EH2008 - 0.1

Easterhegg 2008
Follow the white rabbit

Speakers
starbug
Karsten Nohl
Schedule
Day Ostersamstag (2008-03-22)
Room 416
Start time 21:00
Duration 01:00
Info
ID 2434
Event type lecture
Track Hacking
Language used for presentation en

RFID Reverse-Engineering

Little Security, Despite Obscurity

The most widely deployed “secure” RFID tag today relies on the secrecy of its algorithm. We reverse-engineered this algorithm from circuit images and protocol sniffs. Besides short keys, the tag has several other vulnerabilities such as weak random numbers and protocol flaws. We will illustrate that the security of the tag is insufficient for most of its applications.