The perfect clone: Researchers hack RFID smartcards

November 3, 2011

Professional safecrackers use a stethoscope to find the correct combination by listening to the clicks of the lock. Researchers at the Ruhr-University Bochum have now demonstrated how to bypass the security mechanisms of a widely used contactless smartcard in a similar way. Employing so-called "Side-Channel Analysis" the researchers of the Chair for Embedded Security (Prof. Dr.-Ing. Christof Paar) can break the cryptography of millions of cards that are used all around the world.

RFID smartcards () of the type DESFire MF3ICD40 are widely employed in payment and access control systems. The of these cards is based on Triple-DES, a cipher that is unbreakable from a purely mathematic point of view. DESFire cards are for instance used by the public transport agencies in Melbourne, San Francisco and Prague. The DESFire MF3ICD40 is manufactured by NXP, the former semiconductor division of .

A person is identified as a passenger, employee or customer when his RFID smartcard is placed in the proximity of a reader. To guarantee the necessary level of security, a secret key is stored on the integrated chip inside the card. But just like for the safe, the security mechanism produces the electronic equivalent of the clicks of a mechanic lock. "We measured the of the chip during the encryption and decryption with a small probe", says David Oswald. The fluctuations of the electro-magnetic field allow the researchers to conclude to the full 112-bit of the smartcard.

Having extracted the keys, an attacker can create an unlimited number of undetectable clones of a given card. The required time and effort are quite low: "For our measurements, we needed a DESFire MF3ICD40 card, an RFID reader, the probe and an oscilloscope to measure the power consumption", says Oswald. This equipment only costs a few thousand euros. Having obtained knowledge on the characteristic properties of the smartcard, the attack takes three to seven hours. The manufacturer NXP confirmed the security hole in the meanwhile and recommends his customers to upgrade to a newer version of the card.

Already back in 2008, researchers around Prof. Dr.-Ing. Christof Paar used Side-Channel Analysis to break supposedly secure systems. Three years ago, garage and car doors "mysteriously" opened for the researchers of the Chair for Embedded Security. The employed KeeLoq RFID system – which customers and manufacturers trusted blindly before – turned out to be highly susceptible to Side-Channel Analysis.

Explore further: New Security Chip Card Controllers Make Electronic Identity Cards and Passports Even More Secure

More information: www.emsec.rub.de/

Related Stories

Super-smart USB card delivers rich multimedia content

October 13, 2005

A powerful new platform that delivers high computing power and high channel capacity could help meet consumer demand for multimedia content via PCs, interactive TV and mobile phones. The FULL SPEED project that developed ...

Using your car key as a credit card?

October 22, 2008

(PhysOrg.com) -- BMW Group Research and Technology and NXP Semiconductors, the independent semiconductor company founded by Philips, have unveiled a prototype of the world’s first multifunctional car key. The prototype ...

Safer swiping while voting and globetrotting

April 15, 2010

Since 2007, every new U.S. passport has been outfitted with a computer chip. Embedded in the back cover of the passport, the "e-passport" contains biometric data, electronic fingerprints and pictures of the holder, and a ...

Next generation FeliCa contactless IC chip to be launched

June 13, 2011

Sony Corporation announces today the launch of the next generation FeliCa IC chip with enhanced security adopting the Advanced Encryption Standard (AES) encryption. The new IC chip will support AES as well as the existing ...

Recommended for you

How to curb emissions? Put a price on carbon

September 3, 2015

Literally putting a price on carbon pollution and other greenhouse gasses is the best approach for nurturing the rapid growth of renewable energy and reducing emissions.

Customizing 3-D printing

September 3, 2015

The technology behind 3-D printing is growing more and more common, but the ability to create designs for it is not. Any but the simplest designs require expertise with computer-aided design (CAD) applications, and even for ...

1 comment

Adjust slider to filter visible comments by rank

Display comments: newest first

rwinners
not rated yet Nov 04, 2011
Nice to know that a card cannot be 'scanned' in my wallet.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.