EH2008 - 0.1
Easterhegg 2008
Follow the white rabbit
Speakers | |
---|---|
starbug | |
Karsten Nohl |
Schedule | |
---|---|
Day | Ostersamstag (2008-03-22) |
Room | 416 |
Start time | 21:00 |
Duration | 01:00 |
Info | |
ID | 2434 |
Event type | lecture |
Track | Hacking |
Language used for presentation | en |
RFID Reverse-Engineering
Little Security, Despite Obscurity
The most widely deployed “secure” RFID tag today relies on the secrecy of its algorithm. We reverse-engineered this algorithm from circuit images and protocol sniffs. Besides short keys, the tag has several other vulnerabilities such as weak random numbers and protocol flaws. We will illustrate that the security of the tag is insufficient for most of its applications.