Re: Face and fingerprints swiped in Dutch biometric passport crack (anothercard skim vulnerability)

2006-02-03 Thread Jaap-Henk Hoepman

Actually, the international standards for the Machine Readable Travel Documents
(passports, aka MRTDs) are written by the International Civil Aviation
Organisation (ICAO).

Both the US and EU passports comply to the ICAO standards. However, EU
passports will be further protected by a so called Extended Access Control 
procedure. This procedure provides, among others, terminal authentication to
the passport, to reduce the risk that biometric data is read by rogue readers. 

Also, there are many small details in which the passports from different
countries may differ. For instance, the 'RFID' anti-collision identifier used
when setting up a connection between the passport and the reader may either be
fixed or generated randomly for each session. Or, as is indeed the case in the
Dutch passport, the passport number may correlate with the issuing date,
reducing the entropy of the key derived from the Machine Readbale Zone (MRZ).

The Riscure attack is based on this correlation; they estimate the remaining
entropy of the data on the MRZ to be roughly 2^35. This MRZ data is used to
derive the symmetric session keys. Their attack works by recording (ie
eavesdropping) a succesful communication session between a passport and a
reader. Then, all possible combinations of the MRZ data can be tried off line
to generate the corresponding session keys and check whether that succesfully
decrypts the recorded session.

Note that straighforward skimming, ie trying to access a passport with a fake
terminal by trying all possible combinations of MRZ data is still impossible
because the chip in the passport is slow to respond; even if you could try one
MRZ access code every millisecond (totally unrealistic), you'd be busy half a
year. This limits the usefulness of the attack a bit.

Also note that an encrypted key exchange like protocol for deriving the session
key from the MRZ access code would also have prevented this attack...

Jaap-Henk

On Thu, 2 Feb 2006 12:37:24 -0500 Adam Shostack [EMAIL PROTECTED] writes:
 On Wed, Feb 01, 2006 at 02:03:10PM -0500, [EMAIL PROTECTED] wrote:
 | Anne  Lynn Wheeler pointed out:
 | 
 |  Face and fingerprints swiped in Dutch biometric passport crack
 |  http://www.theregister.co.uk/2006/01/30/dutch_biometric_passport_crack/
 | 
 | Didn't the EU adopt the same design that the US uses?

 Passport standards are written by the International Air Travel
 Association (IATA).

 | Am I right to presume that the passport RFID chip used by the Dutch is the
 | same -- or functions the same -- as the one used in the new US digital
 | passports?
 | 
 | From what I've read, it seems that the sequential numbering scheme the
 | Dutch use on their passports may have made this attack easier -- but it
 | was already feasible, and will be against the passports of other nations
 | which did not so helpfully minimize their obfuscation technique with
 | sequential numbering?
 | 
 | Anyone got more details than those offered in the Rinscure press release?
 | Thoughts?

 The papers explain the attack in fair detail.  I blogged every useful
 linksI could find a few days ago at
 http://www.emergentchaos.com/archives/002355.html, and there's more
 links in comments.

 Adam

 | _Vin
 | 
 | 
 | 
 |  The crack is attributed to Delft smartcard security specialist Riscure,
 |  which explains that an attack can be executed from around 10 metres and
 |  the security broken, revealing date of birth, facial image and
 |  fingerprint, in around two hours.
 | 
 |  .. snip ..
 | 
 | 
 | -
 | The Cryptography Mailing List
 | Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



-- 
Jaap-Henk Hoepman   |  I've got sunshine in my pockets
Dept. of Computer Science   |  Brought it back to spray the day
Radboud University Nijmegen |Gry Rocket
(w) www.cs.ru.nl/~jhh   |  (m) [EMAIL PROTECTED]
(t) +31 24 36 52710/53132   |  (f) +31 24 3653137


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Face and fingerprints swiped in Dutch biometric passport crack (anothercard skim vulnerability)

2006-02-02 Thread vin
Anne  Lynn Wheeler pointed out:

 Face and fingerprints swiped in Dutch biometric passport crack
 http://www.theregister.co.uk/2006/01/30/dutch_biometric_passport_crack/

Didn't the EU adopt the same design that the US uses?

Am I right to presume that the passport RFID chip used by the Dutch is the
same -- or functions the same -- as the one used in the new US digital
passports?

From what I've read, it seems that the sequential numbering scheme the
Dutch use on their passports may have made this attack easier -- but it
was already feasible, and will be against the passports of other nations
which did not so helpfully minimize their obfuscation technique with
sequential numbering?

Anyone got more details than those offered in the Rinscure press release?
Thoughts?

_Vin



 The crack is attributed to Delft smartcard security specialist Riscure,
 which explains that an attack can be executed from around 10 metres and
 the security broken, revealing date of birth, facial image and
 fingerprint, in around two hours.

 .. snip ..


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Face and fingerprints swiped in Dutch biometric passport crack (anothercard skim vulnerability)

2006-02-02 Thread Adam Shostack
On Wed, Feb 01, 2006 at 02:03:10PM -0500, [EMAIL PROTECTED] wrote:
| Anne  Lynn Wheeler pointed out:
| 
|  Face and fingerprints swiped in Dutch biometric passport crack
|  http://www.theregister.co.uk/2006/01/30/dutch_biometric_passport_crack/
| 
| Didn't the EU adopt the same design that the US uses?

Passport standards are written by the International Air Travel
Association (IATA).

| Am I right to presume that the passport RFID chip used by the Dutch is the
| same -- or functions the same -- as the one used in the new US digital
| passports?
| 
| From what I've read, it seems that the sequential numbering scheme the
| Dutch use on their passports may have made this attack easier -- but it
| was already feasible, and will be against the passports of other nations
| which did not so helpfully minimize their obfuscation technique with
| sequential numbering?
| 
| Anyone got more details than those offered in the Rinscure press release?
| Thoughts?

The papers explain the attack in fair detail.  I blogged every useful
linksI could find a few days ago at
http://www.emergentchaos.com/archives/002355.html, and there's more
links in comments.

Adam

| _Vin
| 
| 
| 
|  The crack is attributed to Delft smartcard security specialist Riscure,
|  which explains that an attack can be executed from around 10 metres and
|  the security broken, revealing date of birth, facial image and
|  fingerprint, in around two hours.
| 
|  .. snip ..
| 
| 
| -
| The Cryptography Mailing List
| Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]