26.12.2014 Views

bachelor

bachelor

bachelor

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.3 Grades of security 11<br />

contract object, respectively (which can also be assumed to be one per<br />

card.)<br />

These values are probably available to the back-office system.<br />

known that the card transaction number is, see page 52 in [6].<br />

At least it is<br />

1.3 Grades of security<br />

One argument used in the defense of Rejsekortet has been that it implements<br />

several layers of security, and that if one of the layers are broken the other ones<br />

will act redundantly. The layers implemented are the Mifare proprietary crypto,<br />

DES-MAC checksums for the important blocks on the card, and finally a nightly<br />

inspection of the database to determine if users have tried to fool the system in<br />

some way.<br />

1.3.1 Mifare / Crypto-1<br />

Mifare implements a proprietary cryptosystem, Crypto-1, to protect the contents<br />

of the card. The cipher has been proved to be rather weak, and recent<br />

attacks allow an adversary to decrypt and dump the contents of the card in<br />

minutes, see 1.3.1.1.<br />

Crypto-1 is a stream cipher with a key size of 48 bits, but further description is<br />

not in the scope of this thesis. A more detailed description of the cryptosystem<br />

can be found in [2].<br />

1.3.1.1 Mifare insecurities<br />

Because of the market penetration of Mifare it is a very attractive target for<br />

cryptographic attacks. Mifare implements a proprietary cryptosystem called<br />

Crypto-1, which has been proven insufficient by some recent scientific papers.<br />

The most serious attack is presented by Garcia et. al. in a paper called “Wirelessly<br />

Pickpocketing a Mifare Classic Card”[3]. The attack is called the Nested<br />

Authentication attack, and allows an adversary to recover encryption keys for<br />

any sector given the key for just one. This enables an attacker to quickly recover<br />

all keys for a card, given just one. In short, the attack works by being able to

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!