rfid authentication: security, privacy and the real world · insider attacks requirements 2...

43
RFID Authentication: Security, Privacy and the Real World RFID Authentication: Security, Privacy and the Real World ESC 2013 Jens Hermans KU Leuven - COSIC 15 January 2013

Upload: others

Post on 03-Jul-2020

12 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Authentication:Security, Privacy and the Real World

ESC 2013

Jens HermansKU Leuven - COSIC

15 January 2013

Page 2: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Introduction

Cryptography in Daily Life

RFID

Page 3: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Introduction

Cryptography in Daily Life

Security - Why?

Page 4: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Introduction

Cryptography in Daily Life

Privacy - Why?

Das KapitalInsulin pump

UnderwearMembership

implant

Industrial espionage, user privacy

Page 5: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Introduction

Cryptography in Daily Life

Threat Analysis / Requirements

Privacy– +

Secu

rity

– Supply Chain Public Transport

Payments

+

Car Keys Access ControlPassports

Page 6: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

1 RFID Security & PrivacyProvable Security/PrivacyInsider AttacksRequirements

2 Protocols (Research)

3 Protocols (Industry)

4 Protocol DesignLightweight CryptographyDesignPerformance

5 Conclusions and Future Perspectives

Page 7: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

RFID Privacy: goals

ID = u0012345, S = ...

...

{ (ID=u0012345, P=...) , ...}ID = ?

Page 8: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

RFID Privacy: goals

ID = u0012345, S = ...

ID = u7654321, S = ...

Link?#Tags?

Page 9: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Different Privacy Solutions

Protocol Level Privacy

Kill Command

Destroy Tag

Shielding

(Read Range Reduction)

...

Page 10: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Provable Security/Privacy

Protocol Analysis

ID = u0012345, S = ...

...

{ (ID=u0012345, P=...) , ...}ID = ?

Properties:

Security

Privacy: untraceability

Allow corruption

Page 11: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Provable Security/Privacy

Provable Security & Privacy

Adversary

System

Adversary wins if ...

Page 12: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Provable Security/Privacy

Corrupting Tags

Page 13: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Provable Security/Privacy

Privacy Models - Indistinguishability

Encryption:

RO

IND-CPA

IND-CCA

IND-CCA2

...

A B Privacy-models:

Juels-Weis

Vaudenay

Hermans et al.

Page 14: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Provable Security/Privacy

Privacy Levels

Strong Forward

Wid

eNa

rrow

Weak

at end

at end

Page 15: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Provable Security/Privacy

Privacy Requirements

Privacy Level Application

Narrow Weak Supply Chain

Narrow Forward Smart Products

Wide Weak Car Keys

Wide Forward

PaymentsAccess TokensPassportsPublic Transport

Page 16: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Insider Attacks

Insider Attacks

Adversary

System

Insider Tag

Page 17: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

RFID Security & Privacy

Requirements

Privacy Requirements

Privacy Level Application

Narrow Weak Supply Chain

Narrow Forward Smart Products

Wide Weak Car Keys

PaymentsWide Forward + InsiderWide Forward + Insider Access TokensCurrently: Wide Strong Passports

Public Transport

Page 18: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

1 RFID Security & PrivacyProvable Security/PrivacyInsider AttacksRequirements

2 Protocols (Research)

3 Protocols (Industry)

4 Protocol DesignLightweight CryptographyDesignPerformance

5 Conclusions and Future Perspectives

Page 19: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

PRF (Block cipher) based [ISO/IEC 9798-2]

State: xj

Tag T

Secrets: DB = {xj}

Reader

c ∈R {0, 1}n

c

p ∈R {0, 1}m

r = Fx(c||p)

r, p

Search xj ∈ DBs.t.Fxj

(c||p) = r

Privacy

Wide-Weak

Page 20: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

Symmetric Key and Efficiency

Damgard-Pedersen ’08:

Independent keys: inefficient O(n)

Correlated keys:

efficient O(log(n))privacy loss

Key Updating

Higher Privacy Level (narrow forward)

Desynchronization Attacks / Efficiency Problems

Implementation cost?

Page 21: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

EC Schnorr ProtocolState: xj ,Y

Tag T

Secrets: y, DB = {Xj}

Reader

r ∈R Zℓ

R = rP

R 6= O?

e

e 6= 0?s = x+ er

s

X = sP − eR ∈ DB ?

Privacy

None

Page 22: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

Randomized Schnorr [BCI08]State: xj ,Y

Tag T

Secrets: y, DB = {Xj}

Reader

r1, r2 ∈R Zℓ

R1 = r1P ,R2 = r2Y

R1,R2 6= O?

e

s = ex+ r1 + r2

s

X = e−1(sP−R1−y−1R2) ∈ DB

Privacy

Narrow Strong

Page 23: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

Randomized Hash GPS [BCI09]State: xj ,Y

Tag T

Secrets: y, DB = {Xj}

Reader

r1, r2 ∈R Zℓ

R1 = r1P ,R2 = r2Y z = H(R1,R2)

R1,R2 6= O?

e

s = ex+ r1 + r2

s,R1,R2

Verify z

X = e−1(sP−R1−y−1R2) ∈ DB

Privacy

Narrow Strong and Wide Forward

Page 24: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

IND-CCA2 Encryption [Vau07]

State: sj, ID

Tag T

PK: KP . Secrets: DB = {sj}

Reader

c ∈R {0, 1}n

c

r = EncKP(ID||sj ||c)

r

ID||sj ||c← DecKS(r)

Search sj ∈ DB

Privacy

Wide Strong

Page 25: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

Performance

Protocol Privacy Ins. Ext. Snd. Operations

Schnorr no no yes 1 EC mult

Randomized Schnorr narrow-strong no yes 2 EC mult

Rand. Hashed GPS narrow-strong no yes 2 EC multwide-forward 1 hash

Vaudenay wide-strong yes no 2 EC mult+ DHIES 1 hash

1 MAC1 symm enc

Hash ElGamal wide-strong yes no 2 EC mult1 hash1 MAC

Page 26: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

Lightweight Cryptography?

Limits:

Area (➾➾➾)

Time

Power

Energy

Page 27: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Research)

Typical Ingredients for Protocols

Primitive Status

RNG OK?Key Update ???Block Cipher OKHash Function OK

ECC OK∑

???

Page 28: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Industry)

1 RFID Security & PrivacyProvable Security/PrivacyInsider AttacksRequirements

2 Protocols (Research)

3 Protocols (Industry)

4 Protocol DesignLightweight CryptographyDesignPerformance

5 Conclusions and Future Perspectives

Page 29: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Industry)

Scope

ISO/IEC JTC 1 SC31: Automatic identification and data capturetechniques

Features:

Tag authentication

Reader authentication

Mutual authentication

Secure data exchange

Target platform: passive & active tags.

Page 30: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocols (Industry)

Proposals

Protocol Tag

Auth

Reader

Auth

Mutual

Auth

Privacy

Block cipher based (3) X (X) (X)HB-2 X X X (X)Stream cipher based X X X

XOR ��❅❅X ��❅❅X ��❅❅XECC Static DH X

CryptoGPS X

ECDSA/DH TLS X X X

PK Encryption - Rabin X X X X

Page 31: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

1 RFID Security & PrivacyProvable Security/PrivacyInsider AttacksRequirements

2 Protocols (Research)

3 Protocols (Industry)

4 Protocol DesignLightweight CryptographyDesignPerformance

5 Conclusions and Future Perspectives

Page 32: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

New Protocol [Peeters, Hermans 2012]

Design protocol:

Correct

Extended soundness

(At least) Wide Forward + Insider privacy

Efficient

Page 33: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

EC Schnorr ProtocolState: xj ,Y

Tag T

Secrets: y, DB = {Xj}

Reader

r ∈R Zℓ

R = rP

R 6= O?

e

e 6= 0?s = x+ er

s

X = sP − eR ∈ DB ?

Page 34: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

Lightweight Elliptic Curve Cryptography

R

P

Q

x

y Implementation [LBSV10]:

Area (14.5 kGE)

Time (85ms)

Power (13.8 ➭W)

Energy (1.18 ➭J)

Page 35: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

Key Assumptions

Oracle Diffie-Hellman Assumption

(A = aP ,B = bP , abP) ∼ (A = aP ,B = bP , rP)

with extra O(Z ) := xcoord(bZ )P .

X Logarithm

xcoord(rP)P ∼ r ′P

Page 36: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

New Protocol

State: x,Y = yP

Tag T

Secrets: y DB : {Xi = xiP}

Reader R

r1, r2 ∈R Z∗

R1 = r1P ,R2 = r2P

e ∈R Z∗

e

d = xcoord(xcoord(r2Y )P )

s = x+ er1 + d

d = xcoord(xcoord(yR2)P )X = (s− d)P − eR1 ∈ DB ?

Page 37: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

New Protocol - Extended Soundness

State: x,Y = yP

Tag T

Secrets: y DB : {Xi = xiP}

Reader R

r1, r2 ∈R Z∗

R1 = r1P,R2 = r2P

e ∈R Z∗

e

d = xcoord(xcoord(r2Y )P )

s = x+ er1 + d

d = xcoord(xcoord(yR2)P )X = (s− d)P − eR1 ∈ DB ?

Extended SoundnessSchnorr protocol ⇒ extended soundness (OMDL assumption)

Page 38: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

New Protocol - Privacy

State: x,Y = yP

Tag T

Secrets: y DB : {Xi = xiP}

Reader R

r1, r2 ∈R Z∗

R1 = r1P ,R2 = r2P

e ∈R Z∗

e

d = xcoord(xcoord(r2Y)P)

s = x+ er1 + d

d = xcoord(xcoord(yR2)P)X = (s− d)P − eR1 ∈ DB ?

Page 39: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

Something symmetric?

Final step: s = x + d + er1

Assume set X = {x0, . . . , xn} and set I = {ι0, . . . , ιm}.

1 Adversary gets I

2 Set of oracles:

O1(α, β) :=

{

xα ⊕ di if b = 0

xβ ⊕ di if b = 1, di ∈R {0, 1}l

O2(s, i) := s ⊕ di ∈ X ∪ IO3(s) := s ∈ X ∪ I

3 Adversary gets X , outputs guess g

Page 40: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Design

Something for wide strong privacy?

Assume set X = {x0, . . . , xn}

1 Adversary gets X

2 Interact with oracles:

O1(α, β) :=

{

xαdi + ei if b = 0

xβdi + ei if b = 1, di , ei ∈R Zl

O2(s, i) := d−1i

(s − ei ) ∈ X

3 Output guess g .

Page 41: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Protocol Design

Performance

Performance

Protocol Privacy Ins. Ext. Snd. Operations

Schnorr no no yes 1 EC mult

Randomized Schnorr narrow-strong no yes 2 EC mult

Rand. Hashed GPS narrow-strong no yes 2 EC multwide-forward 1 hash

Vaudenay wide-strong yes no 2 EC mult+ DHIES 1 hash

1 MAC1 symm enc

Hash ElGamal wide-strong yes no 2 EC mult1 hash1 MAC

Our Protocol wide-forward-insider yes yes 4 EC mult- optimised version wide-forward-insider yes yes 2 EC mult

Wide-Strong protocol wide-strong yes yes 4-5 EC mult

Page 42: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Conclusions and Future Perspectives

Summary

Overview RFID Privacy

RFID Protocols

Implementation Aspects

New Private & Efficient RFID Protocol

Page 43: RFID Authentication: Security, Privacy and the Real World · Insider Attacks Requirements 2 Protocols (Research) 3 Protocols (Industry) 4 Protocol Design Lightweight Cryptography

RFID Authentication: Security, Privacy and the Real World

Conclusions and Future Perspectives

?