메뉴 건너뛰기




Volumn , Issue , 2012, Pages 158-166

An analysis of security weaknesses in the evolution of RFID enabled passport

Author keywords

E passport; E passport security features; ICAO; PKI; RFID; vulnerabilities

Indexed keywords

E-PASSPORT; ICAO; PKI; SECURITY FEATURES; VULNERABILITIES;

EID: 84867161676     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (52)
  • 2
    • 79951834998 scopus 로고    scopus 로고
    • A survey of system security in contactless electronic passports
    • Feb. Available: (Access Date: 4 May, 2012)
    • S.A. Anshuman, "A survey of system security in contactless electronic passports," J. of Comput. Security, vol. 19, no. 1, Feb. 2011, pp. 203-226. Available: http://iospress.metapress.com/content/8402gr10203t4236/. (Access Date: 4 May, 2012)
    • (2011) J. of Comput. Security , vol.19 , Issue.1 , pp. 203-226
    • Anshuman, S.A.1
  • 4
    • 77956168943 scopus 로고    scopus 로고
    • Increasing privacy threats in the cyberspace: The case of Italian e-passports
    • Springer Berlin, Heidelberg
    • V. Auletta et al., "Increasing privacy threats in the cyberspace: The case of Italian e-passports," in Financial Cryptography and Data Security, vol. 6054, Springer Berlin, Heidelberg, 2010, pp. 94-104.
    • (2010) Financial Cryptography and Data Security , vol.6054 , pp. 94-104
    • Auletta, V.1
  • 5
    • 54249156664 scopus 로고    scopus 로고
    • E-passport: Securing international contacts with contactless chips
    • Springer Berlin, Heidelberg
    • G. Avoine, K. Kalach, and J. Quisquater, "E-passport: securing international contacts with contactless chips," in Financial Cryptography and Data Security, vol. 5143, Springer Berlin, Heidelberg, 2008, pp. 141-155.
    • (2008) Financial Cryptography and Data Security , vol.5143 , pp. 141-155
    • Avoine, G.1    Kalach, K.2    Quisquater, J.3
  • 6
    • 57049171408 scopus 로고    scopus 로고
    • Improved security notions and protocols for non-transferable identification
    • Springer Berlin, Heidelberg
    • C. Blundo et al., "Improved security notions and protocols for non-transferable identification," in Computer Security ESORICS'08, vol. 5283, Springer Berlin, Heidelberg, 2008, pp. 364-378.
    • (2008) Computer Security ESORICS'08 , vol.5283 , pp. 364-378
    • Blundo, C.1
  • 7
    • 77950305081 scopus 로고    scopus 로고
    • Fakeproof e-passport is cloned in minutes
    • August 06. Available: (Access Date: 4 May, 2012)
    • S. Boggan, (2008, August 06). Fakeproof e-passport is cloned in minutes. The Times. Available: http://www.thetimes.co.uk/tto/news/. (Access Date: 4 May, 2012)
    • (2008) The Times
    • Boggan, S.1
  • 9
    • 38049173955 scopus 로고    scopus 로고
    • E-passport: The global traceability or how to feel like a UPS package
    • Springer Berlin, Heidelberg
    • D. Carluccio et al., "E-passport: the global traceability or how to feel like a UPS package," in Inform. Security Applicat., vol. 4298, Springer Berlin, Heidelberg, 2007, pp. 391-404.
    • (2007) Inform. Security Applicat. , vol.4298 , pp. 391-404
    • Carluccio, D.1
  • 10
    • 84867157773 scopus 로고    scopus 로고
    • Bonn-Aachen Int. Center for Inform. Technology, Nov. Available: (Access Date: 4 May, 2012)
    • J. Chapman, "Determining the security enhancement of biometrics in epassports," in Bonn-Aachen Int. Center for Inform. Technology, Nov. 2009. Available: http://cosec.bit.uni-bonn.de/fileadmin/user-upload/teaching/09ws/ 09ws-sem/biometry-ws09-chapman.pdf. (Access Date: 4 May, 2012)
    • (2009) Determining the Security Enhancement of Biometrics in Epassports
    • Chapman, J.1
  • 11
    • 77955313332 scopus 로고    scopus 로고
    • Traceability attack against e-passports
    • Springer Berlin, Heidelberg
    • T. Chothia, and V.A. Smirnov, "Traceability attack against e-passports," in Financial Cryptography and Data Security, vol. 6052, Springer Berlin, Heidelberg, 2010, pp. 20-34.
    • (2010) Financial Cryptography and Data Security , vol.6052 , pp. 20-34
    • Chothia, T.1    Smirnov, V.A.2
  • 12
    • 84867170940 scopus 로고    scopus 로고
    • Supplemental access control (PACE v2): Security analysis of PACE integrated mapping
    • Available: (Access Date: 4 May, 2012)
    • J. Coron, et al., "Supplemental access control (PACE v2): security analysis of PACE integrated mapping," in Cryptology eprint archive report 2011/058, 2009. Available: http://eprint.iacr.org/2011/058.pdf. (Access Date: 4 May, 2012)
    • (2009) Cryptology Eprint Archive Report 2011/058
    • Coron, J.1
  • 13
    • 84867180132 scopus 로고    scopus 로고
    • Israel cloned 1000s of UK passports and used airport security as mossad front
    • Mar 31, Available: (Access Date: 4 May, 2012)
    • "Israel cloned 1000s of UK passports and used airport security as mossad front," European Union Times, Mar 31, 2010, Available: http://www.eutimes.net/2010/03/israel-cloned-1000s-of-uk-passports-used- airportsecurity-as-mossad-front/. (Access Date: 4 May, 2012)
    • (2010) European Union Times
  • 14
    • 77952652488 scopus 로고    scopus 로고
    • The electronic passport and the future of government-issued RFID-based identification
    • G. M. Ezovski, and S.E. Watkins, "The electronic passport and the future of government-issued RFID-based identification," in IEEE International Conference on RFID, 2007, pp. 15-22.
    • IEEE International Conference on RFID, 2007 , pp. 15-22
    • Ezovski, G.M.1    Watkins, S.E.2
  • 17
    • 79952958289 scopus 로고    scopus 로고
    • Practical eavesdropping and skimming attacks on high-frequency RFID tokens
    • G.P. Hancke, "Practical eavesdropping and skimming attacks on high-frequency RFID tokens," J. of Computer Security (RFID Sec'10 Asia), vol. 19, no. 2. 2011.
    • (2011) J. of Computer Security (RFID Sec'10 Asia) , vol.19 , Issue.2
    • Hancke, G.P.1
  • 18
    • 84867180134 scopus 로고    scopus 로고
    • Moving to the third generation of electronic passports
    • Available: (Access Date: 4 May, 2012)
    • V. Heino, "Moving to the third generation of electronic passports," the Silicon Trust Gemalto, 2011. Available: http://www.securitydocumentworld.com/client-files/moving-to-the-third- generation-of-electronic-passports-october-20111.pdf. (Access Date: 4 May, 2012)
    • (2011) The Silicon Trust Gemalto
    • Heino, V.1
  • 19
    • 81455146058 scopus 로고    scopus 로고
    • A note on the relay attacks on E-passports: The case of Czech E-passports
    • Available: (Access Date: 4 May, 2012)
    • M. Hlavac, and T. Rosa, "A note on the relay attacks on E-passports: The case of Czech E-passports," Cryptology eprint archive report 2007/244, 2007. Available: http://eprint.iacr.org/2007/244.pdf. (Access Date: 4 May, 2012)
    • (2007) Cryptology Eprint Archive Report 2007/244
    • Hlavac, M.1    Rosa, T.2
  • 20
    • 70350583038 scopus 로고    scopus 로고
    • Known plaintext only attack on RSA-CRT with Montgomery multiplication
    • Springer Berlin, Heidelberg
    • M. Hlavac, "Known plaintext only attack on RSA-CRT with Montgomery multiplication," in Cryptographic Hardware and Embedded Systems, vol. 5747, Springer Berlin, Heidelberg, 2009, pp. 128-140.
    • (2009) Cryptographic Hardware and Embedded Systems , vol.5747 , pp. 128-140
    • Hlavac, M.1
  • 21
    • 33845240394 scopus 로고    scopus 로고
    • Crossing borders: Security and privacy issues of the European e-Passport
    • Springer Berlin, Heidelberg
    • J. Hoepman et al., "Crossing borders: Security and privacy issues of the European e-Passport," in Advances in Information and Computer Security, vol. 4266, Springer Berlin, Heidelberg, 2006, pp. 152-167.
    • (2006) Advances in Information and Computer Security , vol.4266 , pp. 152-167
    • Hoepman, J.1
  • 22
    • 38049074796 scopus 로고    scopus 로고
    • Power and EM attacks on passive 13.56 MHz RFID devices
    • Springer Berlin, Heidelberg
    • M. Hutter, S. Mangard, and M. Feldhofer, "Power and EM attacks on passive 13.56 MHz RFID devices," in Cryptographic Hardware and Embedded Systems, vol. 4727, Springer Berlin, Heidelberg, 2007, pp. 320-333.
    • (2007) Cryptographic Hardware and Embedded Systems , vol.4727 , pp. 320-333
    • Hutter, M.1    Mangard, S.2    Feldhofer, M.3
  • 25
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • A. Juels, "RFID security and privacy: a research survey," IEEE J. Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 381-394.
    • (2006) IEEE J. Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 27
    • 84878780763 scopus 로고    scopus 로고
    • Security and privacy issues in machine readable travel documents
    • Available: (Access Date: 4 May, 2012)
    • P.A. Karger et al., "Security and privacy issues in machine readable travel documents," IBM Research Report, TR RC 23575 (W0504-003), , 2005. Available: http://domino.watson.ibm.com/library/CyberDig.nsf/papers/ 751B6341BFB9015485256FDB005DB216/$File/RC23575.pdf. (Access Date: 4 May, 2012)
    • (2005) IBM Research Report, TR RC 23575 (W0504-003)
    • Karger, P.A.1
  • 28
    • 84867177738 scopus 로고    scopus 로고
    • Available: (Access Date: 4 May, 2012)
    • A. Laurie, "RF idiot", Available: http://rfidiot.org/. (Access Date: 4 May, 2012)
    • RF Idiot
    • Laurie, A.1
  • 29
    • 37849033268 scopus 로고    scopus 로고
    • E-passports as a means towards the first world-wide public key infrastructure
    • Springer Berlin, Heidelberg
    • D. Lekkas, and D. Gritzalis, "E-passports as a means towards the first world-wide public key infrastructure," in Public Key Infrastructure, vol. 4582, Springer Berlin, Heidelberg 2007, pp. 34-48.
    • (2007) Public Key Infrastructure , vol.4582 , pp. 34-48
    • Lekkas, D.1    Gritzalis, D.2
  • 30
    • 84867157777 scopus 로고    scopus 로고
    • Code highlights E-passport eavesdropping risk: What RFIDIOt chipped my passport?
    • Available: (Access Date: 4 May, 2012)
    • J. Leyden, "Code highlights E-passport eavesdropping risk: What RFIDIOt chipped my passport?," The Register, 2006. Available: http://www.theregister.co.uk/2006/10/31/rfid-e-passport-attack/. (Access Date: 4 May, 2012)
    • (2006) The Register
    • Leyden, J.1
  • 31
    • 84867180135 scopus 로고    scopus 로고
    • RFID hack attack: E-passport cloning risks exposed
    • Available: (Access Date: 4 May, 2012)
    • J. Leyden, "RFID hack attack: E-passport cloning risks exposed,", The Register, 2006. Available: http://www.theregister.co.uk/ 2006/08/04/epassport-hack-attack/. (Access Date: 4 May, 2012)
    • (2006) The Register
    • Leyden, J.1
  • 32
    • 68349150582 scopus 로고    scopus 로고
    • Electronic passports - From secure specifications to secure implementations
    • I. Liersch, "Electronic passports - from secure specifications to secure implementations," in Inform. Security Tech. Rep., vol.14, no.2, 2009, pp. 96-100.
    • (2009) Inform. Security Tech. Rep. , vol.14 , Issue.2 , pp. 96-100
    • Liersch, I.1
  • 33
    • 38349006182 scopus 로고    scopus 로고
    • E-passport: Cracking basic access control keys
    • Springer Berlin, Heidelberg
    • Y. Liu et al., "E-passport: cracking basic access control keys," On the Move to Meaningful Internet Systems, vol. 4804, Springer Berlin, Heidelberg, 2007, pp. 1531-1547.
    • (2007) On the Move to Meaningful Internet Systems , vol.4804 , pp. 1531-1547
    • Liu, Y.1
  • 35
    • 67650336836 scopus 로고    scopus 로고
    • Security mechanisms and access control infrastructure for E-passport and general purpose e-documents
    • P. Najera, F. Moyano, and J. Lopez, "Security mechanisms and access control infrastructure for E-passport and general purpose e-documents," J. Universal Computer Science, vol.15, no. 5, 2009, pp. 970-991.
    • (2009) J. Universal Computer Science , vol.15 , Issue.5 , pp. 970-991
    • Najera, P.1    Moyano, F.2    Lopez, J.3
  • 36
    • 84867170444 scopus 로고    scopus 로고
    • A Survey on the evolution of cryptographic protocols in ePassports
    • Available: (Access Date: 4 May, 2012)
    • R. Nithyanand, "A Survey on the evolution of cryptographic protocols in ePassports," Cryptology eprint archive 2009/200, 2009. Available: http://eprint.iacr.org/2009/200.pdf. (Access Date: 4 May, 2012)
    • (2009) Cryptology Eprint Archive 2009/200
    • Nithyanand, R.1
  • 39
    • 84867157775 scopus 로고    scopus 로고
    • Passport Division, Consular Affairs Bureau, Ministry of Foreign Affairs of Japan, Available: (Access Date: 4 May, 2012)
    • "Protection profile for ePassport IC with active authentication," Passport Division, Consular Affairs Bureau, Ministry of Foreign Affairs of Japan, 2010. Available: http://www.commoncriteriaportal.org/ files/ppfiles/c0247-epp.pdf. (Access Date: 4 May, 2012)
    • (2010) Protection Profile for EPassport IC with Active Authentication
  • 40
    • 77955326219 scopus 로고    scopus 로고
    • Available: (Access Date: 4 May, 2012)
    • H. Richter, W. Mostowski, and E. Poll, "Fingerprinting passports," 2008. Available: http://www.cs.ru.nl/~woj/papers/download/ nluug2008.pdf. (Access Date: 4 May, 2012)
    • (2008) Fingerprinting Passports
    • Richter, H.1    Mostowski, W.2    Poll, E.3
  • 41
    • 84867180136 scopus 로고    scopus 로고
    • EPassport privacy attack
    • Apr. Available: (Access Date: 4 May, 2012)
    • H. Robroch, "ePassport privacy attack," Cards Asia Singapore, Apr. 2006. Available: http://www.riscure.com/archive/200604-CardsAsiaSing- ePassport-Privacy.pdf. (Access Date: 4 May, 2012)
    • (2006) Cards Asia Singapore
    • Robroch, H.1
  • 42
    • 42549157259 scopus 로고    scopus 로고
    • A framework for assessing RFID system security and privacy risks
    • P.A. Rotter, "A framework for assessing RFID system security and privacy risks," IEEE Pervasive Computing, vol.7, no.2, 2008, pp. 70-77.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.2 , pp. 70-77
    • Rotter, P.A.1
  • 43
    • 84867180139 scopus 로고    scopus 로고
    • How to clone and modify E-passports
    • Sep. Available: (Access Date: 4 May, 2012)
    • B. Schneier, "How to clone and modify E-passports," Schneier on Security, Sep. 2008. Available: http://www.schneier.com/blog/archives/2008/09/ how-to-clone-an.html. (Access Date: 4 May, 2012)
    • (2008) Schneier on Security
    • Schneier, B.1
  • 44
    • 84867157780 scopus 로고    scopus 로고
    • RFID cards and Man-in-the-Middle Attacks
    • Apr. Available: (Access Date: 4 May, 2012)
    • B. Schneier, "RFID cards and Man-in-the-Middle Attacks," Schneier on Security, Apr. 2006. Available: http://www.schneier.com/blog/ archives/2006/04/rfid-cards-and.html. (Access Date: 4 May, 2012)
    • (2006) Schneier on Security
    • Schneier, B.1
  • 48
    • 84867144884 scopus 로고    scopus 로고
    • The ICAO Secretary General, ISO/IEC JTC1 SC17 WG3/TF1 for ICAO-NTWG," Ver. 10, May
    • The ICAO Secretary General, "Supplement to Doc 9303, Machine Readable Travel Documents," ISO/IEC JTC1 SC17 WG3/TF1 for ICAO-NTWG," Ver. 10, May 2011.
    • (2011) Supplement to Doc 9303, Machine Readable Travel Documents
  • 50
    • 84867174779 scopus 로고    scopus 로고
    • UK, Feb. Available: (Access Date: 4 May, 2012)
    • L. Thomson, "Hacker clones passports in drive-by RFID heist," V3 UK, Feb. 2009. Available: http://www.v3.co.uk/v3-uk/news/1953428/ hackerclones-passports-drive-rfid-heist. (Access Date: 4 May, 2012)
    • (2009) Hacker Clones Passports in Drive-by RFID Heist
    • Thomson, L.1
  • 51
    • 84867174778 scopus 로고    scopus 로고
    • Password authenticated key agreement for contactless smart cards
    • Available: (Access Date: 4 May, 2012)
    • M. Ullmann et al., "Password authenticated key agreement for contactless smart cards," Workshop on RFID Security, 2008. Available: http://events.iaik.tugraz.at/RFIDSec08/Papers/Publication/14%20-%20Ullmann%20- %20PW%20Authenticated%20Key%20Agreement%20-%20Paper.pdf. (Access Date: 4 May, 2012)
    • Workshop on RFID Security, 2008
    • Ullmann, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.