015 - E-Passport Global Traceability
015 - E-Passport Global Traceability
• Claimed Goals
• Protection of individuals against identity theft and forgery by storing
biometric information in a chip included in passports
• Better traceability of terrorists and other criminals
• Increase national security
14.7.2006, Slide 2
Current Situation
14.7.2006, Slide 4
Overview of E-Passport
• RFID Communication between secure chip and reader
• Distance passport – reader < 30cm
• Stored data on chip
– Name
– Passport No
– Date of birth
– Date of expiry
– Biometrical data (facial Image, fingerprint, …)
• Main cryptographic components
– Passive Authentication (mandatory)
uses digital signature by issuer (data signed)
– Active Authentication (optional)
deployed against anti-cloning
– Basic Access Control (BAC) (optional)
establish secure RFID communication
– Extended Access Control (ratified recently)
chip and terminal authentication
14.7.2006, Slide 5
Basic Access Control (BAC)
• Prevent unauthorized read access
• Key derived from data printed on the passport
(note: only a part of Machine Readable Zone MRZ)
– Passport No
– Date of birth
– Date of expiry
• Only an optional feature (specification)
32 32 32
128 128 128
Triple DES Keys for Basic Access
K_Seed K_ENC K_MAC Control
14.7.2006, Slide 6
BAC: Protocol Overview
Reader (IFD) MRTD (ICC)
RNDICC RNDICC ∈R {0,1}64
14.7.2006, Slide 9
Basic Idea of Tracking System
RFID Database MRTD Cracker
eavesdropper
encrypted
MRTD Data
Date, Time,
Location,
encrypted
MRTD Data
13,56+0,847
13,56-0,847
13,56
power
power
power
Amplifier Mixer
Antenna
13,56 Mhz PLL 847 kHz
Detector 13,56MHz Detector
14.7.2006, Slide 11
MRTD Cracker
• With precompution
– Compute possible K_ENC
eavesdropped Data
– Memory needed to store K_ENC
RNDICC, EICC
– Cracker computes 3DES
PC Cracker
MRZ computes Key computes
SHA-1 Database 3DES
• Without precompution
– Cracker computes SHA-1 and 3DES eavesdropped Data
RNDICC, EICC
Cracker
computes
MRZ
SHA-1 and 3 DES
14.7.2006, Slide 12
Implementations of Cracker
• Software based
– Low engineering cost
– Distributed computing
(computing nodes must be trusted)
• Hardware based
– ASIC
- cheap for large scale
- high non recovering engineering costs
– FPGA
- flexible architecture
- reasonable costs
- adaptation of Cost Optimized Parallel Code Breaker (COPACOBANA)
14.7.2006, Slide 13
Hardware based mrtd craker
stop
Counter Clock stop
Counter Clock stop
Counter Counter Clock stop
start value Counter Clock
(MRTD Data)
Crypto Engine
Crypto Engine A = B ? yes
Crypto Engine A = B ? yes
A´
A:= RNDICC SHA1 and 3 DES A = B ? yes
Engine A´ = B ? yes
B:= EK_ENC(A)
14.7.2006, Slide 14
COPACOBANA: Overview
14.7.2006, Slide 15
COPACOBANA: Architecture
FPGA Module 20
FPGA Module 1
FPGA
FPGA
FPGA FPGA
Controller Card FPGA
FPGA
to FPGA FPGA
FPGA
PC FPGA
USB FPGA FPGA
FPGA
FPGA
FPGA FPGA
yesFPGA
yesFPGA
yesFPGA yesFPGA
FPGA FPGA
FPGA
Controller FPGA FPGA
14.7.2006, Slide 16
Conclusion
• Global tracking of e-passport holders is a real threat
• We introduced a system architecture consisting of RF eavesdropper and MRTD
cracker
• Security and privacy of citizens must be protected when carrying and
using e-passports
• RFID technology in this context must realize privacy laws
– All basic principles of data protection law have to be observed when designing, implementing and
using RFID technology (see Marc Langheinrich‘s talk)
• Further technical discussion need regarding security evaluation (protocols), maintenance (PKI
issues, trust relations/models) and future changes
14.7.2006, Slide 17
Further Work
14.7.2006, Slide 18