RIXAXI~1(1).PDF

(425 KB) Pobierz
R FID: S ecurity B riefing s
Angelo P. E. Rosiello
angelo@ rosiello.org
Outline
Introduction
Auto-ID Leader Technologies
Auto-ID Technologies: some practical
instance
The Business
Components of an RFID System
A First Taxonomy – Passive Tags
A First Taxonomy – Semi Passive Tags
A First Taxonomy – Active Tags
How an RFID System work: an Overview
Application Contests
RFID and Security Contests
Security Requirements
Mutual Symmetrical Authentication
Challenge Authentication: Hypothesis
Challenge Authentication: the Procedure
Challenge Authentication: Remarks
Mutual Authentication Protocol: Possible
Improvements
Why Communications should be
Encrypted?
How to encrypt Transmissions
Symmetric Ciphers: Which one? Why?
Stream Ciphers: How Do they Work?
“Modern” RFID Systems: are they safe?
RFID and Privacy: New Proposals
Very New Menaces
RFID Viruses
RFID Vendors Reaction
Conclusions
Bibliography
Introduction
In the last years, the needs of developing new technologies to
support automatic identification (Auto-ID) procedures for real
world objects, strongly grew up.
Modern enterprises must have at their disposal efficient and
effective means to improve their performances and business.
For example, important operations to be supported are:
– items tracking
– logistics management
– Supply chain management
– Identification of customers' preferences
– etc.
Strictly Confidential – Draft for Discussion
© 2006 - CEFRIEL
Introduction
Military research is really active in this area and the first
technologies to support Auto-ID were proposed and used
during second World War II.
British soldiers seeking ways to identify friendly aircraft in
World War II were given a newly developed radar transponder
system called IFF - Identification Friend or Foe. It was a crude
system, but it was a way to tap into technology to identify
something at a distance.
"If you go back and look at the history of patents for RFID —
and it is long and storied — the proposals for applications such
as baggage tagging, supply-chain management, all of that
exists in patents that are 20-plus years old, all for using RFID
or its precursor concepts" (Dan Engel)
Strictly Confidential – Draft for Discussion
© 2006 - CEFRIEL
Auto-ID Leader Technologies
Strictly Confidential – Draft for Discussion
© 2006 - CEFRIEL
Zgłoś jeśli naruszono regulamin