10.14489/vkit.2016.07.pp.030-033 |
DOI: 10.14489/vkit.2016.07.pp.030-033 Левина А. Б., Слепцова Д. М. Аннотация. Изучена уязвимость систем радиочастотной идентификации к атакам по сторонним каналам. Выявлены уязвимости в дизайне криптоалгоритма Crypto-1. Даны описания результатов атаки по электромагнитному излучению на карту, использующую протокол Mifare Classic. Приведен план дальнейшего улучшения характеристик атаки. Ключевые слова: атаки по сторонним каналам; радиочастотная идентификация; анализ электромагнитного из-лучения; протокол Mifare Classic.
Levina А. B., Sleptsova D. M. Abstract. RFID (Radio-Frequency IDentification) systems consist of a reader device and passive tags, powered from an electromagnetic field created by a reader. Majority of applications of such systems operate on secret data or financial information, e.g. person identification systems or fare systems. For this reason main part of their operation relies on cryptographic protocols, preserving confidentiality of secret information in transfer or storage. Security estimations of RFID-systems seldom include vulnerabilities to side-channel attacks. Said attacks exploit vulnerabilities in physical implementation of cryptosystem and provide opportunity to recover secret key of a system which is not vulnerable to classical cryptanalysis. In this paper side-channel attacks vulnerabilities of RFID-systems are studied. As a two main approaches to mounting an attack on Mifare Classic protocol power consumption and electromagnetic emanations are used. The attack vector is Crypto-1 algorithm, namely the moment of initialization of the LFSR (Linear Feedback Shift Register) with a secret key. Signal pre-processing included filtration, alignment and decimation of signal. Obtained signal depending on the exploited channel was compared to hypothetical values of power consumption or electromagnetic emanation, acquired on modeling step of the attack. Basis for model of Crypto-1 register was Hamming distance, obtained and hypothetical vectors comparison was made by means of correlation coefficient. As a result full key stored on a tag was recovered. Computing correlation coefficient and key recovery took 4 hours. Current lab setup has long signal acquisition and pre-processing time, that in the future can be shortened by using hardware pre-processing or oscilloscope made in the form of a PCI (Peripheral Component Interconnect) card. Conducted work shows possibility of side-channel exploitation of RFID-systems and proves it with a practical attack on a widely deployed system based on Mifare Classic protocol. Keywords: Side-channel attacks; Radio-Frequency Identification; Electromagnetic analysis, Mifare Classic protocol.
РусА. Б. Левина, Д. М. Слепцова (Санкт-Петербургский национальный исследовательский университет информационных технологий, механики и оптики, Санкт-Петербург, Россия) E-mail: Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript EngА. B. Levina, D. M. Sleptsova (Saint-Petersburg University of Information Technologies, Mechanics and Optics, Saint-Petersburg, Russia) E-mail: Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript
Рус1. ГОСТ Р ИСО/МЭК 14443-1–2013. Карты идентификационные. Карты на интегральных схемах бесконтактные. Карты близкого действия. Часть 1. Физические характеристики. Введ. 2015-01-01. М.: Стандартинформ, 2014. 14 с. Eng1. Identification cards. Integrated circuit contactless cards. Vicinity card. Part 1. Physical characteristics. (2014). Ru Standard No. GOST R ISO/MEK 14443-1–2013. Russian Federation. Moscow: Standartinform. [in Russian language]
РусСтатью можно приобрести в электронном виде (PDF формат). Стоимость статьи 350 руб. (в том числе НДС 18%). После оформления заказа, в течение нескольких дней, на указанный вами e-mail придут счет и квитанция для оплаты в банке. После поступления денег на счет издательства, вам будет выслан электронный вариант статьи. Для заказа статьи заполните форму: {jform=1,doi=10.14489/vkit.2016.07.pp.030-033} . EngThis article is available in electronic format (PDF). The cost of a single article is 350 rubles. (including VAT 18%). After you place an order within a few days, you will receive following documents to your specified e-mail: account on payment and receipt to pay in the bank. After depositing your payment on our bank account we send you file of the article by e-mail. To order articles please fill out the form below: {jform=2,doi=10.14489/vkit.2016.07.pp.030-033}
. .
|