bachelor
bachelor
bachelor
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Contents<br />
Summary<br />
Resumé<br />
Preface<br />
Acknowledgements<br />
i<br />
iii<br />
v<br />
ix<br />
1 On Rejsekortet 1<br />
1.1 History of the project . . . . . . . . . . . . . . . . . . . . . . . . 3<br />
1.2 Technology and card layout . . . . . . . . . . . . . . . . . . . . . 5<br />
1.3 Grades of security . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />
1.4 Problem definition . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />
2 Security analysis and threat model 29<br />
2.1 Threat model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />
2.2 Attack classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br />
2.3 Analysis of the security . . . . . . . . . . . . . . . . . . . . . . . 34<br />
3 Attacks on Rejsekortet 41<br />
3.1 Rollback attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br />
3.2 Attacking the MAC . . . . . . . . . . . . . . . . . . . . . . . . . 47<br />
3.3 Masquerading attacks . . . . . . . . . . . . . . . . . . . . . . . . 75<br />
3.4 Attacks on the infrastructure . . . . . . . . . . . . . . . . . . . . 80<br />
3.5 Vandalism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84<br />
4 Improvements 89<br />
4.1 Improvements since version 1 and 2 . . . . . . . . . . . . . . . . . 90<br />
4.2 Other immediately applicable improvements . . . . . . . . . . . . 96