26.12.2014 Views

bachelor

bachelor

bachelor

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.3 Grades of security 13<br />

Common to the “Darkside” and nested authentication attacks is that they need<br />

only a Mifare card and a NFC-compatible reader. The readers are readily available<br />

online, currently priced at 30 e 9 .<br />

These attacks combined can recover all sector keys and dump a card in minutes<br />

on a laptop with a off-the-shelf NFC reader, even shorter time if the attacker<br />

has access to a “ProxMark” reader 10 , currently costing $330. There are numerous<br />

software projects that implement these attacks and provide read-write<br />

functionality for Mifare cards, among others libnfc 11 , mfcuk 12 , crapto1 13 and<br />

RFID IO tools 14 .<br />

1.3.2 MAC<br />

All of the security-critical sectors on Rejsekortet carry a checksum value calculated<br />

with the CBC-MAC algorithm using DES[6], to which the key is secret.<br />

This is to ensure that people do not modify the data in case they recovered the<br />

Mifare keys.<br />

The sectors carrying MACs must have the last 24 bits comprised of a “MAC<br />

algorithm identifier,” a “MAC key identifier” as well as a 16-bit MAC (page 58,<br />

[6] 15 ). The key identifier exists so that Rejsekort A/S can issue a new key if the<br />

old one has been compromised (in turn enabling an attacker to calculate the<br />

current MAC for some data stream), and likewise the algorithm can be changed<br />

if the current algorithm is deemed too weak.<br />

Moreover the sectors carry a field containing the ID of the key used to calculate<br />

the hash so that RKF can issue a new key in case one is broken.<br />

The non-critical sections have a CRC checksum instead of a MAC.<br />

9 http://www.touchatag.com/e-store<br />

10 http://proxmark3.com/<br />

11 http://www.libnfc.org/<br />

12 http://code.google.com/p/mfcuk/<br />

13 http://code.google.com/p/crapto1/<br />

14 http://www.rfidiot.org/<br />

15 The specification allows MACs longer than 16 bits, but in practice only 16-bit MACs are<br />

used[5].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!