Skip to main content

Stand-by Attacks on E-ID Password Authentication

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8957))

Included in the following conference series:

  • 1168 Accesses

Abstract

We show that despite the cryptographic strength of the password authentication, we cannot exclude an attack by an adversary that penetrates the reader device at some moment, but apart from this is passive and manipulates neither the reader nor the microcontroller of the identity document. So even the most careful examination and certification of the smart cards and the readers cannot prevent attacks of this kind. We present concrete attack scenarios for PACE-GM, PACE-IM and SPEKE protocols.

We show that the weaknesses can be easily and effectively eluded via changing a few implementation details on the side of the reader. Our second contribution is that immunity against the attacks can be tested by the operator of the reader, thus replacing costly and unreliable certification process of black box devices.

Our more general contribution is to draw attention on hidden penetration attacks and to show that effective countermeasures are possible.

Partially supported by National Science Centre, HARMONIA 4 Programme, DEC-2013/08/M/ST6/00928.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The cases of spying PIN numbers with tiny cameras attached to ATM machines should serve as a warning that this in not only a hypothetical situation.

References

  1. Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Barker, E.B., Barker, W.C., Burr, W.E., Polk, W.T., Smid, M.E.: Sp 800–57. Recommendation for Key Management, part 1: General (revised). Technical report, Gaithersburg, MD, United States (2007)

    Google Scholar 

  3. Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware Trojans: extended version. J. Crypt. Eng. 4(1), 19–31 (2014)

    Article  Google Scholar 

  4. Bellare, M., Paterson, K.G., Rogaway, P.: Security of symmetric encryption against mass surveillance. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014, Part I. LNCS, vol. 8616, pp. 1–19. Springer, Heidelberg (2014). Also IACR Cryptology ePrint Archive 2014, 438 (2014)

    Chapter  Google Scholar 

  5. Bender, J., Fischlin, M., Kügler, D.: Security analysis of the PACE key-agreement protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 33–48. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. BSI: Advanced Security Mechanisms for Machine Readable Travel Documents 2.11. Technische Richtlinie TR-03110-3 (2013)

    Google Scholar 

  7. Bundesamt für Sicherheit in der Informationstechnik: Common Criteria Protection Profile for Inspection Systems (IS), BSI-CC-PP-0064 (2010). https://www.commoncriteriaportal.org/files/ppfiles/pp0064b_pdf.pdf

  8. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. European Parliament and the Council: Regulation (EU) no 910/2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market and Repealing Directive 1999/93/EC (2014). http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32014R0910&from=EN

  10. Hanzlik, L., Krzywiecki, Ł., Kutyłowski, M.: Simplified PACE\(|\)AA protocol. In: Deng, R.H., Feng, T. (eds.) ISPEC 2013. LNCS, vol. 7863, pp. 218–232. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. ISO/IEC JTC1 SC17 WG3/TF5 for the International Civil Aviation Organization: Supplemental Access Control for Machine Readable Travel Documents. Technical report version 1.02, March 08 (2011)

    Google Scholar 

  12. Jablon, D.P.: Extended password key exchange protocols immune to dictionary attacks. In: WETICE, pp. 248–255. IEEE Computer Society (1997)

    Google Scholar 

  13. Killmann, W., Schindler, W.: A proposal for functionality classes for random number generators (2011). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_20_Functionality_classes_for_random_number_generators_e.pdf

  14. LaMacchia, B.A., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. IACR Cryptology ePrint Archive 2006, 73 (2006)

    Google Scholar 

  15. Young, A.L., Yung, M.: Malicious Cryptography - Exposing Cryptovirology. Wiley, New York (2004)

    Google Scholar 

Download references

Acknowledgment

We would like to thank an anonymous reviewer for remarks on security model for real world computations. Some valuable comments are incorporated almost literally. We also thank INSCRYPT PC chairs for many helpful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lucjan Hanzlik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Hanzlik, L., Kubiak, P., Kutyłowski, M. (2015). Stand-by Attacks on E-ID Password Authentication. In: Lin, D., Yung, M., Zhou, J. (eds) Information Security and Cryptology. Inscrypt 2014. Lecture Notes in Computer Science(), vol 8957. Springer, Cham. https://doi.org/10.1007/978-3-319-16745-9_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16745-9_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16744-2

  • Online ISBN: 978-3-319-16745-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics