首页> 外文会议>Financial cryptography and data security. >Peeling Away Layers of an RFID Security System
【24h】

Peeling Away Layers of an RFID Security System

机译:RFID安全系统的剥离层

获取原文
获取原文并翻译 | 示例

摘要

The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. The employed algorithms rely on obscurity and consequently did not withstand scrutiny. This paper details how the algorithms were found from opening silicon chips as well as interacting with tags and readers. The security of the tags is based on several secret check-sums but no secret keys are employed that could lead to inherent security on the cards. Cards can be read, written to and spoofed using an emulator. Beyond these card weaknesses, we find that Legic's trust delegation model can be abused to create master tokens for all Legic installations.
机译:Legic Prime系统使用专有的RFID来保护建筑物访问和小额支付应用程序。所采用的算法依赖于模糊性,因此无法经受审查。本文详细介绍了如何通过打开硅芯片以及与标签和读取器进行交互来找到算法。标签的安全性基于几个秘密校验和,但是没有采用可能导致卡固有安全性的秘密密钥。可以使用模拟器读取,写入和欺骗卡。除了这些卡上的弱点以外,我们发现可以使用Legic的信任委派模型为所有Legic安装创建主令牌。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号