{"id":157,"date":"2008-01-06T20:00:02","date_gmt":"2008-01-06T18:00:02","guid":{"rendered":"http:\/\/blackbag.toool.nl\/?p=157"},"modified":"2008-01-07T10:30:53","modified_gmt":"2008-01-07T08:30:53","slug":"relying-on-mifare-better-start-migrating","status":"publish","type":"post","link":"https:\/\/blackbag.toool.nl\/?p=157","title":{"rendered":"Relying on Mifare? Better start migrating!"},"content":{"rendered":"<p>Life for us in the lockpick community is simple. If we want to tackle a specific lock we can just go buy a sample and study it. <\/p>\n<p>During my search for lock knowledge, I have bought several locks simply because I felt the need to disassemble them and satisfy my curiosity. In some cases I had to use a small grinder to cut my way into the lock to make it reveal its secrets.  But at the end of the day no lock ever was able to keep its inner working secret for me.<\/p>\n<p>In that respect our life is easy compared to that of researchers that examine RF-ID systems. Most of the RF-ID vendors keep the inner working secret. Deep inside a one millimeter chip, a small proprietary encryption routine is held. Virtually impossible to reach, spread over five extremely thin wafers that are all interconnected. <\/p>\n<p>Good luck taking that apart to see if you can reverse engineer the algorithm &#8230; or at least that must have been the thought of the inventors of the <a href=\"http:\/\/en.wikipedia.org\/wiki\/MIFARE\">Mifare<\/a> RF-ID system. Unfortunately for them, some German researchers did just that &#8230; take the one square millimeter chip apart.<\/p>\n<p>And at the <a href=\"http:\/\/events.ccc.de\/congress\/2007\/Main_Page\">latest CCC congress<\/a> in Berlin, Karsten Nohl and Henryk Pl\u00c3\u0192\u00c2\u00b6tz gave a brilliant and inspiring presentation about their findings (<a href=\"http:\/\/video.google.com\/videoplay?docid=4252367680974396650&#038;hl=en\">google video<\/a> or <a href=\"http:\/\/141.64.29.7\/24c3\/recordings\/FeM_mirror\/mp4\/24c3-2378-en-mifare_security-COMPATIBLE.mp4\">MP4<\/a>).<\/p>\n<p><a href=\"http:\/\/video.google.com\/videoplay?docid=4252367680974396650&#038;hl=en\"><img decoding=\"async\" src=\"http:\/\/blackbag.toool.nl\/images\/mifare.jpg\" alt=\"Click on image to view video\" \/><\/a><br \/>\n* Karsten Nohl pointing out the different layers<\/p>\n<p>The researchers used a &#8216;simple&#8217; setup. With lots of patience, they managed to slice off the top of the chip and reach the first layer. Using a 500X magnifying microscope they took a high resolution picture of this layer. They then used some very fine polish and &#8216;really really carefully&#8217; polished away the first layer, making the second layer visible. And took another picture. And so on. The story does not say in how many tries they succeeded to make five high quality images, but it must have been a hell of a job. Not to mention laying these images on top of each other and trying to make sense out of it. According to the researchers this all was &#8216;painful work&#8217;. Well, I take my hat off for them as it the kind of research I greatly admire!<\/p>\n<p>It took them some time, but they managed to reverse engineer the <a href=\"http:\/\/en.wikipedia.org\/wiki\/MIFARE\">mifare<\/a> encryption algorithm this way. And by that the Mifare system seems history (for serious applications).<\/p>\n<p>Mifare heavily relies on keeping the encryption scheme secret. The problem is cheap\/affordable RF-ID chips do not have enough CPU to do serious crypto, so keeping the inner working secret is the only defense. And during the research many more weaknesses in the Mifare system were found. Even if you do not understand everything, I strongly encourage everyone to view <a href=\"http:\/\/video.google.com\/videoplay?docid=4252367680974396650&#038;hl=en\">the video<\/a> of the presentation. It is inspiring to say the least, and shows with determination even the most complex problem can be tackled (well &#8230;. almost). <\/p>\n<p>The real lesson learned is that security through obscurity does not work, and only buys you some time. But it will bite you in the long run when using it in widely deployed systems. The problem now is millions of Mifare chips are deployed in the field in a huge install base. And most of the users are completely unaware of the disaster that is coming &#8230;<\/p>\n<p>So far the users are &#8216;safe&#8217;. The researchers have not given out the full details on Mifare&#8230;. yet. But please take their advice serious: &#8220;If you rely on <a href=\"http:\/\/en.wikipedia.org\/wiki\/MIFARE\">Mifare<\/a> for anything, start migrating!&#8221;. More information about the mifare hack can be expected in the very near future.<\/p>\n<p>And even though I am thrilled about this attack, I am not too happy. We use <a href=\"http:\/\/www.saltosystems.com\/\">Mifare ourselves<\/a> to secure some parts of some of our offices &#8230;. (sigh)<\/p>\n<p>Still I would like to thank the researchers and compliment them for their excellent work and for giving us some time to migrate. <\/p>\n<p>I can not wait to hear more about it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Life for us in the lockpick community is simple. If we want to tackle a specific lock we can just go buy a sample and study it. During my search for lock knowledge, I have bought several locks simply because I felt the need to disassemble them and satisfy my curiosity. In some cases I [&hellip;]<\/p>\n","protected":false},"author":171,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"_links":{"self":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/posts\/157"}],"collection":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=157"}],"version-history":[{"count":0,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=\/wp\/v2\/posts\/157\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackbag.toool.nl\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}