Within the next fortnight, we will issue the next issue of security newsletter. Our guest will be Antoine Joux. The main topics will we the latest crack of WEP, how to predict the future using MD5, the security of MPLS and the analysis of the hack of file encryption software by Princeton team.
Category Archives: Book/Paper
KeeLoq hacked
KeeLoq is a RFID system that protects many anti-theft cards, and garage openers. Already some published cryptanalysis highlighted the weaknesses of the cipher. But the attack were not practical. A group of six German and Iranian researchers designed a set of very practical attacks.
Using Differential Power Attack (DPA), they were able to extract the device key . What is impressive is that they did the attack without the knowledge of the chip. They were working with a black box. For instance, they had to guess when the encryption process occurred. They extract the device key in less than one hour Of course, DPA required physical access to the emitting device. The performed a similar attack to extract the manufacturer from the receiver. It took less than one day.
With this information, by eavesdropping a receiver, it is possible to impersonate it. They extract the seed, the secret and the current counter value. The counter value has to been “loosely” synchronized with the one of the receiver. Of course, by impersonating the emitter, it is easy to desynchronize the receiver from the genuine emitter. The owner of the genuine emitter will have to push his key 2^15 times to open his door. Nice denial of service.
This is the second hack of RFID security in a month. Recently it was NXP Mifare that was hacked. Once more, the security of a RFID was too weak. It has at least two types of known flaws:
- a weak LFSR based cipher
- No protection against side channel attacks.
The industry of secure processors is aware of these types of weaknesses for about one decade and fights them. It is time, that RFID industry adapts also to them. Is it compatible with the price constraints.
A paper at Eurocrypt08 will present this attack. The details of the attacks are available on Ruhr University site
Babel tower
I am currently reading the last book of Olivier BOMSEL: “Gratuit, du déploiement de l’économie numérique”. This book is extremely interesting, as the previous essays of Olivier. Olivier BOMSEL is a French economist who focuses on the economy of the digital industry. His opinions are often provocative. I will probably come back to this book several times.
This book illustrates the network effect on digital economy. He presents an interesting biblical example: the tower of Babel. By introducing new languages, God broke the network effect that made the building of the tower possible.
This raised a question: Is Babel tower better for security or bad? The answer is difficult. There are arguments for both positions.
- On one hand, the more a secure system is deployed, the more it may be studied by the community. Thus, we may expect to have a more secure system.
- On the other hand, the more a secure system is deployed, the more it may be attacked. Furthermore, the attackers may have access to better documentation and have a deeper knowledge. Thus be more efficient
- Another negative argument is that if there would one unique secure system, then a class attack would affect a complete ecosystem. This may be extremely dangerous.
Thus, once more, no Manichean answers.
By the way, according to Olivier BOMSEL’s book, the incident of the tower of Babel may be a good thing for humanity. It obliged mankind to spread all over the world. :Wink:
RFID and weak security
NXP Mifare Classic RFID chips are widely used in transportation or access control in Europe. NOHL Karsten, a researcher, publishes a cryptanalysis of this chip (the paper). His analysis demonstrates that the design was extremely weak. The cipher uses a LSFR and a 48-bit key.
It is obvious that the design was weak. Nevertheless, the main design constraint was probably to have a small number of gates for the implementation to reduce the cost. The security assumed that this algorithm would stay secret, in other words violating the principle of Kerckoffs. Furthermore, using a 48 bit key was inadequate. Currently, it is recommended to have at least a 90 bit key. With 48 bit key, it is easy to have a brut force attack.
Is it a problem? It depends on the application using the chip and its security assumptions. If the hypothesis is that the chip is extremely secure, than the answer is that it is an error. If the goal is to protect low cost assets, then the answer is right solution. As always, security is not simple and Manichean.
Forecasts: RFID will spread. Due to this massive use, cost constraints will be such that we will anticipate that many RFID chip will implement weak algorithm but with low cost. I will surely report many such events.