RFID security problems (I)

Impersonation attacks Genuine readers Malicious tags

=> Tag-to-server authentication

Page 6: Low-Cost Untraceable Authentication Protocols for RFID

RFID security problems (II)

Eavesdropping Replay attacks Man-in-the-middle attacks Cloning Side-channel attacks …

Page 7: Low-Cost Untraceable Authentication Protocols for RFID

RFID privacy problems (I)

[A. Juels. RSA Laboratories]

Mr. Jones in 2020

Page 8: Low-Cost Untraceable Authentication Protocols for RFID

RFID privacy problems (II)

[A. Juels. RSA Laboratories]

Mr. Jones in 2020

Wigmodel #4456 (cheap polyester)

Das Kapital and Communist-

party handbook

1500 Eurosin wallet

Serial numbers:597387,389473

…30 items of lingerie

Replacement hipmedical part #459382

Page 9: Low-Cost Untraceable Authentication Protocols for RFID

RFID privacy problems (III) RFID Privacy problem

Malicious readers Genuine tags

=> Untraceability

Page 10: Low-Cost Untraceable Authentication Protocols for RFID

RFID privacy problems (IV)

Untraceability Inequality of two tags: the (in)equality

of two tags must be impossible to determine

Theoretical framework of Vaudenay [ASIACRYPT ‘07]: Narrow vs wide privacy Weak vs strong privacy

Page 11: Low-Cost Untraceable Authentication Protocols for RFID

Cryptographic authentication protocol

Tag proves its identity Security (entity authentication) Privacy

Challenge-response protocol

Reader Tag

Challenge

Response

Page 12: Low-Cost Untraceable Authentication Protocols for RFID

Technological requirements Scalability Implementation issues

Cheap implementation Memory Gate area

Lightweight Efficient

=> Influence on cryptographic building blocks

Page 13: Low-Cost Untraceable Authentication Protocols for RFID

Implementation cost Symmetric encryption

AES: 3-4 kgates

Cryptographic hash function SHA-3: 10 – 30 kgates)

[ECRYPT II: SHA-3 Zoo]

Public-key encryption Elliptic Curve Cryptography (ECC): 11-15 kgates

=>Public key cryptography is suitable for RFID

Page 14: Low-Cost Untraceable Authentication Protocols for RFID

ECC-based authentication protocols

Rely exclusively on ECC !!! Wide-strong privacy Two sub-modules

ID-transfer scheme Pwd-transfer scheme

Combination => 3 protocols Computational requirements Security requirements

Page 15: Low-Cost Untraceable Authentication Protocols for RFID

System parameters

Page 16: Low-Cost Untraceable Authentication Protocols for RFID

16

Example: Secure ID Transfer

Server: y

Tag: x1, Y=yP

T1

T2

rt1 € Z T1← rt1 P

rs1 € Z

T2←( rt1 + x1)P

(y-1T2 – T1) ( ) -1= x1P

1sr

1s

r

1s

r

Page 17: Low-Cost Untraceable Authentication Protocols for RFID

ID-transfer scheme (protocol 1)

Page 18: Low-Cost Untraceable Authentication Protocols for RFID

ID + Pwd-transfer scheme (protocol 3)

Page 19: Low-Cost Untraceable Authentication Protocols for RFID

Search protocol (I) Linear search: scalability issues Search for one particular tag Design requirements:

One-round authentication Dedicated authentication Security against replay attacks Wide-weak privacy

Combine with ECC-based authentication protocol

Page 20: Low-Cost Untraceable Authentication Protocols for RFID

Search protocol (II)

Page 21: Low-Cost Untraceable Authentication Protocols for RFID

Hardware architecture

Page 22: Low-Cost Untraceable Authentication Protocols for RFID

Performance comparison

Circuit Area (Gate Eq.) 14,566

Cycles for EC point multiplication

59,790

Frequency 700 KHz

Power 13.8 µW

Energy for EC point multiplication

1.18 µJ

Page 23: Low-Cost Untraceable Authentication Protocols for RFID

Conclusion

Security & privacy in RFID networks Challenging research problem Public-key cryptography is suitable

for RFID tags ECC hardware implementation Wide-strong authentication protocols Search protocol

Page 24: Low-Cost Untraceable Authentication Protocols for RFID

Questions??

Page 25: Low-Cost Untraceable Authentication Protocols for RFID

EXTRA SLIDES

Page 26: Low-Cost Untraceable Authentication Protocols for RFID

Pwd-transfer scheme

Page 27: Low-Cost Untraceable Authentication Protocols for RFID

ID + Pwd-transfer scheme (protocol 2)