37
Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial ides © 2011, RSA Laboratories

Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Embed Size (px)

Citation preview

Page 1: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Introduction to RFID Security and

Privacy

Ari Juels

Chief Scientist

RSA, The Security Division of EMC

RFIDSec 2011 Tutorial

All slides © 2011, RSA Laboratories

Page 2: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Part II: RFID Privacy

Page 3: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

There are two types of RFID privacy

1. Tracking privacy: Protection against physical tracking via unique identifiers

2. Content privacy: Protection against unauthorized scanning of data stored on tag

Page 4: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Why physical considerations say we should forget about

tracking privacy…

Page 5: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Ms. Smith and her privacy-preserving RFID tag

“87D6CAA7F”

= “Ms. Smith”

Page 6: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Ms. Smith and her privacy-preserving RFID tag

What about PET(Privacy Enhancing Technologies) for pets?

Page 7: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Ms. Smith and her privacy-preserving RFID tag

What about Ms. Smith’s face?

Page 8: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Ms. Smith and her privacy-preserving RFID tag

What about Ms. Smith’s mobile phone?

Page 9: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Ms. Smith and her privacy-preserving RFID tag

Are we still worried aboutthis circle???

Page 10: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Well, suppose we are still worried…

We can change identifiers, right?

“87D6CAA7F”

“5ED6CF4C8”

“9816F271BB”

“D7612A873C”

Page 11: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Changing identifiers won’t work

• Physical-Layer Identification of RFID Devices– Danev, Heydt-Benjamin, and Capkun– USENIX Security ’09

• Extract hardware “fingerprint” based on power modulation

• Show that it is possible to identify RFID tags over the air with > 2% at ERR– This will improve, of course

Logical Layer(data,

crypto protocols)

Physical Layer(power

modulation)

r

s, fx(r,s)

Page 12: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

• What does this mean for the dozens of paper on anti-tracking privacy?

• I’d argue that we should give up on anonymity– Not just in RFID

• Emphasis on content privacy makes more sense

Logical Layer(data,

crypto protocols)

Physical Layer(power

modulation)

r

s, fx(r,s)

Serial #878SBE871

“Oxycontin, 160 mg”

Changing identifiers won’t work

Page 13: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Content Privacy via “Blocker” Tags

Page 14: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

The “Blocker” Tag

Page 15: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

“Blocker” TagBlocker simulates all (billions of) possible tag serial numbers!!

1,2,3, …, 2023 pairs of sneakers and…1800 books and a washing machine and…(reading fails)…

Page 16: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

“Tree-walking” anti-collision protocol for RFID tags

000 001 010 011 100 101 110 111

00 01 10 11

0 1

?

Page 17: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

In a nutshell• “Tree-walking” protocol for identifying tags

recursively asks question:– “What is your next bit?”

• Blocker tag always says both ‘0’ and ‘1’! – Makes it seem like all possible tags are present– Reader cannot figure out which tags are actually

present– Number of possible tags is huge (at least a billion

billion), so reader stalls

Page 18: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Two bottlesof Merlot#458790

Blocker tag system should protect privacy but stillavoid blocking unpurchased items

Page 19: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Consumer privacy + commercial security

• Blocker tag can be selective:– Privacy zones: Only block certain ranges of RFID-

tag serial numbers – Zone mobility: Allow shops to move items into

privacy zone upon purchase• Example:

– Blocker blocks all identifiers with leading ‘1’ bit– Items in supermarket carry leading ‘0’ bit– On checkout, leading bit is flipped from ‘0’ to ‘1’

• PIN required, as for “kill” operation

Page 20: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Blocking with privacy zones

000 001 010 011 100 101 110 111

00 01 10 11

0 1

Transfer to privacy zoneon purchase of item

Privacy zone

Page 21: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Polite blocking• We want reader to scan privacy zone when

blocker is not present– Aim of blocker is to keep functionality active – when

desired by owner

• But if reader attempts to scan when blocker is present, it will stall!

Your humble servant requests that you not scan the privacy zone

• Polite blocking: Blocker informs reader of its presence

Page 22: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

More about blocker tags

• Blocker tag can be cheap–Essentially just a “yes” tag and

“no” tag with a little extra logic–Can be embedded in shopping

bags, etc.• With multiple privacy zones,

sophisticated, e.g., graduated policies are possible

Page 23: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

An Example: The RXA Pharmacy

Page 24: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

RFID-tagged bottle + “Blocker” bag

Page 25: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

RFID-tagged bottle + “Blocker” bag

Page 26: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

“Soft” Blocking

• Idea: Implement polite blocking only – no hardware blocking– A little like P3P…

• External audit possible: Can detect if readers scanning privacy zone

• Advantages:– “Soft blocker” tag is an ordinary RFID tag– Flexible policy:

• “Opt-in” now possible• e.g., “Medical deblocker” now possible

• Weaker privacy, but can combine with “hard” blocker

Page 27: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Smart blocking approach: Personal Simulator or Proxy for

RFID• Those phones with NFC could someday

get more general-purpose radios…• We might imagine a simulation lifecycle:

– Mobile phone “acquires” tag when in proximity– Mobile phone simulates tags to readers,

enforcing user privacy policy– Mobile phone “releases” tags when tags

about to exit range

Page 28: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Content Privacy via Dispersion

Page 29: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Keeping the customer satisfied…

• “I want a rock-solid encryption algorithm… with 20-bit keys.”

• “I want my retail stores to be able to read RFID-tagged items… but I want tags to be unreadable after sale… and I don’t want to have to kill or rewrite or block them…

Page 30: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

EPC tags and privacy• Recall that EPC tags have no true

cryptographic functionality• One true, explicit EPC privacy feature: Kill

– On receiving tag-specific PIN, tag self-destructs– Tag is “dead in the Biblical sense” (S. Sarma)

• But commercial RFID users say:– They do not want to manage kill PINs– They have no channel to communicate secret

keys downstream in supply chain– Key transport is a big problem!!!

Page 31: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Our approach: Put the secret keys on the tags

• Encrypt tag data under secret key • Apply secret sharing to spread key across tags in crate

– E.g., (s1, s2,, s3)

E (m1) s1

E (m2) s2

E (m3) s3

Page 32: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

• Encrypt tag data under secret key • Apply secret sharing to spread key across tags in crate

– E.g., (s1, s2,, s3)

E (m1) s1

E (m2) s2

E (m3) s3

Our approach: Put the secret keys on the tags

Supersteroids 500mg; 100 countSerial #87263YHGMfg: ABC Inc.Exp: 6 Mar 2010

Page 33: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Privacy through dispersion

Page 34: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Privacy through dispersion E (m1) s1

E (m2) s2

E (m3) s3

Individual shares / small sets reveal no information about medication!

(Super-Steroids)

(Super-Steroids)

(Super-Steroids)

Page 35: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Use case: Privacy protection on medications

Step 1: Receive crateat pharmacy

Step 2: Pharmacy readstags, gets keys, decryptsdata

Step 3: Tags and dataare dispersed

Data

Page 36: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Some challenges1. Storage is at a premium in EPC, but no secret-sharing

literature on “tiny” shares• “Short” shares are 128 bits, but we may want 16 bits or less!

2. Scanning errors• We need robustness in our secret-sharing scheme

Page 37: Introduction to RFID Security and Privacy Ari Juels Chief Scientist RSA, The Security Division of EMC RFIDSec 2011 Tutorial All slides © 2011, RSA Laboratories

Some challenges3. In-store key harvesting

• Preventive idea: Add “chaff,” i.e., bogus or “noise” shares• If secret-sharing scheme for crate can tolerate d errors, then add

2d/3 bogus shares per crate• Can recover from d/3 errors in single crate• Hard to reconstruct secrets for two crates mixed together, as we

have 4d/3 > d errors• “Overinformed” adversary