RFID-hack hits 1 billion digital access cards worldwide

David G. Koontz david_koontz at xtra.co.nz
Wed Mar 12 18:26:10 EDT 2008


http://computerworld.co.nz/news.nsf/scrt/3FF9713E23292846CC25740A0069243E

The Dutch government has issued a warning about the security of access keys
that are based on the widely used Mifare Classic RFID chip.


The warning comes in a week when two research teams independently
demonstrated hacks of the chip's security algorithm.


Criminals can use the hack to clone cards that use the Mifare Classic chip,
allowing them to create copies of building access keys or commit identity theft.


The chip is used in payment systems worldwide, such as the Oyster Card in
the UK and the CharlieCard that is used in Boston. Both offer payment
systems that allow for wireless transactions.


The chip is the basis of a national proof-of-payment system for public
transport. A recently published government-issued study by the Netherlands
Organisation for Applied Scientific Research dismissed the potential
security threat, claiming that hackers would take at least two years to
crack the security codes.


(The article is short enough it is hard to do fair-use justice.)

The cryptanalysis:
http://www.cs.virginia.edu/~kn5f/pdf/Mifare.Cryptanalysis.pdf

A March 12th Press Release from Radboud University Nijmegen:
http://www2.ru.nl/media/pressrelease.pdf
In HTML:
http://www.ru.nl/ds/group/ds_group/press_release/

A link to a demo video on Youtube:
http://www.ru.nl/ds/group/ds_group/press_release/film/

Run time is 1:55, 4.9 MB and a Flash Video
The demo is an attack on a door security system.

A recent report stating that it would take at least two years for the
cryptographic algorithm to be broken and used casually (From the video I'd
say this is optomistic by almost two years):
http://www.translink.nl/media/bijlagen/nieuws/TNO_ICT_-_Security_Analysis_OV-Chipkaart_-_public_report.pdf

A Mifare+ fix for the security weaknesses is announced (Mar 12th):
http://www.thetechherald.com/article.php/200811/394

On Monday NXP Semiconductors said they plan to release a new version of the
Mifare chip; the chip that has gained fame lately after its security was
broken by researchers at U. VA. Dubbed the Mifare Plus, the new chip
addresses the exact security problems that its predecessor the Mifare
Classic faced. The new NXP offering is boasting 128-bit encryption over the
original 48-bit.


The NXP press release:
http://www.nxp.com/news/content/file_1418.html

There are a couple of things of note.  They are seeking EAL-4+ evaluation
rating (which Windows 2000 has), it uses AES 128 bit encryption, and it has
backward compatibility with the 48 bit encryption,  Also the new cards won't
be available until Q4.

The cost of infrastructure upgrade (equipment cost versus card processing
delay) might cause an adoption lag.

NXP Semiconductors also claims to lead the car access and immobilzation markets.

















---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list