Professional Documents
Culture Documents
RFID Tutorial 2011 Part IV (Outer Limits)
RFID Tutorial 2011 Part IV (Outer Limits)
Livestoc%
&ouse$ets
50 million+
A riddle)
! "
"
#eri$%i&T'
+++.ra&turec%rist.co(0666.%t(
The (ar) is 'icrochi$ sse'!ly /hich /ill !e i'$l nted under the s%in of the ri(ht h nd0 Later on* t%e (ar) +ill be i(&lanted under t%e ,ore%ead* so &eo&le +%o %ave no ri-%t %and could also %ave t%e (ar). The 'icrochi$ sse'!ly, c lled r dio fre1uency identific tion 2R"#D3 is lre dy used in ni' ls0 #n do(s, the R"#D is $l ced !et/een the shoulder !l des, nd in !irds it is i'$l nted under the /in(0 +o/ there is one for hu' ns c lled #eri$%i&/0
"
6erh $s !etter if t (s c n !e cloned5 T (s should not !e used for uthentic tion Aonly for identific tion
os h W
? e r the
Its Alice!
E[Alice]
os h W
? e r the
E[Alice + ?]
Could (ive Alice secret %ey to chec% th t out$uts re for' tted correctly
E0(0, $seudor ndo'*(ener tor seed for device
-ut /e don>t / nt Alice 2or third $ rty3 to h ve to ' n (e sensitive %eyin( ' teri l0 A( in, key management is the problem5 C n /e en !le Alice 2or nyone else3 to verify covert*freeness publicly, i0e0, /ithout e4$osin( secret %eys. Si'ult neous $u!licly verifi !le covert*freeness nd $riv cy re i'$ossi!le5
&ere>s /hy)
Su$$ose there /ere $u!lic CC detector)
A1
$ $ o 3
4es* $ $5
A2
&ere>s
covert ch nnel5
A1
A B2 1
4es* 3o $$ $$
3o $$
4es* $$
3o
Alice
Alice
X18 Ultra CC-DetectorTM
4es
Alice Bob
yes D no
X18 Ultra CC-DetectorTM
A1 A2 AJ AK A? A< AL AM AN
yes D no
X18 Ultra CC-DetectorTM
A1 A2 AJ AK A? A< AL B1 B2
A1 A2 AJ AK A? A< AL AM AN
...
Still
difficult $ro!le'
A( in, use !iline r ' $s 2/ith non* st nd rd h rdness ssu'$tion)3 ,e h ve only solved the $ro!le' of covert ch nnels in e4$licit lo(ic l*l yer $ro!le'
Ti'in( or $o/er side*ch nnel.
,r $$in( u$
Oey #de 2 E6C t (s c n>t do cry$to So'e t (s c n do cry$to, !ut %ey ' n (e'ent re' ins h rd
Cry$to is not cure* ll5
Oey #de J
R"#D is n 'or$hous l !el Also e4citin( rese rch to !e done on9
CR"#D +"C #'$l nt !le 'edic l devices Etc0, etc0
O0 Ooscher, A0 Juels, @0 -r R%ovic, nd T0 Oohno9 E6C R"#D T ( Security ,e %nesses nd Defenses9 6 ss$ort C rds, Enh nced Drivers Lice 0 ACM CCS S0N0 A0 Juels, -0 6 rno, nd R0 6 $$u0 Pnidirection l Oey Distri!ution Across Ti'e nd S$ ce /ith A$$lic tions to R"#D Security 0 PSE+#T Security0 200M0 D0 - iley, D0 -oneh, E0*J0 Coh, nd A0 Juels0 Covert Ch nnels in 6riv cy*6reservin( #dentific tion Syste's0 ACM CCS >0L0 A0 Juels, 60 Syverson, nd D0 - iley0 &i(h*6o/er 6ro4ies for Enh ncin( R"#D 6riv cy nd Ptility0 6ET >0?0 S0 -ono et l0 Security An lysis of Cry$to(r $hic lly*En !led R"#D Device0 PSE+#T Security >0?0 A0 Juels nd J0 -r in rd0 Soft -loc%in(9 "le4i!le -loc%er T (s on the Che $0 ,6ES >0K0 A0 Juels, R0 L0 Rivest, nd M0 SEydlo0 The -loc%er T (9 Selective -loc%in( of R"#D T (s for Consu'er 6riv cy0 ACM CCS S0J0