Kewl, but we need more details... -------- Original Message --------
How to Kill RFID Tags with a Cell Phone - Scientific American Radio frequency identification (RFID) tags--tiny wireless circuits that derive their power from radio waves and cost just pennies to make--have quickly found their way into identification badges, shipping containers, even ordinary store products. Because, unlike barcodes, the tags can be read surreptitiously, a number of groups have raised privacy concerns. To address these concerns, leading RFID makers have created so-called "Gen 2" chips that will divulge their data only after a reader transmits the correct password. The new chips can also be triggered by a different password to silently self-destruct, for example as a customer leaves a store. Encryption protects the password transmission. But renowned cryptographer Adi Shamir of Weizmann University claims to have found a way to bypass the encryption scheme and obtain the self-destruct password using technology no more sophisticated than that in a common cell phone. Shamir announced the discovery this morning at the 2006 RSA Conference, a large computer security meeting opening today in San Jose, Calif. "Everyone expects that there will soon be billions of these tags in circulation," Shamir noted. "We bought one of the major-brand RFID tags and tried to break into it by power analysis," he said. RFID tags have no battery or internal power source; they obtain the energy they need to operate by sucking it out of the radio signals they absorb. But in doing so, every computation of the RFID circuit modifes the radio environment. Shamir and his coworkers used a simple directional antenna to monitor the power consumption of an RFID tag as they transmitted correct and incorrect passwords to the device slowly, one bit at a time. "We could easily notice a power spike after the first bit that the chip didn't like," Shamir recalls. By starting over and modifying the offensive bit, the researchers were able to derive quickly the kill password for the tag. "We believe that a cell phone has all the ingredients needed to detect these passwords and disable all the RFIDs in the area," Shamir says. If confirmed by others, the flaw would raise serious questions about the suitability of current RFIDs for use in theft prevention, employee idenfication and other applications. ---->So, Ya Wanna Move to Costa Rica? Costa Rica's FIRST ---->and ONLY online multimedia tourist/retirement guide! ---->http://www.destiny-worldwide.net/wanna/forward.htm ---->Costa Rica Real Estate http://www.cr-realestate.com ---->Buyer's brokers,Businesses 4 sale, Mortgage brokers ----> Shipping solutions to and from Costa Rica http://www.destiny-worldwide.net/costa-rica/shipping.htm ----> Costa Rica Resident & Business Opportunities & Services http://www.destiny-worldwide.net/costa-rica/business.htm --<>-- --<<<+>>>-- --<>-- ----> Discover the Secret Mysteries of the Ages! http://www.destiny-worldwide.net/rcg/mystery/contents.htm --<>-- --<<<+>>>-- --<>-- ----> Privacy/Offshore Information & Consultations http://www.destiny-worldwide.net/asset.htm ---->Worldwide Bill payment, money transfer & E-Commerce experts http://www.destiny-worldwide.net/costa-rica/ecurrency.htm ----> Send/Receive Money Worldwide: http://www.offshorearnings.com --<>-- --<<<+>>>-- --<>-- __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com Complete archives at http://www.sitbot.net/ Please let us stay on topic and be civil. OM
SPONSORED LINKS
YAHOO! GROUPS LINKS
|
No virus found in this incoming message. Checked by AVG Free Edition. Version: 7.1.385 / Virus Database: 268.4.1/311 - Release Date: 4/13/2006