Risk of Using RFID chips in Passports Oscar Mendez.

Slides:



Advertisements
Similar presentations
Isiah Collins. mathematical scheme for demonstrating the authenticity of a digital message or document. (Wiki) A way to protect important documents sent.
Advertisements

12 November 2002Digital Identity Forum – London Biometrics and ID Bill Perry Independent Consultant Phone:
Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
Nairobi, Kenya 29-31October Fifth Special Meeting of the Counter- Terrorism Committee with International, Regional and Subregional Organizations.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy A. Juels, R. L. Rivest, and M. Szydlo 8th ACM Conference on Computer and Communications.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Dynamic Key-Updating: Privacy- Preserving Authentication for RFID Systems Li Lu, Lei Hu State Key Laboratory of Information Security, Graduate School.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Security in RFID Presented By… NetSecurity-Spring07
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
SHERA USHER RFID in Humans. Brief History of RFID RFID can be traced back to WWII Sir Robert Alexander Watson-Watt developed the first active.
RFID Technologies Master seminar : Tangible User Interfaces Bruno Dumas – DIVA Group University of Fribourg
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID passports How does is work? Step by step By: Einav Mimram.
EPC for Security Applications By Jacob Ammons & Joe D’Amato.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
Radio-Frequency Identification MBUS 626 IT Seminar Group 5 Kevin Frei Stephen Grant.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Securing Data in ePassports Policy Issues ICAO/NTWG.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Radio Frequency IDentification RFID Technology Presented by Elaine Contant University of Arkansas Libraries – Fayetteville December, 2008.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Status of IEEE A Suite of Smart Transducer Interface Standards for Sensors and Actuators November 28, 2006 Kang Lee
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
New Technologies and Travel Documents ICAO 12 th Meeting of the Facilitation Division Cairo March 23, 2004.
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Authors: Saar Drimer and Steven J. Murdoch Presented in: Usenix Security Symposium.
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
Types of Electronic Infection
The Emerging Global Identity & Tracking System October 28, 2004 Barry Steinhardt Director, Technology & Liberty Project American Civil Liberties Union.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Ivo Rosol, OKsystem Middleware.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Transmission Outage Process April Purpose In compliance with the Protocols and the Electric Reliability Council of Texas (ERCOT) Operating Guides,
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
DIGITAL SIGNATURE.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Azam Supervisor : Prof. Raj Jain
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
Information Systems Design and Development Security Precautions Computing Science.
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
TAG Presentation 18th May 2004 Paul Butler
Securing Data in ePassports
Managing Windows Security
Technical Report PKI for
TAG Presentation 18th May 2004 Paul Butler
New Technologies and Travel Documents
Securing Data in ePassports
RFID Ethical Implications
Team 7 Technical Presentation
Technical Report PKI for
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Security and Privacy Issues in E-Passports
Presentation transcript:

Risk of Using RFID chips in Passports Oscar Mendez

Department of State: Globally Interoperable It will not permit ``tracking'' of individuals. The new passport document is itself highly tamper resistant. The passport data on the chip does not require encryption in order to be secure and protected Source: Oscar Mendezhttp://edocket.access.gpo.gov/2005/ htm

Privacy And Security Concerns Access to Readers to the open market Other countries do not have the same standards for security. The passport can be read at a distance without the knowledge of the individual Americans can be a target when overseas Oscar Mendez

State department The contactless smart chip that is being used in the electronic passport is a ``passive chip'' that derives its power from the reader that communicates with it. It cannot broadcast personal information because it does not have its own source of power. Readers that are on the open market, designed to read Type A or Type B contactless chips complying with International Standards Organization (ISO) and ISO 7816 specifications, will be able to communicate with the chip. This is necessary to permit nations to procure readers from a variety of vendors, facilitate global interoperability and ensure that the electronic passports are readable at all ports of entry. Source: Oscar Mendezhttp://edocket.access.gpo.gov/2005/ htm

Technical information STMicroelectronics Manufacturer of read Type A or Type B contactless chips. Provided a complete technical information of the chips On the web. Everybody has access to this information. Oscar Mendez

Johns Hopkins University & RSA REVERSE ENGINEERED The Exxon-Mobil Speedpass uses a cryptographically-enabled tag manufactured by Texas Instruments, called the Digital Signature Transponder (DST), which incorporates a weak, proprietary encryption scheme to perform a challenge-response protocol. In 2005, researchers from RSA Labs and Johns Hopkins University reverse engineered the algorithm and were able to clone Speedpass tags. Oscar Mendez

From Vrije University Amsterdam Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify back-end software, and certainly not in a malicious way. Unfortunately, they are wrong. In our research, we have discovered that if certain vulnerabilities exist in the RFID software, an RFID tag can be (intentionall) infected with a virus and this virus can infect the backend database used by the RFID software. From there it can be easily spread to other RFID tags. No one thought this possible until now. Later in this website we provide all the details on how to do this and how to defend against it in order to warn the designers of RFID systems not to deploy vulnerable systems. Source: Oscar Mendezhttp://

The US State Department initially rejected privacy concerns on the grounds that they believed the chips could only be read from a distance of 10 cm (4 in), but in the face of 2,400 critical comments from security professionals, and a clear demonstration that special equipment can read the test passports from 10 m (33 feet) away, the proposal was reviewed. RFID passports will start to be issued in mass distribution in October 2006.[29] In November 2005, the State Department stated that as of October 2006 all US passports will contain RFID chips with some security features. The passports will be shielded to prevent skimming. The department will also implement Basic Access Control (BAC), which functions as a Personal Identification Number (PIN) in the form of characters printed on the passport data page. Before a passport's tag can be read, this PIN must be inputted into an RFID reader. The BAC also enables the encryption of any communication between the chip and interrogator. Oscar Mendez