TAU professor tips off US over security flaw in e-passports

Researcher realized that hackers were able to access passport data from afar.

By
April 25, 2010 04:50
US E-passports

US E-passports 311. (photo credit: GPO)

 
X

Dear Reader,
As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.

As one of our loyal readers, we ask you to be our partner.

For $5 a month you will receive access to the following:

  • A user experience almost completely free of ads
  • Access to our Premium Section
  • Content from the award-winning Jerusalem Report and our monthly magazine to learn Hebrew - Ivrit
  • A brand new ePaper featuring the daily newspaper as it appears in print in Israel

Help us grow and continue telling Israel’s story to the world.

Thank you,

Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief

UPGRADE YOUR JPOST EXPERIENCE FOR 5$ PER MONTH Show me later Don't show it again

A Tel Aviv University researcher has enabled the US State Department to fix security holes in its electronic passports, and now has set his sights on at-risk credit, debit and “smart” cards used by hundreds of millions of people around the world.

E-passports contain biometric data, electronic fingerprints and pictures of the holder, as well as a wireless radio frequency identification (RFID) transmitter. Although the original system was designed to operate at close range, Prof. Avishai Wool of TAU’s Blavatnik School of Computer Sciences realized that hackers were able to access data from afar.

Be the first to know - Join our Facebook page.


Noticing this security problem, Wool helped ensure that the computer chip in American e-passports could be read only when the passports were opened. In 2007, the State Department outfitted every new passport with both a security chip and conductive fibers on the back.

US Embassy spokesman Kurt Hoyer acknowledged to The Jerusalem Post on Thursday that there had “been a problem” in the past with his country’s e-passports, but added that it had been dealt with. He could not say whether the State Department had heard about the difficulty from Wool or whether any damage or security breaches had resulted from the problem.

Now, a new study by Wool has found serious security drawbacks in similar chips that are being embedded in credit, debit and smart cards. The vulnerabilities of this electronic approach – and of the private information contained in the chips – are becoming more acute, he says. Using simple devices constructed from $20 disposable cameras and copper cooking-gas pipes, Wool and his team of students have demonstrated how easily the cards’ radio frequency (RF) signals can be disrupted.

His work will be presented later this month at the IEEE RFID conference in Orlando, Florida.

Wool has suggested some small steps that can be taken to make smart cards smarter, the easiest one being to shield the card with something as simple as aluminium foil to insulate the e-transmission.



Wool’s most recent research centers on the new electronic voting technology being prepared in Israel.

“We show how the Israeli government’s new system based on the RFID chip is a very risky approach for security reasons. It allows hackers who are not much more than amateurs to breach the system,” he explained Thursday. “One way to catch hackers, criminals and terrorists is by thinking like one.”

In his lab, Wool constructed an attack mechanism – an RFID “zapper” – from a disposable camera. Replacing the camera’s bulb with an RFID antenna, he showed how the electromagnetic pulse signal produced by the camera could destroy the data on nearby RFID chips such as e-passports, e-ballots and credit cards.

“In a voting system, this would be the equivalent of burning ballots, but without the fire and smoke,” he said.

In the case of e-voting, a ballot box could be made of conductive materials to overcome the security problem.

The most insidious type of attack is the “relay attack.”

In this scenario, the voting station assumes it is communicating with an RFID ballot near it, but it’s easy for a hacker or terrorist to make equipment that can trick it. Such an attack can be used to transfer votes from party to party and nullify votes for undesired parties, Wool demonstrated.

A relay attack may also be used to allow a terrorist to cross a border using someone else’s e-passport.

As protection in the case of e-voting, a ballot box could be made of conductive materials, he advises.

Another attack involves jamming the radio frequencies that read the card. Though the card’s transmissions are designed to be read by antennas less than a meter away, Wool and his students demonstrated how the transmissions could be jammed by a battery-powered transmitter 20 meters away. This means that an attacker can disable an entire voting station from across the street.

Similarly, a terror group could jam e-passport systems at US border controls relatively easily, he suggested.

“All the new technologies we have now seem really cool. But when anything like this first comes onto the market, it will be fraught with security holes,” the TAU computer expert warned. “In the US, the federal government poured a lot of money into e-voting, only to discover later that the deployed systems were vulnerable. As a result, over the last few years, we’ve seen a trend back toward systems with paper trails.”

The State Department’s Web site on passports at www.travel.state.gov now provides advice to overcome the security problems that Wool has discovered.

“We feel that it would be good to point out what we have done to diminish the known nefarious acts of ‘skimming’ data from the chip, ‘eavesdropping’ on communications between the chip and reader, ‘tracking’ passport holders and ‘cloning’ the passport chip in order to facilitate identity theft crimes,” says the Web site.

“The State Department is using an embedded metallic element in our passports. One of the simplest measures for preventing unauthorized reading of e-passports is to add RF blocking material to the cover of an e-passport. Before such a passport can be read, it has to be physically opened. It is a simple and effective method for reducing the opportunity for unauthorized reading of the passport at times when the holder does not expect it,” the site continues.

It adds that the department has adopted Basic Access Control to minimize the risk of skimming and eavesdropping. This requires that the initial interaction between the embedded microchip in the passport and the border control reader include protocols for setting up the secure communication channel. To ensure that only authorized RFID readers can read data, Basic Access Control stores a pair of secret cryptographic codes in the passport chip.

When a reader attempts to scan the passport, it engages in a challenge-response protocol, asking questions to ensure that the person is authorized to access the data. If authentication is successful, the passport releases its data contents; otherwise, the reader is deemed unauthorized, and the passport refuses read access.

Related Content

August 20, 2018
Report: Jeremy Corbyn attended conference with senior Hamas figures

By JULIANE HELMHOLD