Professional safecrackers use a stethoscope to find the correct combination by listening to the clicks of the lock. Researchers at the Ruhr-University Bochum have now demonstrated how to bypass the security mechanisms of a widely used contactless smartcard in a similar way. Employing so-called “Side-Channel Analysis” the researchers of the Chair for Embedded Security (Prof. Dr.-Ing. Christof Paar) can break the cryptography of millions of cards that are used all around the world.
Measuring the electro-magnetic field
RFID smartcards (Radio Frequency Identification) of the type DESFire MF3ICD40 are widely employed in payment and access control systems. The security of these cards is based on Triple-DES, a cipher that is unbreakable from a purely mathematic point of view. DESFire cards are for instance used by the public transport agencies in Melbourne, San Francisco and Prague. The DESFire MF3ICD40 is manufactured by NXP, the former semiconductor division of Philips Electronics.
Fluctuations of the magnetic field
A person is identified as a passenger, employee or customer when his RFID smartcard is placed in the proximity of a reader. To guarantee the necessary level of security, a secret key is stored on the integrated chip inside the card. But just like for the safe, the security mechanism produces the electronic equivalent of the clicks of a mechanic lock. “We measured the power consumption of the chip during the encryption and decryption with a small probe”, says David Oswald. The fluctuations of the electro-magnetic field allow the researchers to conclude to the full 112-bit secret key of the smartcard.
Low cost, big damage
Having extracted the keys, an attacker can create an unlimited number of undetectable clones of a given card. The required time and effort are quite low: “For our measurements, we needed a DESFire MF3ICD40 card, an RFID reader, the probe and an oscilloscope to measure the power consumption”, says Oswald. This equipment only costs a few thousand euros. Having obtained knowledge on the characteristic properties of the smartcard, the attack takes three to seven hours. The manufacturer NXP confirmed the security hole in the meanwhile and recommends his customers to upgrade to a newer version of the card.
Already back in 2008, researchers around Prof. Dr.-Ing. Christof Paar used Side-Channel Analysis to break supposedly secure systems. Three years ago, garage and car doors “mysteriously” opened for the researchers of the Chair for Embedded Security. The employed KeeLoq RFID system – which customers and manufacturers trusted blindly before – turned out to be highly susceptible to Side-Channel Analysis.
Prof. Dr.-Ing. Christof Paar, Chair for Embedded Security, Building ID 2/607, Tel. +49 234 32 22994, email@example.com
Dr. Josef König | idw
No more traffic blues for information transfer: decongesting wireless channels
11.11.2019 | Tokyo University of Science
A new quantum data classification protocol brings us nearer to a future 'quantum internet'
11.11.2019 | Universitat Autonoma de Barcelona
Carbon nanotubes (CNTs) are valuable for a wide variety of applications. Made of graphene sheets rolled into tubes 10,000 times smaller than a human hair, CNTs have an exceptional strength-to-mass ratio and excellent thermal and electrical properties. These features make them ideal for a range of applications, including supercapacitors, interconnects, adhesives, particle trapping and structural color.
New research reveals even more potential for CNTs: as a coating, they can both repel and hold water in place, a useful property for applications like printing,...
If you've ever tried to put several really strong, small cube magnets right next to each other on a magnetic board, you'll know that you just can't do it. What happens is that the magnets always arrange themselves in a column sticking out vertically from the magnetic board. Moreover, it's almost impossible to join several rows of these magnets together to form a flat surface. That's because magnets are dipolar. Equal poles repel each other, with the north pole of one magnet always attaching itself to the south pole of another and vice versa. This explains why they form a column with all the magnets aligned the same way.
Now, scientists at ETH Zurich have managed to create magnetic building blocks in the shape of cubes that - for the first time ever - can be joined together to...
Quantum-based communication and computation technologies promise unprecedented applications, such as unconditionally secure communications, ultra-precise...
In two experiments performed at the free-electron laser FLASH in Hamburg a cooperation led by physicists from the Heidelberg Max Planck Institute for Nuclear physics (MPIK) demonstrated strongly-driven nonlinear interaction of ultrashort extreme-ultraviolet (XUV) laser pulses with atoms and ions. The powerful excitation of an electron pair in helium was found to compete with the ultrafast decay, which temporarily may even lead to population inversion. Resonant transitions in doubly charged neon ions were shifted in energy, and observed by XUV-XUV pump-probe transient absorption spectroscopy.
An international team led by physicists from the MPIK reports on new results for efficient two-electron excitations in helium driven by strong and ultrashort...
An international research group has observed new quantum properties on an artificial giant atom and has now published its results in the high-ranking journal Nature Physics. The quantum system under investigation apparently has a memory - a new finding that could be used to build a quantum computer.
The research group, consisting of German, Swedish and Indian scientists, has investigated an artificial quantum system and found new properties.
05.11.2019 | Event News
30.10.2019 | Event News
02.10.2019 | Event News
13.11.2019 | Physics and Astronomy
13.11.2019 | Physics and Astronomy
13.11.2019 | Materials Sciences