Wirelessly lockpicking a smart card reader

被引:0
|
作者
Flavio D. Garcia
Gerhard de Koning Gans
Roel Verdult
机构
[1] University of Birmingham,School of Computer Science
[2] Radboud University Nijmegen,ICIS
关键词
Embedded security; RFID; Practical cryptanalysis ; Reverse engineering;
D O I
暂无
中图分类号
学科分类号
摘要
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment systems. The card uses 64-bit keys to provide authenticity and integrity. The cipher and key diversification algorithms used in iClass are proprietary, and little information about them is publicly available. In this paper, we have reverse engineered all security mechanisms in the card including cipher, authentication protocol and also key diversification algorithms, which we publish in full detail. Furthermore, we have found six critical weaknesses that we exploit in two attacks, one against iClass Standard and one against iClass Elite (a.k.a., iClass High Security). In order to recover a secret card key, the first attack requires one authentication attempt with a legitimate reader and 222\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{22}$$\end{document} queries to a card. This attack has a computational complexity of 240\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{40}$$\end{document}MAC computations. The whole attack can be executed within a day on ordinary hardware. Remarkably, the second attack which is against iClass Elite is significantly faster. It directly recovers the system-wide master key from only 15 authentication attempts with a legitimate reader. The computational complexity of this attack is lower than 225\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{25}$$\end{document}MAC computations, which means that it can be fully executed within 5 seconds on an ordinary laptop.
引用
收藏
页码:403 / 420
页数:17
相关论文
共 50 条
  • [1] Wirelessly lockpicking a smart card reader
    Garcia, Flavio D.
    Gans, Gerhard de Koning
    Verdult, Roel
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (05) : 403 - 420
  • [2] SMART CARD READER
    LIM, CH
    DAN, YH
    LAU, KT
    CHOO, KY
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (01) : 6 - 12
  • [3] Secure smart card reader design
    Martinez-Pelaez, Rafael
    Rico-Novella, Francisco
    Satizabal, Cristina
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2008, : 276 - +
  • [4] Simple PC smart card reader
    Gueulle, P
    [J]. ELECTRONIC DESIGN, 1996, 44 (14) : 113 - 114
  • [5] On the design of an embedded biometric smart card reader
    Kim, Dong-Sun
    Lee, Seung-Yerl
    Kim, Byung-Soo
    Lee, Sung-Chul
    Chung, Duck-Jin
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2008, 54 (02) : 573 - 577
  • [6] Implementation of Smart Card Reader Using CPLD
    Patil, Jayashri
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTERS AND DEVICES FOR COMMUNICATION (CODEC 2009), 2009, : 57 - 60
  • [7] Simple PC smart card reader enhancement
    Cossio, JC
    [J]. ELECTRONIC DESIGN, 1997, 45 (04) : 172 - 172
  • [8] Hybrid smart card and magnetic stripe reader
    How, N
    [J]. MICROELECTRONICS JOURNAL, 1997, 28 (04) : R21 - R21
  • [9] Digital design of a cryptographic card (LAM) embedded smart card reader
    Margaronis, Panagiotis
    Kostantinos, Lambrinoudakis
    Stefanos, Gritzalis
    Emmanouil, Antonidakis
    [J]. PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 569 - +
  • [10] Smart Card Reader APDU Simulation Using Zybo
    Malingkas, Reynhart Isaac
    Swastika, Adi Candra
    Adiono, Trio
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND SMART DEVICES (ISESD), 2017, : 196 - 201