Peeling Away Layers of an RFID Security System

@inproceedings{Pltz2011PeelingAL,
  title={Peeling Away Layers of an RFID Security System},
  author={Henryk Pl{\"o}tz and Karsten Nohl},
  booktitle={Financial Cryptography},
  year={2011}
}
  • H. PlötzK. Nohl
  • Published in Financial Cryptography 28 February 2011
  • Computer Science
The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. [] Key Result Beyond these card weaknesses, we find that Legic's trust delegation model can be abused to create master tokens for all Legic installations.

A Toolbox for RFID Protocol Analysis

This paper proposes three tools for the analysis of RFID protocols that facilitate message eavesdropping and emulation of both tags and readers, and focuses on high frequency tags but one of them also supports low frequency.

RFID communication: How well protected against reverse engineering?

  • A. MednisR. Zviedris
  • Computer Science
    2012 Second International Conference on Digital Information Processing and Communications (ICDIPC)
  • 2012
A method for reverse engineering of specific RFID system used for time measurements during sporting events using off-the-shelf hardware and software with the aim to simulate a non-existing RFID tag with certain self selected ID number is presented.

Wirelessly lockpicking a smart card reader

R reverse engineered all security mechanisms in the HID iClass including cipher, authentication protocol and also key diversification algorithms, which are published in full detail, and found six critical weaknesses that are exploited in two attacks, one against iClass Standard and one againstiClass Elite.

Do you trust the cryptography used in your devices

The goal of COSICs research activities is to create a secure electronic equivalent for interactions in the physical world such as confidentiality, signatures, identification, anonymity, payment and

The (in)security of proprietary cryptography

The technical part of this doctoral dissertation presents serious weaknesses in widely deployed proprietary cryptosystems, which are still actively used by billions of consumers in their daily lives.

Dismantling iClass and iClass Elite

R reverse engineered all security mechanisms in the HID iClass including cipher, authentication protocol and key diversification algorithms, which are published in full detail, and found six critical weaknesses that are exploited in two attacks, one against iClass Standard and one againstiClass Elite.

Radboud Repository of the Radboud University Nijmegen

R reverse engineered all security mechanisms in the HID iClass including cipher, authentication protocol and key diversification algorithms, which are published in full detail, and found six critical weaknesses that are exploited in two attacks, one against iClass Standard and one againstiClass Elite.

Security analysis of a widely deployed locking system

This paper reverse-engineered the radio protocol and cryptographic primitives used in an electronic locking system which is still widely deployed in the field and discovered some implementation flaws that allow the extraction of a system-wide master secret with a brute force attack or by performing a Differential Power Analysis attack to any electronic key.

Outsmarting smart cards

References

SHOWING 1-6 OF 6 REFERENCES

Reverse-Engineering a Cryptographic RFID Tag

This paper reconstructs the cipher from the widely used Mifare Classic RFID tag by using a combination of image analysis of circuits and protocol analysis, and reveals that the security of the tag is even below the level that its 48-bit key length suggests due to a number of design flaws.

Security Analysis of a Cryptographically-Enabled RFID Device

The results suggest that an attacker with modest resources can emulate a target DST after brief short-range scanning or long-range eavesdropping across several authentication sessions, and that the cryptographic protection afforded by the DST device is relatively weak.

Cryptographic Implementation of a Tree Hierarchy for Access Control

  • R. Sandhu
  • Computer Science, Mathematics
    Inf. Process. Lett.
  • 1988

Reversing CRC { Theory and Practice

This work presents methods providing solutions to the problem of detecting data corruption in the process of data transmission or storage by explaining in theory and accompanied by an implementation for the CRC32 in the C programming language.

Article ISO14443 " in the openpcd wiki, section " LEGIC RF " , revision as of 00

  • Article ISO14443 " in the openpcd wiki, section " LEGIC RF " , revision as of 00
  • 2010

ISO 14443 Part 2 Amendment 1, dRAFT 2nd P-DAM BALLOT TEXT 3. PROXMARK III community

  • ISO 14443 Part 2 Amendment 1, dRAFT 2nd P-DAM BALLOT TEXT 3. PROXMARK III community