Re: Are new passports [an] identity-theft risk?

2004-10-28 Thread Florian Weimer
* Dave Emery:

   Correct me if I am wrong, but don't most of the passive, cheap
 RF or magnetic field powered RFIDs transmit maybe 128 bits of payload,
 not thousands and thousands of bits which would be enough to include
 addresses, names, useful biometric data and so forth ?

Those that perform actual cryptographic operations can store tens of
thousands of bits.  Even older tags (without proper crypto) easily
reach 2**15 bits.  These tags (for example, MIFARE) are usually not
considered RFID tags by privacy activists, even though they can be
read at some distance (but not with COTS equipment).  Contactless
readers are only used for user comfort (you can leave the card in your
purse) and to counter vandalism, not for tracking purposes.

The tags you are referring to are RFID tags used in logistics which
usually provide only very, very few bits (which sometimes can't even
be changed).

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-28 Thread Bill Stewart
At 06:11 AM 10/24/2004, Ian Grigg wrote:
The questions would then be, what frequency do these
things operate on, what power is required to power
them up, and what power is required to ... power them
down.  Any radio guys around?
There's an excellent RFID reference article at
http://www.acmqueue.com/modules.php?name=Contentpa=showpagepid=216
RFIDs run at a variety of frequencies,
including 128 kHz, 13.56MHz, 915 MHz, 2.45GHz,
which are the common ISM bands that lots of other things run in,
such as cordless phones, WiFi, Microwave ovens, etc.,
which means that detecting readers may be tough.
It doesn't take a lot of power to power them;
not sure what it takes to fry them.

Bill Stewart  [EMAIL PROTECTED] 

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-25 Thread Krister Walfridsson
On Fri, 22 Oct 2004, Perry E. Metzger wrote:
I don't know who *else* has said it, but I've said this repeatedly at
conferences. With phased arrays, you should be able to read RFID tags
at surprising distances, and in spite of attempts to jam such signals
(such as RSA's proposed RFID privacy mechanism).
One thing that I have seen confuse people writing about the
new passports is that RFID may mean different technologies.  So
I'd like to mention that the passports will not use the simple
bar-code kind of RFID tags -- they will use chip cards
communicating over ISO/IEC 14443.
The current technology has big problems with working at a distance
(in fact, the tests done with COTS 14443 readers shows that most
have problems with reading passport-like cards even when placed at
the optimal distance...), but I don't know enough about antenna
technology to be able to guess what can be done by a dedicated
attacker...
   /Krister
PS.  Most of the MRTD (Machine Readable Travel Documents) specifications
are available at http://www.icao.int/mrtd/Home/index.cfm.
PPS. Most people on this list seems to be interested in the US
passport, so you may be interested in that the US department of
state, and department of homeland security, seems to be doing a
pilot of the new passport.  The RFP is available from:
  http://www.statewatch.org/news/2004/jul/us-biometric-passport-original.pdf
with some consolidated Q and A at
  http://www.statewatch.org/news/2004/jul/us-biometric-passport-QandA.pdf
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-25 Thread Dave Emery
On Sat, Oct 23, 2004 at 03:23:21PM -0400, Adam Shostack wrote:
 
 The technology will mature *very* rapidly if Virginia makes their
 driver's licenses RFID-enabled, or if the US goes ahead with the
 passports.  Why?  Because there will be a stunning amount of money to
 be stolen by not identity thieves, but real thieves.  Imagine sitting
 with a laptop, a good antenna, and some software outside a metro
 station in Virginia.  Or an upscale restaurant in Adams-Morgan,
 reading off the addresses of those who will be away from home for the
 next 3 hours.

Correct me if I am wrong, but don't most of the passive, cheap
RF or magnetic field powered RFIDs transmit maybe 128 bits of payload,
not thousands and thousands of bits which would be enough to include
addresses, names, useful biometric data and so forth ?

For many if not most applications (inventory control and
tracking) a 128 bit unique serial number is enough - are the passport
and drivers license (soon apparently to be the same thing here in the
USA at least in respect to an internal passport required for travel on
public transportation) applications of RFID actually intended to allow
reading tens of kilobytes of data or just a unique serial that can be
used as a key in an on line database system ?

The signaling reliability problem of successfully transmitting
say 10 or 100 kb of data error free (enough for reasonable info about
someone and some biometric measurements) is quite different from
repeating  128 bits over and over and over until the reader succeeds in
making the FEC and checksums work for a couple of reads out of thousands
of repetitions of the 128 bits.   Detecting a weak repeated short
pattern in noise is much easier than reading thousands of bits with few
or no errors (few enough to be corrected by a reasonable rate FEC).

Whilst unique serial numbers read at a distance could be used in
a variety of rather sinister ways, they aren't equivalent to dumping the
names, addresses, weight, height, birth date, social security number and
biometric signatures of someone in the clear.   And obviously are
much less useful to an unsophisticated thief without access to the
database mapping the serial number to useful information.

And further it seems reasonable to suppose that if larger blocks
of useful data get dumped, it would be encrypted under carefully
controlled keys at least for passport and similar applications.  
Granted that very sophisticated attackers might obtain some of these
keys, but the average thief presumably would not have access to them.

It does occur to me that RFID equipped passports or internal
passports/driver licenses (your papers please) COULD be equipped with
some kind of press to read switch the would require active finger 
pressure on the card to activate the RFID transmitter - this would
leave them disabled and incapable of transmitting the ID when sitting in
someone's wallet or purse.  Aside from very sinister covert reading
applications I cannot think of any reason why a RFID equipped identity
card would need to be readable without the active cooperation and
awareness of the person carrying the card, thus such a safeing mechanism
would not be a real burden except to those with sinister covert agendas.

And needless to say, copper screen or foil lined wallets would
become very popular...


-- 
   Dave Emery N1PRE,  [EMAIL PROTECTED]  DIE Consulting, Weston, Mass 02493


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-25 Thread Adam Shostack
On Sun, Oct 24, 2004 at 12:58:56AM -0400, Dave Emery wrote:
| On Sat, Oct 23, 2004 at 03:23:21PM -0400, Adam Shostack wrote:
|  
|  The technology will mature *very* rapidly if Virginia makes their
|  driver's licenses RFID-enabled, or if the US goes ahead with the
|  passports.  Why?  Because there will be a stunning amount of money to
|  be stolen by not identity thieves, but real thieves.  Imagine sitting
|  with a laptop, a good antenna, and some software outside a metro
|  station in Virginia.  Or an upscale restaurant in Adams-Morgan,
|  reading off the addresses of those who will be away from home for the
|  next 3 hours.
| 
|   Correct me if I am wrong, but don't most of the passive, cheap
| RF or magnetic field powered RFIDs transmit maybe 128 bits of payload,
| not thousands and thousands of bits which would be enough to include
| addresses, names, useful biometric data and so forth ?

Unclear.  Presuming you're right, that 128 bit number will become
your ID, just like your SSN is now.  If you broadcast it at the
right time, you'll be Alice.

|   And further it seems reasonable to suppose that if larger blocks
| of useful data get dumped, it would be encrypted under carefully
| controlled keys at least for passport and similar applications.  
| Granted that very sophisticated attackers might obtain some of these
| keys, but the average thief presumably would not have access to them.

You're reasonable, they're the United States Government, and they have
responsed to questions about how to protect the keys that would be used
to read it. (which, after all, would need to be in at least thousands
of readers, just in the US, never mind in the other 190 odd countries
which will want to verify passports..)

 ACLU's Technology and Liberty Program describes what they were
 told in a briefing by Frank Moss, USA Deputy Assistant Secretary
 of State for Passport Services and director of the State
 Department's Bureau of Consular Affairs:

 passport issued in San Diego from January 2005 to August
 2005. But you can't use the public key to then create a signature
 on a fraudulent document. And the public key is not used to
 access the data on the document -- that is wide open -- it is
 used only to verify the authenticity of the passport.

(From http://hasbrouck.org/blog/archives/000434.html)

|   It does occur to me that RFID equipped passports or internal
| passports/driver licenses (your papers please) COULD be equipped with
| some kind of press to read switch the would require active finger 
| pressure on the card to activate the RFID transmitter - this would
| leave them disabled and incapable of transmitting the ID when sitting in
| someone's wallet or purse.  Aside from very sinister covert reading
| applications I cannot think of any reason why a RFID equipped identity
| card would need to be readable without the active cooperation and
| awareness of the person carrying the card, thus such a safeing mechanism
| would not be a real burden except to those with sinister covert agendas.

And who is going to pay for this press to read addition?  Maybe,
rather than designing with RFID, they could use a smart-card chip
which requires contact?  seems easier, no?

Adam

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-25 Thread Victor Duchovni
On Sat, Oct 23, 2004 at 03:23:21PM -0400, Adam Shostack wrote:

 5 years?  I don't think we have that long.
 
 The technology will mature *very* rapidly if Virginia makes their
 driver's licenses RFID-enabled, or if the US goes ahead with the
 passports.  Why?  Because there will be a stunning amount of money to
 be stolen by not identity thieves, but real thieves.  Imagine sitting
 with a laptop, a good antenna, and some software outside a metro
 station in Virginia.  Or an upscale restaurant in Adams-Morgan,
 reading off the addresses of those who will be away from home for the
 next 3 hours.
 

Is the problem discriminating the RFID response, or supplying power so
it can respond at all?

How much power does the reader need to emit to activate the RFID? What
sort of equipment is needed to deliver the power directionally?

-- 

 /\ ASCII RIBBON  NOTICE: If received in error,
 \ / CAMPAIGN Victor Duchovni  please destroy and notify
  X AGAINST   IT Security, sender. Sender does not waive
 / \ HTML MAILMorgan Stanley   confidentiality or privilege,
   and use is prohibited.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


RE: Are new passports [an] identity-theft risk?

2004-10-23 Thread Whyte, William

 R.A. Hettinga wrote:
  
 http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=41030
 
   An engineer and RFID expert with Intel claims there is 
 little danger of
  unauthorized people reading the new passports. Roy Want 
 told the newssite:
  It is actually quite hard to read RFID at a distance, 
 saying a person's
  keys, bag and body interfere with the radio waves.
 
 Who was it that pointed out that radio waves don't
 interfere, rather, receivers can't discriminate?

Absolutely. I'd add that while it's *currently* hard to
read at a distance, passports typically have a lifetime
of 10 years and I'd be very surprised if the technology
wasn't significantly better five years out.

William

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-23 Thread Adam Shostack
On Fri, Oct 22, 2004 at 11:01:16AM -0400, Whyte, William wrote:
| 
|  R.A. Hettinga wrote:
|   
|  http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=41030
|  
|An engineer and RFID expert with Intel claims there is 
|  little danger of
|   unauthorized people reading the new passports. Roy Want 
|  told the newssite:
|   It is actually quite hard to read RFID at a distance, 
|  saying a person's
|   keys, bag and body interfere with the radio waves.
|  
|  Who was it that pointed out that radio waves don't
|  interfere, rather, receivers can't discriminate?
| 
| Absolutely. I'd add that while it's *currently* hard to
| read at a distance, passports typically have a lifetime
| of 10 years and I'd be very surprised if the technology
| wasn't significantly better five years out.

5 years?  I don't think we have that long.

The technology will mature *very* rapidly if Virginia makes their
driver's licenses RFID-enabled, or if the US goes ahead with the
passports.  Why?  Because there will be a stunning amount of money to
be stolen by not identity thieves, but real thieves.  Imagine sitting
with a laptop, a good antenna, and some software outside a metro
station in Virginia.  Or an upscale restaurant in Adams-Morgan,
reading off the addresses of those who will be away from home for the
next 3 hours.

Adam

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-22 Thread Ian Grigg

R.A. Hettinga wrote:
http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=41030

 An engineer and RFID expert with Intel claims there is little danger of
unauthorized people reading the new passports. Roy Want told the newssite:
It is actually quite hard to read RFID at a distance, saying a person's
keys, bag and body interfere with the radio waves.
Who was it that pointed out that radio waves don't
interfere, rather, receivers can't discriminate?
iang
-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Are new passports [an] identity-theft risk?

2004-10-22 Thread Perry E. Metzger

Ian Grigg [EMAIL PROTECTED] writes:
 R.A. Hettinga wrote:
 http://worldnetdaily.com/news/printer-friendly.asp?ARTICLE_ID=41030
  An engineer and RFID expert with Intel claims there is little danger of
 unauthorized people reading the new passports. Roy Want told the newssite:
 It is actually quite hard to read RFID at a distance, saying a person's
 keys, bag and body interfere with the radio waves.

 Who was it that pointed out that radio waves don't
 interfere, rather, receivers can't discriminate?

I don't know who *else* has said it, but I've said this repeatedly at
conferences. With phased arrays, you should be able to read RFID tags
at surprising distances, and in spite of attempts to jam such signals
(such as RSA's proposed RFID privacy mechanism).

This isn't terribly surprising but for the fact that most people don't
think in terms of the fact that you can spatially discriminate radio
sources.

Perry


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]