RFID and Its Vulnerability to Faults

作者: Michael Hutter , Jörn-Marc Schmidt , Thomas Plos

DOI: 10.1007/978-3-540-85053-3_23

关键词:

摘要: Radio Frequency Identification (RFID) is a rapidly upcoming technology that has become more and important also in security-related applications. In this article, we discuss the impact of faults on kind devices. We have analyzed conventional passive RFID tags from different vendors operating High (HF) Ultra-High (UHF) band. First, consider been enforced globally affecting entire chip. induced caused by temporarily antenna tearing, electromagnetic interferences, optical inductions. Second, locally using focused laser beam. Our experiments led us to result are exceedingly vulnerable during writing data stored into internal memory. show it possible prevent as well allow faulty values. both cases, confirm operation be successful. conclude fault analysis poses serious threat context considered if cryptographic primitives embedded low-cost tags.

参考文章(33)
Julien Iguchi-Cartigny, Jean-Louis Lanet, Dieter Gollmann, Smart Card Research and Advanced Application ,(2011)
Guillaume Poupard, Jacques Stern, Security analysis of a practical “on the fly” authentication and signature generation theory and application of cryptographic techniques. ,vol. 1403, pp. 422- 436 ,(1998) , 10.1007/BFB0054143
François-Xavier Standaert, Gilles Piret, Neil Gershenfeld, Jean-Jacques Quisquater, SEA: A Scalable Encryption Algorithm for Small Embedded Applications Smart Card Research and Advanced Applications. ,vol. 3928, pp. 222- 236 ,(2006) , 10.1007/11733447_16
Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm Lecture Notes in Computer Science. pp. 357- 370 ,(2004) , 10.1007/978-3-540-28632-5_26
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee, HIGHT: a new block cipher suitable for low-resource device cryptographic hardware and embedded systems. pp. 46- 59 ,(2006) , 10.1007/11894063_4
Markus G. Kuhn, Oliver Kömmerling, Design principles for tamper-resistant smartcard processors WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology. pp. 2- 2 ,(1999)
Thomas Plos, Susceptibility of UHF RFID tags to electromagnetic analysis the cryptographers track at the rsa conference. pp. 288- 300 ,(2008) , 10.1007/978-3-540-79263-5_18
Markus Kuhn, Ross Anderson, Tamper resistance: a cautionary note WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 1- 1 ,(1996)
M. McLoone, M. J. B. Robshaw, Public Key Cryptography and RFID Tags Lecture Notes in Computer Science. pp. 372- 384 ,(2006) , 10.1007/11967668_24
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9