Attacking and Defending RFID Systems Matthew Green Johns Hopkins University - PowerPoint PPT Presentation

1 / 75
About This Presentation
Title:

Attacking and Defending RFID Systems Matthew Green Johns Hopkins University

Description:

Defeating simple Immobilizers. Immobilizer System. Many (older) designs use simple RFID chips ... Defeating a DST Immobilizer. Get response from original key. ... – PowerPoint PPT presentation

Number of Views:153
Avg rating:3.0/5.0
Slides: 76
Provided by: matthe235
Category:

less

Transcript and Presenter's Notes

Title: Attacking and Defending RFID Systems Matthew Green Johns Hopkins University


1
Attacking and Defending RFID SystemsMatthew
GreenJohns Hopkins University
2
Who am I?
  • Ph. D. student, Johns Hopkins University
    Information Security Institute
  • Advisor Dr. Avi Rubin
  • Work funded, conducted jointly with RSA
    Laboratories
  • Dr. Ari Juels, Michael Szydlo
  • Fellow Students
  • Stephen Bono, Adam Stubblefield

3
Overview
  • RFID Tags Introduction and Background
  • General security/privacy threats
  • Examination of fielded systems
  • E-ZPass
  • TI DST-40 (Speedpass, Immobilizer)

4
Radio Frequency Identification
  • Limited computing device
  • Identification, data storage, cryptography
  • Contactless Integrated RF transceiver
  • Communicates with RFID reader
  • Range lt1cm to 0.5km

5
Radio Frequency Identification
  • Basic RFID simply broadcast an ID
  • Simple, short/medium range RF protocol
  • May include collision detection

Activate
ID0987654
6
Active vs. Passive Tags
  • Active tags contain internal power
  • Long scan range, greater capabilities
  • Larger form factor, higher cost
  • Limited battery life

Request
ID0987654
7
Active vs. Passive Tags
  • Passive tags receive power from reader
  • Small, low cost
  • Shorter read range (several feet max)
  • Tag capabilities limited by available power

Power
ID0987654
8
Low-Cost RFID Tags
  • RF Barcode
  • Tag contains fixed serial number
  • No line-of-sight, scan many items
  • Severely limited devices
  • Cost is dominating factor
  • .50 to lt.05 goal cost
  • Dominates Moores law
  • Security by obscurity or physical limitations

9
Wireless Authentication Devices
  • Higher cost range, more capability
  • Up to 5 per transponder
  • Cryptography, challenge-response
  • Applications
  • Access control/Theft deterrence
  • Electronic Payment and Toll Collection

10
Challenge/Response Authentication
  • Authentication using cryptography
  • Secret never broadcast over the air
  • Challenge is always different

(Power), Challenge 8394839
Response 3434323
Encryption Algorithm, SECRET
Encryption algorithm, SECRET KEY
11
Capabilities and Applications
Tag Capabilities
Applications
Identification Data storage (R/W)
Retail, supply-chain
Symmetric crypto (challenge response)
Electronic payment Building/facility access
control Vehicle Immobilizers
Public key crypto (challenge response)
High-security e-payment Advanced features, privacy
Increasing Cost, Size Power Consumption
12
But in the Real World
  • Tag capabilities dont always match the
    application
  • Identification-only tags used for security
    applications, e.g.,
  • Building access control (prox cards)
  • Vehicle immobilizers

13
Defeating simple Immobilizers
  • Immobilizer System

Many (older) designs use simple RFID chips
ID Number
ID Number
QUERY?
ID Number
14
Defeating simple Immobilizers
  • How to clone a key
  • Scan target key, get ID number.

Query?
ID Number
15
Defeating simple Immobilizers
  • How to clone a key
  • Scan targets key, get ID number.
  • Replay response to vehicle.

QUERY?
Cloned ID
16
Our Work
17
Our Questions
  • Are RFID systems being deployed securely?
  • Are secure technologies secure?
  • Practical attacks?
  • Why were asking them
  • If we dont ask, who will?

18
The Process
  • Examine widely-deployed platforms
  • Reverse-engineer devices/protocols
  • Overcome physical reader limitations
  • Study cloning and tracking
  • Other attacks on protocol or device

19
Our Targets
  • EZ-Pass
  • ExxonMobil Speedpass (TI DST)

20
E-ZPass
  • High-speed toll collection
  • Widely deployed
  • Real
  • Large read distance
  • Reader, protocol not available to the public

21
The E-ZPass System
  • Tags interrogated by fixed readers
  • Signal read at highway speeds
  • Deliberately limited range within booths, but can
    (possibly) extend to 100 ft

22
E-ZPass Transponder
  • Active (powered) transponder
  • Frequency of Operation 915/914MHz
  • Data transmit rate 300-500Kbps

23
Anatomy of an E-ZPass
Receive Filters
Receiver
Control Chip
Battery
Transmitter
Antenna
Transmit Filters
24
Determining the Protocol
  • Bad news Tags dont do anything until theyre
    activated.
  • Good news We have tags, a car, and plenty of
    toll-booths!

25
Software Radio Approach
  • Snoop the toll-booth protocol using software and
    commodity PC hardware

900MHz RF Transaction
Antenna
E-ZPass Reader
Transverter (900MHz -gt 40MHz)
ADC Board
Software-tunable Radio (0-60MHz) -gt (lt20Mhz)
26
Franken-Pass Shortcut
  • Tag already has antenna and transceiver
    equipment, so lets use it

E-ZPass Reader
ADC Board
27
Franken-Pass
Tx/Rx Lines
E-ZPass Reader
PC
28
Field Test 1
  • Location Fort McHenry Tunnel Toll booths,
    Baltimore Harbor

29
Field Test 1
  • Equipment list
  • Modified M-Tag
  • PCI-DAS4020 DAC Card
  • Shuttle XPC SG85

30
The EZ-Pass Protocol
  • Stage 1

20 µsec activation pulse
31
The EZ-Pass Protocol
  • Stage 2

20 µsec activation pulse
516 µsec response (256 bits CRC?) Manchester
Encoded
32
The EZ-Pass Protocol
  • Stage 3

20 µsec activation pulse
516 µsec response (256 bits CRC)
OPTIONAL 256-bit write phase ?
33
Attacking EZ-Pass
  • Plenty of power, plenty of read range but no
    security in the tag
  • Toll booth cameras
  • No protection against tracking
  • Anyone can activate the tag, potentially track
    hundreds of cars
  • Not so useful for us, though FCC regs limit
    activation power
  • Doesnt affect eavesdropping

34
Texas Instruments DST
  • Vehicle Immobilizers

ExxonMobil Speedpass
35
Texas Instruments DST
  • Operating Frequency 134 KHz
  • Power Passive
  • Read range 1ft
  • Security challenge/response protocol
  • 40-bit challenge, 40-bit key, 24-bit response

36
DST Immobilizers
  • Challenge/Response Immobilizer System

Uses random challenge and cryptography
40-bit Key
40-bit Key
ChallengeX
ResponseY
37
DST-40 Operation
DST-40
Reader
40-bit Challenge
40-bit Challenge, 40-bit Key
40-bit Response
24-bit Serial, (Truncated) 24-bit Response
Challenge, Key
Tags Response
Encryption Algorithm
compare
38
What is ?
  • TI Proprietary block cipher
  • Available by NDA only
  • Even with good cipher, 40-bit key is a major
    weakness
  • Brute force guessing
  • Full precomputed key table 5TB

39
DST Immobilizers
  • Defeating a DST Immobilizer
  • Get response from original key.

ChallengeX
ResponseY
40
DST Immobilizers
  • Defeating a DST Immobilizer
  • Get response from original key.
  • Recover secret key.

41
Security Analysis
  • Getting Started
  • Purchase TI micro-reader evaluation kit (400).
  • Reader, antenna.
  • Publicly available.
  • Write a better interface.
  • Makes analysis easier.

42
Security Analysis
  • Bad security feature
  • Uses a secret value to create CRC.
  • All transponders share the same secret value.
  • Guessed secret value with computer in lt 1 ms.

Transponder

Reader
General Read
Data (S/N, etc)
CRC
Program Passcode
Key (40-bit)
CRC
43
Security Analysis
  • Initial Experiments

Secret code 0x0000000000
Challenge 0x0000000000 0x2222222222 0x5555555555 0
x7777777777 0x8888888888 0xAAAAAAAAAA 0xDDDDDDDDDD
0xFFFFFFFFFF
Response 0x000000 0x222222 0x555555 0x777777 0x888
888 0xAAAAAA 0xDDDDDD 0xFFFFFF
44
Security Analysis
  • Initial Experiments

Secret code 0x0000000000
Challenge 0xFFFFFFFFFF 0xFFFFFFFFFD 0xFFFFFFFDFF 0
xFFFFFDFFFF 0xFFFDFFFFFF 0xFDFFFFFFFF
Response 0xFFFFFF 0xFFFFFF 0xFFFFFF 0xFFFFFD 0xFFF
DFF 0xFDFFFF
45
Security Analysis
  • Initial Experiments

Secret code 0x0000000000
Challenge 0xFFFFFFFFFF 0xFFFFFFFFFD 0xFFFFFFFDFF 0
xFFFFFDFFFF 0xFFFDFFFFFF 0xFDFFFFFFFF
Response 0xFFFFFFFFFF 0xFFFFFFFFFD 0xFFFFFFFDFF 0x
FFFFFDFFFF 0xFFFDFFFFFF 0xFDFFFFFFFF
46
(No Transcript)
47
Walking Backwards
Known initial 40-bit challenge
challenge
400 shifts later...
Known 24-bit signature
signature
48
Walking Backwards
challenge
Guess next challenge See if it yields next
signature Repeat...
shifted chal
signature
shifted sig
49
(No Transcript)
50
(No Transcript)
51
200
52
Single round output tests
53
?
? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
?
?
?
?
?
?
?
54
?
? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
?
?
?
?
?
?
55
?
?
?
56
? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
?
?
?
?
?
57
Security Analysis
  • We have the cipher, what now?
  • Make a software version.
  • Guess a secret key
  • 40-bit secret keys are not very strong
  • 1,099,511,627,776 possible secrets.
  • Brute-force attack
  • Send a Speedpass a challenge, record the
    response.
  • Encrypt challenge with all possible secrets.
  • Find which one produces the correct response.

58
Security Analysis
  • How fast can you guess?
  • Software is slow
  • 200,000 encryptions / sec.
  • On average, takes 31 days.
  • Hardware is fast
  • Commercially available FPGA (200).
  • 16 million encryptions / sec.
  • On average, takes 9 hours.

59
Security Analysis
  • How fast can you guess?
  • More FPGAs
  • 16 x 16 million encryptions / sec.
  • On average, takes 35 minutes.
  • More Faster

60
Security Analysis
  • How fast can you guess?
  • Huge storage table
  • RAID array storage system.
  • 5,000 Gigabytes.
  • Expensive (10-15k).
  • On average, takes lt 1 s.

61
Security Analysis
  • How fast can you guess?
  • Time/Memory Tradeoff
  • Best of both worlds.
  • Inexpensive (lt1000).
  • On average, takes lt 1 minute.
  • Very portable.


62
Real World Testing
Scanning a Victim (http//rfidanalysis.org)
Equipment TI evaluation kit, laptop
63
Real World Testing
  • Extracting the secret passcodes
  • 16 FPGAs, average time 35 min.
  • Cracked Speedpasses and Immobilizer chips.

64
The Mobilizer
Emulating a real transponder Big, Bulky
Prototype. Small PC (1000). DAC Board
(1000). UPS (300). Eval kit antenna
(50). Custom software (Free).
65
Real World Testing
Emulating a real transponder A 1st Generation
Device (not actually built). FPAA (200). FPGA
(200). Homemade Antenna (0).

66
Real World Testing
Field Tests (http//rfidanalysis.org)
67
More practical attacks
Making this easier. A device that does everything
for you...
Recover ID
Transmit ID
68
Speedpass
Making this easier. Copied tag can be used
anywhere. Charges directly to victims credit
card.
69
Fixing the problem
  • Immediate Fixes
  • Very few
  • Systems too widely deployed for simple upgrade.
  • Tin foil works.
  • Diligence on the part of the consumer.

70
Fixing the problem
  • Long term Fixes
  • Use standard encryption algorithms.
  • AES, HMAC-SHA1, 3DES
  • No security through obscurity.
  • No single-tag compromise should compromise the
    whole system.
  • As with the secret checksum values.
  • Use longer key lengths.
  • If that is not possible, understand this
    limitation!

71
Conclusions
  • Widely deployed systems offer no, or limited
    security
  • Solutions on the way, however
  • Privacy protection (tracking) not considered
  • Attacks are practical-- RF interface cant even
    stop computer scientists!

72
The Paper
  • S. Bono, M. Green, A. Stubblefield, A. Rubin, A.
    Juels, M. Szydlo.Analysis of a
    Cryptographically-Enabled RFID Device, Usenix
    Security 2005
  • http//rfidanalysis.org

73
(No Transcript)
74
The DST (or How not to fix the problem)
  • Mutual Authentication
  • Make the reader authenticate itself to the tag
  • Stops attackers from gathering challenge/responses
    (in theory)
  • Prevents tracking attacks
  • Double Encryption (two separate keys)
  • Encrypting twice must be twice as good

75
Problems with these approaches
  • Mutual Authentication
  • Another source of plaintext/ciphertext pairs,
    from the reader
  • Might actually enable key recovery WITHOUT access
    to a tag
  • May require that many tags share a key-- one
    compromised key defeats system
  • Double Encryption
  • Meet in the middle attacks
Write a Comment
User Comments (0)
About PowerShow.com