WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

Similar documents
CREDENTSYS CARD FAMILY

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

Security & Chip Card ICs SLE 55R04. Intelligent 770 Byte EEPROM with Contactless Interface complying to ISO/IEC Type A and Security Logic

Cryptographic Concepts

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Hitachi Releases Smart Card Microcontroller AE45X series Equipped with Contact/Contactless Dual Interface in a Single Chip

A Multi-Application Smart-Card ID System for George Mason University. - Suraj Ravichandran.

Security in NFC Readers

Connecting Securely to the Cloud

Security Policy for Schlumberger Cyberflex Access 32K Smart Card with ActivCard Applets

eh880 Secure Smart Card Terminal

SHORT FORM SPECIFICATION

UNIT - IV Cryptographic Hash Function 31.1

WAP Security. Helsinki University of Technology S Security of Communication Protocols

BL75R06SM 8K-bit EEPROM Contactless smart card chip

ID-One Cosmo V7-a Smart Card Cryptographic Module

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

APNIC elearning: Cryptography Basics

Security Target Lite SK e-pass V1.0

Smart Card ICs. Dr. Kaushik Saha. STMicroelectronics. CSME 2002 (Chandigarh, India) STMicroelectronics

IS23SC4439 Preliminary. 1K bytes EEPROM Contactless Smart Card Conform to ISO/IEC 14443A Standard. Table of contents

BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module

ACR880 GPRS Portable Smart Card Terminal

VendaCard MF1ICS50. major cities have adopted MIFARE as their e-ticketing solution of choice.

AT90SDC10X Summary Datasheet

Trojan-tolerant Hardware & Supply Chain Security in Practice

Atmel Trusted Platform Module June, 2014

Getting to Grips with Public Key Infrastructure (PKI)

Overview. SSL Cryptography Overview CHAPTER 1

Oberthur ID-One Cosmo 64 v5.4 D. FIPS Level 3. Security Policy. Public Version. Version 1.0. May 22, 2007

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

Past & Future Issues in Smartcard Industry

CSCE 715: Network Systems Security

UNC20C01R 1Kbyte EEPROM Contactless Card IC

Computer Security: Principles and Practice

User Authentication. Modified By: Dr. Ramzi Saifan

MF1ICS General description. Functional specification. 1.1 Key applications. 1.2 Anticollision. Energy. MIFARE card contacts La, Lb.

Watchdata W9110 Security Policy

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

SETECS OneCARD PIV II Java Card Applet. on Gemalto GemCombi'Xpresso R4 E72K PK card

ID-One PIV (Type A) FIPS Security Policy. (PIV Applet Suite on ID-One Cosmo V7-n) Public Version

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

Payment Card Industry (PCI) PIN Transaction Security (PTS) Hardware Security Module (HSM) Evaluation Vendor Questionnaire Version 2.

MM23SC8128RM Flash Security Turbo Microcontroller Smart Card Chip With 1024 bit RSA & Maths Co-processor

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

FIPS Level 3. Security Policy of Java Card Platform Implementation for Infineon on SLE 78 (SLJ 52GxxyyyzR) V1.0f. August Version 2.

The Gemalto offer for PKI market in Russia

9/30/2016. Cryptography Basics. Outline. Encryption/Decryption. Cryptanalysis. Caesar Cipher. Mono-Alphabetic Ciphers

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

DynaPro Go. Secure PIN Entry Device PCI PTS POI Security Policy. September Document Number: D REGISTERED TO ISO 9001:2008

FAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication

Embedded System Security. Professor Patrick McDaniel Charles Sestito Fall 2015

2 nd ETSI Security Workshop: Future Security. Smart Cards. Dr. Klaus Vedder. Chairman ETSI TC SCP Group Senior VP, Giesecke & Devrient

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen

ACR89 Handheld Smart Card Reader Technical Specifications. Datenblatt / Specifications

Advanced Mobile Payment Inc. AMP 6500

ABRIDGED DATA SHEET. DeepCover Secure Authenticator. Benefits and Features. General Description. Applications

PKI Knowledge Dissemination Program. PKI Standards. Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Security Requirements for Crypto Devices

The Future of Smart Cards: Bigger, Faster and More Secure

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Ezetap V3 Security policy

The Open Protocol for Access Control Identification and Ticketing with PrivacY

Enhanced Authentication Protocol EAP-TTLS using encrypted ECDSA

Cryptography Basics. IT443 Network Security Administration Slides courtesy of Bo Sheng

Advanced. Card. Systems. Ltd. by Eric Lee. June, Advanced Card Systems Ltd. Room 2910, The Center, 99 Queen's Road Central, Hong Kong.

(2½ hours) Total Marks: 75

Datenblatt / Specifications. ACR880 GPRS Portable Smart Card Terminal. idvation GmbH

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.

Cryptographic Systems

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

A hash function is strongly collision-free if it is computationally infeasible to find different messages M and M such that H(M) = H(M ).

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Technological foundation

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Design and Implementation of a RFC3161-Enhanced Time-Stamping Service

AMP 8200 Security Policy

Entrust IdentityGuard PIV Credential FIPS Cryptographic Module Security Policy Version: 1.0 Date: January 24, 2013

Introduction to Electronic Identity Documents

Secure UHF Tags with Strong Cryptography Development of ISO/IEC Compatible Secure RFID Tags and Presentation of First Results

Security of Biometric Passports ECE 646 Fall Team Members : Aniruddha Harish Divya Chinthalapuri Premdeep Varada

Certification Report

Strategies for the Implementation of PIV I Secure Identity Credentials

ALIKE: Authenticated Lightweight Key Exchange. Sandrine Agagliate, GEMALTO Security Labs

EAP-TLS Smartcards, from Dream to Reality

User Authentication. Modified By: Dr. Ramzi Saifan

MultiApp ID V2.1 Platform FIPS Cryptographic Module Security Policy

Secure Application Trend in Smartphones. STMicroelectronics November 2017

NIST Cryptographic Toolkit

Security. Communication security. System Security

Applied IT Security. Device Security. Dr. Stephan Spitz 10 Development Security. Applied IT Security, Dr.

Lecture 1 Applied Cryptography (Part 1)

Security Policy for. DAL C3 2 Applet Suite on Axalto Cyberflex Access 64Kv1 Smart Card Chip. FIPS Level 2. Version 1.03 January 31, 2005

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Expert 3.2

PKI BLADE Applet and Protiva PIV DL Card Security Policy

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to talk so much?!? Content taken from the following:

Transcription:

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV

Contents Major contactless features : summary Contactless major constraints Major security issues Tamper resistant device Authentication Integrity Confidentiality Security evaluation (CC, PP, ) What future for the contactless card security 2/27 AV

Contactless IC overview Based on Smart Card IC with an RF interface (ISO 14443-x) Readers supply low impedance electromagnetic field at 13,56 MHz to : Generate power supply for IC Support Clock and data exchange using ASK modulation Modulation rate : 100% (type A) or 10% (type B) Communication distance (0-10 cm typical) High speed serial communication (106 Kb/s 424 Kb/s) Anti-collision protocol Extended operating voltage range (typical 2.7 5.5 V) 3/27 AV

Diagram (dual interface) ISO contact Contact Interface Security Logic & Sensors ROM Microprocessor EEPROM Antenna Contactless Interface Unit Crypto- Processor (TDES, RSA, ) RAM 4/27 AV

Targeted market Car Parking Public Transport Bus, Subway, Train City Services Library, Swimming Pool Payphones Retail Schools 5/27 AV

Major contactless features : summary Contactless major constraints Major security issues Tamper resistant device Authentication Integrity Confidentiality Security evaluation (CC, PP, ) Contents What future for the contactless card security 6/27 AV

Ability to perform a "transaction" within a maximum of 150 ms time including : Dialogue establishment with the reader (anticollision detection) Internal computation (which may include cryptographic processing) Data exchange (1O6 kb/s) in half duplex Low power consumption : typically 2 to 5 mw Internal CPU clock Contactless constraints Adapted design technology (submicron) 7/27 AV

Security attacks Reader Man in the middle Tampering Host Eavesdropping 8/27 AV Telepickpocketing

Contents Major contactless features : summary Contactless major constraints Major security issues Tamper resistant device Authentication Integrity Confidentiality Security evaluation (CC, PP, ) What future for the contactless card security 9/27 AV

Tamper resistant device Tamper resistant device Objectives : to prevent the outside from : Reading what must be kept secret Tampering any stored data Contactless attacks Most of them are common to "contact only" cards Some of them may be re-enforced because of electromagnetic radiation (power, clock, data, ) 10/27 AV

Attacks (common with contact cards) 11/27 AV Physical Microprobing : access to chip with test or optical means Test mode recovery : recover initial test bit statement Reverse engineering : layout, data, address reconstruction Environmental monitoring ; temperature, light, Electrical SPA/DPA : statistical attacks based on power analysis Timing : execution time depending on input parameters and secret data involved Logical Attacks 1/2 Software : taking advantage (through the standard input) of the vulnerability of OS embedded

Attacks (re-enforced by RF interface) Attacks 2/2 Electrical EMA : Electromagnetic Analysis Internal chip radiation RF radiation (13 MHz range) Power drops and short cuts (nota) Available power magnitude highly variable -> chip extended tolerance (2.7 -> 5.5 typical) Clock supply glitches (nota) intended to corrupt the normal transfer of data between CPU and memory 12/27 AV

Hardware 13/27 AV Strong protection layers (test mode recovery) Random logic design (reverse engineering recovery) Metal shielding (EMA, light, microprobing, ) Tamper sensors to warn the OS against attacks On chip filters (glitches, transient signals, ) True random generators Unpredictable chip current power consumption Software Any countermeasures? 1/2 Memory address scrambling/memory management (firewall) Random software execution

Any countermeasures? 2/2 Countermeasures efficiency To fight against one attack, generally many countermeasures may be required but : Additional hardware modules will increase power consumption Additional software will slow the execution process One compromise must be found between efficiency and contactless requirements (execution time, power requirements) 14/27 AV

Integrity Definition Confidence that the received data stream is actually the posted stream Mechanisms involved depend on the security level required Basic protocol feature (Data associated with a CRC check within a frame) eg ISO 14443-4 Hash code (one way function) SHA-1 (160 bit code) MD5 (128 bit code) Ripemd (160 bit code) 15/27 AV

Authentication 1/5 Definition Mechanism that allows you to prove who you are actually Mechanisms (security level dependent) 16/27 AV ID presentation (identification) Cryptographic techniques Symmetrical (DES encryption, MAC, ) Asymmetrical (digital signature RSA, DSA, ECDSA, ) Remark : In most cases, authentication and integrity are performed at the same time

Authentication 2/5 User by the card (theft prevention) Not feasible in most cases No Pin code typing No biometric mechanisms (e.g. fingerprint) Nota : If required, authentication can be performed by out of band mechanisms (ex : railway ticket inspector) Card vs reader Typical requirements Tranportation : card is authenticated by the reader Finance : mutual authentication is required 17/27 AV

Authentication 3/5 Card Card ID posting random C=TDES(Kc, a) ID a C Reader ID reading Random generation Master key diversification Kc C =TDES(Kc, a) C= C yes C Authentication BASIC AUTHENTICATION PROCESS USING A SYMMETRICAL ALGORITHM (CARD AUTHENTICATED BY READER) 18/27 AV

Authentication 4/5 Card Reader Card Private Key Challenge Hash Function Digest Signature Card Certificate CA key Certificate verification Public key Signature verification Received Digest Challenge Hash Function = Digest yes Calculated Digest Authentication 19/27 AV BASIC AUTHENTICATION (AND INTEGRITY) PROCESS USING ASYMMETRICAL ALGORITHM (CARD AUTHENTICATED BY READER)

Authentication 5/5 Computation performance (typical) TDES encryption (8 bit CPU) TDES/128 bit key Software : 80/100 ms Cryptoprocessing : 35 µs Digital signature RSA / 1024 bit key Software : not available at company Cryptoprocessing : 85 ms for signature generation 20/27 AV

Confidentiality 1/2 Confidentiality Objective : to insure privacy of transmitted data between card and reader Techniques : Encryption Symmetrical key Difficult to manage and to share Requires a low "computation" power Asymmetrical key Easy to manage Requires a high "computation" power and may require a cryptographic coprocessor 21/27 AV

Security evaluation "Contact Only" cards Some IC are compliant with CC EAL4 augmented Recently, an IC has been announced as being evaluated EAL5 augmented Contactless cards Very few products have already been certified CC (ex : ASK IC with a Slb SAM software: EAL1+) Some Protection Profiles have been certified (Assurance level targeted is level 4) 22/27 AV

Contents Major contactless features : summary Contactless major constraints Major security issues Tamper resistant device Authentication Integrity Confidentiality Security evaluation (CC, PP, ) What future for the contactless card security 23/27 AV

Contactless new products 1/2 New High end products Mifare : Mifare prox : P8RF5016 (dual interface) ST Microelectronics : ST19XR34 (dual interface) Infineon : SLE 88CL320 (Preliminary sheet not yet available) 24/27 AV

Contactless new products 2/2 Typical product features Dual interface/ 13,56 MHz, 106 to 424 kb/s/ 10% or 100 % with ASK modulation 8 bit CPU with 32 Kb EEPROM or more On chip crypto processing (TDES, RSA, El Gamal, Elliptic curves, DSS, ) Multiple sensors ( voltage, clock, temperature, ) Memory management unit (or firewall) True random number generation Multi-application capabilities 25/27 AV

Company On going activities Schlumberger is involved in many comities/initiatives ISO 14443 (WG8), ISO 7816 E-europe (TB3, TB6), ETSI, EESSI, CEN, Full range of OS including a Java platform Pilot projects Transport/purse cards (UK, Colombia, Spain, ) City Cards (Brazil, Norway, UK) Corporate/company cards (Club Net/ Japan, KPN (Netherlands, Tokyo University, ) 26/27 AV

Conclusion The future of contactless cards seems to be : Dual interface to ease multiapplication/multi-services High security features thanks to on-card cryptoproccessing Opened platform OS (JavaCard, Multos ) To allow high security level evaluations, attacks related to electromagnetic radiation must be investigated in more details (power attacks, EMA, ) 27/27 AV