26.12.2014 Views

bachelor

bachelor

bachelor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Contents<br />

Summary<br />

Resumé<br />

Preface<br />

Acknowledgements<br />

i<br />

iii<br />

v<br />

ix<br />

1 On Rejsekortet 1<br />

1.1 History of the project . . . . . . . . . . . . . . . . . . . . . . . . 3<br />

1.2 Technology and card layout . . . . . . . . . . . . . . . . . . . . . 5<br />

1.3 Grades of security . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />

1.4 Problem definition . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

2 Security analysis and threat model 29<br />

2.1 Threat model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30<br />

2.2 Attack classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br />

2.3 Analysis of the security . . . . . . . . . . . . . . . . . . . . . . . 34<br />

3 Attacks on Rejsekortet 41<br />

3.1 Rollback attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br />

3.2 Attacking the MAC . . . . . . . . . . . . . . . . . . . . . . . . . 47<br />

3.3 Masquerading attacks . . . . . . . . . . . . . . . . . . . . . . . . 75<br />

3.4 Attacks on the infrastructure . . . . . . . . . . . . . . . . . . . . 80<br />

3.5 Vandalism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84<br />

4 Improvements 89<br />

4.1 Improvements since version 1 and 2 . . . . . . . . . . . . . . . . . 90<br />

4.2 Other immediately applicable improvements . . . . . . . . . . . . 96

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!