No Encryption For RFID passports 73
Spy der Mann writes "Despite widespread criticism from security experts, the government is declining to encrypt data on RFID passports. Lee Tien, an attorney at the Electronic Frontier Foundation, said: 'It is my understanding it's possible to read this information from 10 to 30 feet away with the right equipment.' Considering gadgets like the BlueSniper as 'right equipment,' I think he's got a point. Tinfoil covers, anyone?"
Why put ANY data on passports? (Score:5, Insightful)
If the passport held a unique ID number and nothing else, then sensitive data could be stored somewhere safe off-site, rather than in the back pocket of a potential terrorist.
well... (Score:1)
I think that if there is no broadcast, but info is on the passport and it is a touch transfer that could solve the problem, What would be so hard about it being a smart card that doesn't transmit?
A
Re:Why put ANY data on passports? (Score:1)
Re:Why put ANY data on passports? (Score:2, Interesting)
Full Control (Score:2)
Re:Full Control (Score:2, Interesting)
Re:Why put ANY data on passports? (Score:4, Informative)
From TFA:
[the RFID contains] all the information on the data page of the passport, including name, date and place of birth, and a digitized version of the photo passport [passport number, and date/place of issuance]
So thanks to the digital signature (however strong that may be), passport forgers will need to crack the signature to create a passport with matching name, photo, etc. that would pass muster. Its basically adding another layer of difficulty for forgers.
Of course, this still ignores the potential of:
-Skimming via a bluesniper
-Forgers creating fake rfid chips (how hard/far off can it be, now that this will be the primary goal of passport forgers?)
The decision to rely on a digital signature (which is basically crypto!) and not encrypt the data is positively loopy. They haven't even decided what kind of signature it will be, and weakenesses in cryptographic methods are discovered [slashdot.org] all [slashdot.org] the [slashdot.org] time [slashdot.org].
Re:Why put ANY data on passports? (Score:2)
Not loopy (Score:2)
It is clearly an intentional choice. The goal is to make luser's data easy to get at. When talking about "lusers" in the context of government, read aloud as "anyone who doesn't get a bodyguard on government payroll".
Re:Why put ANY data on passports? (Score:2, Interesting)
The reason is quicker transfer of more data (high resolution pictures of your face, biometric information like fingerprints) than can be achieved with the paper version.
It should be noted that it is only the US that does not deploy "basic access control", which effectively locks out RFID readers unless they can optically read the passport (e.g. it is on the scanner).
Europe and Japan are implementing this privacy protection. The irony is that especially for US citizens the threat of identity theft is (sti
Re:Why put ANY data on passports? (Score:2)
Opens up an attack where the "terrorists" cut off access to the central server(s). The response is to either shut down access to an entire area (i.e. stop all outgoing flights) or just let people through by relying on other ID.
I would also suspect that requiring communications back to a central server dramatically increases the amo
Re:Why put ANY data on passports? (Score:2)
If the passport held a unique ID number and nothing else, then sensitive data could be stored somewhere safe off-site, rather than in the back pocket of a potential terrorist.
Passports still need some low tech means for border guards to perform a cursory check of people passing through national boundaries that, believe it or not, may not have internet connectivity.
I'd guess that the majority of international border crossings have little more than unreliable telephones and military radios.
Re:Why put ANY data on passports? (Score:2)
RFID passports would be an assassins dream; you could drop a whole load of ID triggered bombs along a victims possible routes. And then a few extra at the nearest hospital, should they survive. The assassin would be halfway around the world by the time one goes off.
And as there would be no problem surreptiously reading an ID, just a number wont do either, as it could be pre-scanned and used later.
Better yet (Score:5, Insightful)
Either way, just guarantee there's nothing to harvest information from.
Still, I fail to understand why anybody would want encryption on it.. Encryption schemes are broken, as are signing algorythims and other complex mathematical constructs. COnsidering how long passports have been around, would you trust your data to DES?
Re:Better yet (Score:1)
Re:Better yet (Score:1)
Can't think of much good reason to stick RFID in passports,
Re:Better yet (Score:2)
this newfangled technology having dead batteries
There are no batteries.
Re:Better yet (Score:1)
Re:Better yet (Score:1)
SHA-1 is not an encryption agorithm (in the most common sense of the word).
SHA-1 is a hashing algorithm (or one-way encryption algorithm if you insist on using word "encryption").
SHA-1 can not be used to store data, only to verify that data you already have is the same data that was used to create the SHA-1 hash.
Re:Better yet (Score:1)
Re:Better yet (Score:2)
Encryption implies a 1-1 ratio of encrypted content to plaintext. Signing implies there's a 1-many ratio between signed content to plaintext.
There IS a 1-1 ratio on a SHA-1 message when it's smaller or equal to the bits in SHA-1.
Re:Better yet (Score:2)
How exactly do you decrypt it?
Re:Better yet (Score:2)
Im not familiar with the interworkings of SHA-1 personally, but understand crypto ideas.
I assume that SHA-1 throws away parts of the numbers needed to reverse SHA-1.
Still, the message is a 1-1 as long as it's the SHA-1 signature size or less... I GUESS you could brute force it
Re:Better yet (Score:2)
You cannot reverse the algorithm -- that's the point. SHA-1 is a cryptographic hash algorithm.
Still, the message is a 1-1 as long as it's the SHA-1 signature size or less...
No, because the hash algorithm does not guarantee that two input values smaller than the output value do not produce the same output value.
I GUESS you could brute force it
There is no guarantee you will find the original input, only an input that produces the same output.
Re:Better yet (Score:2, Informative)
You also get to apply for a new passport, and boy is that fun (2 hour wait) and cheap ($85/$145 rushed)!
Re:Better yet (Score:2)
Besides, considering the limited staff at the State Dept. and most embassies, you would think they would do their best to keep the teeming hordes and their RFIDs as far away as possible.
Because (Score:1)
While this woulnd't incur any damage to my current passpord, my Enhanced Password with RFID action may not fair as well.
And I woulnd't want to pay $_$ to have a perfectly good, micro-organism free passport replaced, would I?
Re:Because (Score:1)
Remeber to think with your brain and type with your fingers, not the other way around.
Re:Better yet (Score:2)
First off, this is more annoying than a paper passport that's damaged because you can TELL that your paper passport is damaged before you head for the airport. With this, I could have what I believe to be a perfectly-functioning passport, get to the airport in time for a critical flight, then discover I can't get on because it's damaged. Bluh.
Also worth noting (but not as a follow-up to what you've said) I remember reading that these RFID-equipped passports would be lined with a grid of metal wires,
Re:Better yet (Score:3, Informative)
would you trust your data to DES?
You do, every day. You trust your money to DES. Ever use an ATM? Your PIN is encrypted with DES. How about a debit card? Same thing. How about on-line payment? While the SSL connection may or may not use DES, the bank-to-bank communications involved in moving the money are protected with DES.
BTW, If you ask your question of a professional cryptographer, the answer will be "Yes". And you won't find a more paranoid group than cryptographers.
Encryption schemes a
Re:Better yet (Score:2)
Re:Better yet (Score:2)
Standard DES uses 56-bit keys. Actually 64-bit keys, but every eigth bit is a parity bit and doesn't contribute to the calculation. Yes, the banking industry uses 3DES for many purposes, usually double-key 3DES, which gives 112 bits of key material (triple-key 3DES has 168 bits of key material, but due to the meet-in-the-middle attack is not that much stronger than double-key 3DES).
Single-DES can be brute-forced in a matter of a day or so with a special-purpose machine, a few weeks with a moderate numbe
Re:Better yet (Score:2)
From a theoretical security perspective brute force does not count as a "break", and so DES is essentially unbroken although insecure due to the small keyspace.
For all us non-theoreticians out here, it seems to me that there's a big difference between two systems if one is "insecure due to the small key space" and the other is not, even if the cryptographic algorithm behind each is equally good (or just plain equal, as in this case). If I'm depending on a s
Re:Better yet (Score:2)
If I'm depending on a system that is in fact insecure, whether it's a practical or theoretical insecurity is less important than the fact that it is insecure.
The difference is that a keyspace size problem is something that can be addressed (by multiple encryption, ala 3DES) and then the weakness is effectively gone. A break of the algorithm, on the other hand, may be patchable by altering the algorithm, but the result is a new, completely untested algorithm that must be reviewed and analyzed over the co
Tinfoil automobile... (Score:4, Funny)
Tinfoil cover built in! (Score:5, Informative)
Re:Tinfoil cover built in! (Score:2)
They'll be using technology from the crashed Romulan ship at area 51.
-
Re:Tinfoil cover built in! (Score:1)
Re:Tinfoil cover built in! (Score:1)
-DS9 "Little Green Men"
Re:Tinfoil cover built in! (Score:2)
no security better than thinking you've got some (Score:4, Insightful)
Knowingly having zero security *can* be better than having poor security and thinking it's strong security. eg the early 802.11 standards where security was thought to be good and turned out to be abismal, the css on DVD's etc.
Re:no security better than thinking you've got som (Score:1)
Re:no security better than thinking you've got som (Score:2, Insightful)
Still, two opportunities for profit: the RFID manufacturers and the RF shielding manufacturers can both get their cut.
Re:no security better than thinking you've got som (Score:2)
And they're going to enclose it in a RF shield, so that it can only be read close-up, with someone to open the shield. And someone thinks that this is a good idea?
True, it makes no sense to me that they'd use RFID in the first place. Surely they can come up with a technology which is on by demand (press a button) rather than which is always on. Or maybe there's a way to put a digital signature on the photo itself. I guess it wouldn't be a digital signature then, though, as photos aren't digital. What
Re:no security better than thinking you've got som (Score:2)
PDF417 [idautomation.com] allows for 1100 bytes. That's not enough.
It's not a trivial problem, after all you'd like the device to be battery-free, but maybe you'd have to abandon that requirement. Wouldn't be so horrible to put one of those watch batteries into it, since if the battery was lost or went dead you could just get a new one at the border. Then you can put a button on the damn thing so it's only transmitting when you press the button. And then you can have your digitally signed photo, which is the whole point
Re:no security better than thinking you've got som (Score:3, Insightful)
It sounds to me like someone got lobbied.
Re:no security better than thinking you've got som (Score:1)
Re:no security better than thinking you've got som (Score:3, Interesting)
While you're wrapping your passport in tinfoil... (Score:1)
This goes for foil hats too, but you already knew that didn't you.
Re:While you're wrapping your passport in tinfoil. (Score:1)
... Sure, that's what you *want* me to believe ! <|;)
Bad idea (Score:2)
RFID allows facial ID (Score:4, Informative)
Which is interesting because, according to this [wave-report.com] the error rate for real time facial recognition: the current error rate is 20% [...] this implies that out of 50,000 match scores there are 1,000 errors.
Enjoy the wait. Remind me how many of the 9/11 hijackers had invalid passports?
Re:RFID allows facial ID (Score:1)
Cheers (Score:1)
Encryption would have accomplished nothing... (Score:4, Insightful)
Re:Encryption would have accomplished nothing... (Score:1)
If you wanna read a non-RFID passport, you have to take it from the owner and open it. This usually involves the owner willingly giving it to you.
If you wanna read a RFID passport, you have to get close to the owner (think next few places in a queue here) and use an active (power transmitting) reading device, or you use a passive device that doesn't have to remotely power the RFID chip and eavesdrop on a conversation between a legit passport reading station and the passport. This allows
Re:Encryption would have accomplished nothing... (Score:1)
If you wanna read a non-RFID passport, you have to take it from the owner and open it. This usually involves the owner willingly giving it to you.
Well, there are certainly technologies other than RFID which can transmit over distances, but I think I know what you mean and can agree with you here...
The security degradation that the conversion from non-RFID to RFID implies is that you now don't need consent from the passport owner to read it, and actually the owner won't even notice you reading it.
OK..
Re:Encryption would have accomplished nothing... (Score:1)
To prevent reading without physical access to the passport. The key is printed on some page of the passport and is read via OCR. So you have to open the passport to get the key to decrypt the RFID data.
The point of encryption is overcoming the "can read without consent" problem.
It is left to the passport owner whom he allows physical access to his passport, and whoever has that physical access can also g
Re:Encryption would have accomplished nothing... (Score:1)
To prevent reading without physical access to the passport. The key is printed on some page of the passport and is read via OCR. So you have to open the passport to get the key to decrypt the RFID data.
Ah, I see what you're saying. Youe meant litterally "print" the decryption key. Yeah, good idea, that'd solve the problem (though perhaps not in the most efficient way, now that someone else has mentioned it why not just use a mag stripe? I assume they can hold enough data).
Re:Encryption would have accomplished nothing... (Score:1)
Passports are usually valid for ten years (might depend on country, so YMMV) and can be used even after they are expired (depending on the country you wanna enter). ATM cards and other mag stripe things usually have a much shorter life.
Replacing a defective passport would be more costly and involve more standing-in-line-and-stuff than replacing an ATM card.
If the durability of the mag stripe (or other non-wireless
problem here... (Score:2)
Of course, this whole thing could be solved by printing a big 2D barcode on a page of the passport instead of inc
Yagi equiped sniper rifle (Score:4, Interesting)
Your tax dollars at work!
Actually, a hidden roadside bomb is more likely. You can even target on the basis of other data, such as name or religion. Great fun.
I already have my aluminium card holder.
Re:Yagi equiped sniper rifle (Score:2)
Um...I know what a merkin [reference.com] is. Has this also become a derogatory term for Americans, or is this a misspelling of something else?
Tinfoil will be illegal (Score:3, Funny)
Just wait for the law that makes the use of tinfoil illegal.
No tinfoil pockets
No tinfoil lining of jackets
No tinfoil anything
Tinfoil will be listed as a dual use good with special import/export restrictions like a screw driver for atomic bombs.
Before the law, tinfoil and atomic bombs will be treated equal.
Re:Tinfoil will be illegal (Score:2)
-
So... (Score:1)