Feds Rethinking RFID Passport
By Kim Zetter

http://www.wired.com/news/privacy/0,1848,67333,00.html

Following criticism from computer security professionals and civil libertarians about the privacy risks posed by new RFID passports the government plans to begin issuing, a State Department official said his office is reconsidering a privacy solution it rejected earlier that would help protect passport holders' data.

The solution would require an RFID reader to provide a key or password before it could read data embedded on an RFID passport's chip. It would also encrypt data as it's transmitted from the chip to a reader so that no one could read the data if they intercepted it in transit.

Frank Moss, deputy assistant secretary for passport services, told Wired News on Monday that the government was "taking a very serious look" at the privacy solution in light of the 2,400-plus comments the department received about the e-passport rule and concerns expressed last week in Seattle by participants at the Computers, Freedom and Privacy conference. Moss said recent work on the passports conducted with the National Institute of Standards and Technology had also led him to rethink the issue.

"Basically what changed my mind was a recognition that the (reading distance) may have actually been able to be more than 10 centimeters, and also recognition that we had to do everything possible to protect the security of people," Moss said.1

Reading distance refers to the distance from which an RFID chip can be read. The new RFID passports, or e-passports, were designed with a contactless chip in the back cover, which allows officials to read electronic data on a passport from a distance, using an electronic reader. The distance depends on the design of the chip and the reader.

The government had long maintained that the passport chips to be used could be read from only 10 cm away. But at least one test showed that a reader could read a passport chip from 30 feet away. And Barry Steinhardt, director of the Technology and Liberty Program for the American Civil Liberties Union, demonstrated a chip being read from two to three feet away at the Computers, Freedom and Privacy conference last week.

Because the government had decided not to encrypt data contained on passport chips, the chips exposed passport holders to privacy risks, such as skimming and eavesdropping.

Skimming occurs when an intruder with a reading device in the vicinity of the passport holder surreptitiously reads the electronic information on the chip without the passport holder knowing. Eavesdropping occurs when an intruder intercepts data as it's being transmitted from the chip to an authorized reader.

It turns out, however, that a solution to prevent skimming and eavesdropping was actually proposed a while ago, but U.S. officials rejected it.

The International Civil Aviation Organization, which created the international specifications for countries adopting RFID passports, designed specifications (.pdf) for a process called Basic Access Control.

Basic Access Control, or BAC, works this way: The data on a passport would be stored on an RFID chip in the passport's back folder, but the data would be locked and unavailable to any reader that doesn't know a secret key or password to unlock the data. To obtain the key, a passport officer would need to physically scan the machine-readable text that's printed on the passport page beneath the photo (this usually includes date of birth, passport number and expiration date). The reader would then hash the data to create a unique key that could be used to authenticate the reader and unlock the data on the RFID chip.

Basic Access Control prevents skimming because it doesn't allow remote readers to access data on the passport without the passport being physically opened and scanned through a reader. It also prevents eavesdropping since it would encrypt the communication channel that opens when the data is sent from the chip to the reader.

Moss said the solution was originally rejected because the United States never planned to include more data on the RFID chip than what could be easily read simply by looking at the passport. That being the case, they believed that anti-skimming technology, such as metal fibers in the passport cover, would prevent anyone from surreptitiously reading a passport as long as it was closed

"We originally thought that the chip could not be read at a distance of more than 10 cm (when the passport was open)," Moss said. "We now find that perhaps there are some more serious threats in the area of read ranges.... The use of BAC now gives you additional protection when the book is actually open."

Moss said the German government and other members of the European Union had embraced BAC because they planned to write more data to the chip than just the written data that appears on the passport photo page. Many countries plan to include at least two fingerprints, digitized, in their passport chips.

Several vendors have already built and tested readers that function with BAC. A report (.pdf) of the tests reveals that the method actually works, although it takes twice as long to read a passport using BAC than a passport that doesn't use BAC.

"(The results) are mixed, quite honestly, and that's one of the issues we're still working through," Moss said. "Part of the problem is that the BAC technology ... is not quite as mature right now with some of the other technologies. That's one of the other reasons we've had some trepidation about taking this step, but we're increasingly convinced that it's the right way to go, that the technology is getting there."

Moss said there would be meetings next week in Ottawa and in Lyon, France, later in May to iron out some issues regarding the international standards for BAC. Moss said his department would need to determine what impact, if any, BAC might have on the production schedule of passports to determine whether the government's planned rollout of the passports would still occur on time.

There are some minor flaws with BAC, which are detailed in a paper (.pdf), written by Ari Juels of RSA Technologies; David Wagner, professor of computer science at the University of California at Berkeley; and UC Berkeley graduate student David Molnar.

"The bottom line is that BAC isn't perfect, but it's better than what we have now," Molnar said.

The ACLU's Barry Steinhardt was cautious about praising the State Department's move.

"It's an improvement over the current proposal," Steinhardt said. "It sounds at least as if they're beginning to be concerned that there are security concerns with the current proposal. Whether they've really fixed them we'll have to wait and look at the specifications. But I don't understand why it's necessary to have an RFID chip at all in light of these security concerns. There are other technologies that are more proven that are available."

But cryptographer Phil Zimmermann, who created Pretty Good Privacy, the popular, free e-mail encryption and authentication program, thinks BAC is the way to go if the government plans to use RFID. In fact, Zimmermann proposed a plan to Moss at the Computers, Freedom and Privacy conference that mirrored Basic Access Control, although he didn't know at the time that the government had already considered such a plan.

"The State Department would be able to end the threat of skimming and eavesdropping by using Basic Access Control," Zimmermann said. "It's obviously the right thing to do."


Reply with a "Thank you" if you liked this post.

_______________________________________________

MEDIANEWS mailing list
medianews@twiar.org

To unsubscribe send an email to:
[EMAIL PROTECTED]



Reply via email to