Dismantling iClass and iClass Elite
نویسندگان
چکیده
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment systems. The card uses 64-bit keys to provide authenticity and integrity. The cipher and key diversification algorithms are proprietary and little information about them is publicly available. In this paper we have reverse engineered all security mechanisms in the card including cipher, authentication protocol and key diversification algorithms, which we publish in full detail. Furthermore, we have found six critical weaknesses that we exploit in two attacks, one against iClass Standard and one against iClass Elite (a.k.a., iClass High Security). In order to recover a secret card key, the first attack requires one authentication attempt with a legitimate reader and 2 queries to a card. This attack has a computational complexity of 2 MAC computations. The whole attack can be executed within a day on ordinary hardware. Remarkably, the second attack which is against iClass Elite is significantly faster. It directly recovers the master key from only 15 authentication attempts with a legitimate reader. The computational complexity of this attack is lower than 2 MAC computations, which means that it can be fully executed within 5 seconds on an ordinary laptop.
منابع مشابه
Cryptanalysis of INCrypt32 in HID's iCLASS Systems
The cryptographic algorithm called INCrypt32 is a MAC algorithm to authenticate participants, RFID cards and readers, in HID Global’s iCLASS systems. HID’s iCLASS cards are widely used contactless smart cards for physical access control. Although INCrypt32 is a heart of the security of HID’s iCLASS systems, its security has not been evaluated yet since the specification has not been open to pub...
متن کاملHeart of Darkness - exploring the uncharted backwaters of HID iCLASS RFID reader security
This paper provides detailed information on iCLASSTMreader and key security. It explains the security problems found without revealing the extracted secret keys (DES authentication Key and the 3DES data encryption key for iCLASSTMStandard Security cards). The chosen approach of not releasing the encryption and authentication keys gives iCLASS vendors and customers an important headstart to upda...
متن کاملExtraction and Classification of User Behavior
The multimedia document generator, iClass system, has been used by professors from the Institutes of Chemistry, Mathematics and Computer Science from the University of São Paulo aiming at helping the multimedia content production and availability. Data from user interactions, available in iClass system, have motivated this work which aims at studying the user behavior under different circumstan...
متن کاملContinuous Learner Modeling in iClass
The recently launched European Integrated Project iClass is developing a learning system that takes into account the multi-cultural and multilingual characteristics of its member countries in pre-university education. For adapting the presentation of learning objects to the learners’ needs, the iClass system will keep track of the students’ domain knowledge. The learner modeling system consists...
متن کاملTowards the Dynamic Personalized Selection and Creation of Learning Objects
Delivering the most appropriate learning object for a learner’s goals, needs and preferences presents an interesting research challenge. [Dagger et al., 03] presents a solution based on the production of and selection between multiple candidate pieces of content. This solution is predicated on appropriate metadata being available that adequately describes those candidates (and more importantly ...
متن کامل