Forgot your password?
typodupeerror
Encryption Security

British "Secure" Passports Cracked 305

Posted by CowboyNeal
from the trust-us dept.
hard-to-get-a-nickna writes "The Guardian has cracked the so-trumpeted secure British passports after 48 hours of work: 'Three million Britons have been issued with the new hi-tech passport, designed to frustrate terrorists and fraudsters. So why did Steve Boggan and a friendly computer expert find it so easy to break the security codes?'"
This discussion has been archived. No new comments can be posted.

British "Secure" Passports Cracked

Comments Filter:
  • > So why did Steve Boggan and a friendly computer expert find it so easy to break the security codes?

    He helped issue them in the first place? No, just joking.

    But seriously, he didn't, did he?
  • Cracking the passports was inevitable, as is the cracking of the ID cards when they come in. Computer security on such a large scale is very, very difficult to get right.

    Many large companies have invested huge sums of money into trying to prevent their systems being cracked. Take cable/satellite TV providers for example. Looking at the government`s record on IT projects, it was obviously doomed to failure from the start.
    • technology. So in a sense, they've already been hacked. The word "DOH" springs to mind.

       
    • by baadger (764884) on Friday November 17, 2006 @08:03AM (#16882078)
      Computer security on such a large scale is very, very difficult to get right.

      They should have called in the experts, Microsoft!

      "Sorry sir you can't travel this evening as you haven't run your RFID chip through Passport.NET Live Update recently. We recommend you do this every second Tuesday of the 6 months proceeding travel or you may lose your right to enter your home upon return."

      "Sir, do you have the 25 digit customs key for your new passport? It should have been printed on the back of the envelope it came in."

      Passenger: "Excuse me, I'm having some problems with Genuine Passport Activation. I paid £66 [ukpa.gov.uk] for this a month ago but when I tried to board the International Express 737 this morning I was told that wasn't genuine."
  • News at 11 (Score:3, Insightful)

    by giorgiofr (887762) on Friday November 17, 2006 @07:38AM (#16881966)
    Governments fail. Shocking!
    Remember, kids: government intervention is good.
    • Re: (Score:2, Insightful)

      by Anonymous Coward
      Er, I know this place is infested with raving Libertarians, but surely even you lot can manage to agree that border security is one of the few small areas that a Government has legitimate domain?
  • Easy to clone (Score:5, Interesting)

    by SomethingOrOther (521702) on Friday November 17, 2006 @07:44AM (#16881986) Homepage
    Home Office spokesman.
    "If you were a criminal, you might as well just steal a passport."

    Missing the point dude.
    If my passport gets stolen, I report it. It gets cloned, I've no idea somebody is impersonating me, screwing up my life (and others).
    Please people, support NO2ID [no2id.net] and tell Blair where to shove his flawed ID cards and CCTV cameras.
    • by Colin Smith (2679) on Friday November 17, 2006 @07:56AM (#16882048)
      It means you can get away with all sorts of stuff and then claim "It wasn't me mate", someone must have cloned my passport.

      We do have some complete fuckwits in charge. Of course, we do have some complete fuckwits voting for them, so it kind of balances out. Someone care to suggest an improvement on democracy?

       
      • Re: (Score:3, Funny)

        by Shemmie (909181)
        Democracy works. We just need to thin the population down a little. I suggest a set of tests, and then firing squads.
        • Re: (Score:3, Funny)

          by Threni (635302)
          > I suggest a set of tests, and then firing squads.

          If you skip the tests and move straight on to the firing squad you'll at least get rid of all the unlucky people - and let's face it, it's them who knock things over and break them, crash their cars etc...
        • Re: (Score:3, Funny)

          by shmlco (594907)
          Fine, but I get to design the tests....
      • by Anonymous Brave Guy (457657) on Friday November 17, 2006 @08:05AM (#16882086)

        We don't have a democracy, in either the pure form (which is an unworkable ideal anyway) or the popular interpretation (which is much more sensible approach in practice).

        Blair has an absolute majority of MPs in Parliament, which effectively means he can force through almost anything. That doesn't mean an absolute majority of the electorate support him. Remember, Labour lost the popular vote in England at the last general election, and even with the support of MPs from our neighbour countries to prop them up, they still only received around 1/3 of the overall popular vote.

        Blair and co have gone about forcing laws through and creating legacies, but the simple fact is that they have no mandate to bring in the kinds of sweeping change they are championing, unless at the very least they also have support from the other main parties who brought in other people's votes. Clearly in many of these so-called anti-terrorism matters, they do not.

        • Re: (Score:3, Interesting)

          by Ngwenya (147097)

          Blair has an absolute majority of MPs in Parliament, which effectively means he can force through almost anything.

          Thankfully not anything, as the fiasco over the 90-day detention showed. What a stiff-necked dickhead he looked like after that. I guess it happens to all PM's eventually. They get quite convinced that anything is theirs for the demanding by virtue of their office. Maybe the Americans have got something in the two-term limit for PotUS.

          Blair and co have gone about forcing laws through and creatin

      • Someone care to suggest an improvement on democracy?

        Democracy's not the root problem. It's the scale. Nothing will work well on a scale this large. There are too many competing interests among a population of millions to satisfy anyone fully, much less everyone.

        Of course, that's not even close the complete problem. No major wars for two generations, service economies, mass-media conglomeration, and plain stupidity and/or apathy by the public all contribute to the current problems. But democracy (indeed

      • by Khuffie (818093)
        Abolish parties. Each man runs on his own.

        Oh, and anyone who wants to run for president should be automatically disqualified.

        • Re: (Score:3, Interesting)

          by Alioth (221270)
          You may think that a non party political system is a panacea - it isn't - it winds up being worse than a dictatorship because you just don't know who you're going to end up having in government or what their policies will be after each general election. I live somewhere where nearly all the candidates are independents, and there's no real party political system. Our election is next Thursday. I have NO IDEA what sort of government we'll have after Thursday. Not a clue. I don't even know who will be Chief Mi
    • by martin (1336)


      I heard John Reid on radio on Wed justifying ID-Cards by saying it would stop identity theft..I nearly crashed the car I was so mad.

      ID-cards will get 'cloned'/copied eventually too. Technology on it's own isn't a cure-all.
      • by ajs318 (655362)
        Indeed. In order to get an identity card in the first place, you have to prove your identity with something. Whatever that something is, could just as easily be used by someone pretending to be you. Or you could just use that something to prove your identity in the first place, negating the need for the card.

        If I had known ten years ago that all this was going to happen, I would have signed up for my electricity, gas, water and telephone services all in different names -- and encouraged everyone I knew
    • Re: (Score:2, Informative)

      by protactin (206817)
      Please people, support NO2ID [no2id.net] and tell Blair where to shove his flawed ID cards and CCTV cameras.

      Also, 10 Downing Street have now made it easy for you to petition against the introduction ID cards [pm.gov.uk].
    • Re: (Score:2, Interesting)

      by Xzerix (977030)
      Just clicked on NO2ID.

      Register now! Just give us your full name, and address including postcode!

      What else would they like? DNA sample, fingerprints?
  • How indeed ... (Score:3, Informative)

    by spellraiser (764337) on Friday November 17, 2006 @07:47AM (#16881996) Journal

    I just finished reading the article.

    In short, the weakness lies in the fact that although DES3 is used to encrypt the communication between the passport chip and the reader, the key is based upon data that's available on the passport:

    By last month, Booth, Laurie and I each had access to a new biometric chipped passport and were ready to begin testing them. Laurie's first port of call was the ICAO's [International Civil Aviation Organisation] website, where the organisation had published specifications for the new travel documents. This is where he learned that the key to opening up the secure chip was contained in the passports themselves - passport number, date of birth and expiry date.
    ...
    The Home Office has adopted a very high encryption technology called 3DES - that is, to a military-level data-encryption standard times three. So they are using strong cryptography to prevent conversations between the passport and the reader being eavesdropped, but they are then breaking one of the fundamental principles of encryption by using non-secret information actually published in the passport to create a 'secret key'. That is the equivalent of installing a solid steel front door to your house and then putting the key under the mat.

    • Re:How indeed ... (Score:5, Insightful)

      by pe1chl (90186) on Friday November 17, 2006 @07:55AM (#16882044)
      This is because the encryption is not supposed to make the content inaccessible.
      The reader at the cutoms employee's desk has to be able to read the passport data. It has to know the key.
      Instead of installing a super-secret key in all readers around the world (and having to pray that it does not somehow leak out), the designers opted to use a separate key for each passport and have it printed on the passport itself, so that it can be used by the reader.
      This is only intended to protect against the "reading in the metro" scenario. Not to protect against reading your own passsport using an RFID reader.

      Also, many scenarios written after such discoveries assume that the readability of the data implies it can be modified to commit fraud. This is not true. The data is signed using public-key encryption, and modifications are easily detected by the reader.
      • Re:How indeed ... (Score:5, Informative)

        by xoyoyo (949672) on Friday November 17, 2006 @08:12AM (#16882126)
        If you read the TFA you'll find that it doesn't make any claims about being able to modify the data. It does however go on to list the ways an attacker might retrieve the data and make use of it.

        To be fair to the system designers it does make the whole system a little more secure in that the data on the chip has to be matched with the paper information. But only a little: if I found someone who looked sufficiently like me AND I could gain access to their passport the system is just a compromised. Arguably moreso as the claimed extra security will lead to an unjustifiable rise in trust.

        Considering the following scenario: a crooked hotel clerk (in Europe you usually have to show your passport when checking in) takes your passport "to be photocopied". Using the key information on the passport they clone every passport that comes their way. This way they can build up a stock of passports matching all conceivable faces to be resold. This actually becomes more useful the longer the system is in operation as the ten years of a usual passport's lifespan can make your face change dramatically.

        The end result is a system only marginally more secure than before.
  • by geoff lane (93738) on Friday November 17, 2006 @07:51AM (#16882018)
    The dumb thing is that the personal information is SUPPOSED to be unencrypted - it's part of the spec. Thus, the 3DES (Ha Ha) encryption of the "hello" connection is irrelevant; though if the key really is based on public information it looks like someone really has lost the plot.

    In any case, isn't 3DES being phased out because the cost of cracking it has fallen dramatically recently?
    • Re: (Score:2, Informative)

      sn't 3DES being phased out because the cost of cracking it has fallen dramatically recently?
      No. DES is easy to crack, but 3DES is quite secure. Its disadvantage compared to e.g. AES is its inefficiency.
    • Re: (Score:2, Informative)

      In any case, isn't 3DES being phased out because the cost of cracking it has fallen dramatically recently?

      DES has been cracked by brute force in a short time for a limited cost but estimates are that DESede (or 3DES or whatever name you prefer) would still require milennia with current methods. The fault lies at the weakest link - the choice of encryption key.

      The problem is that with encryption of static data (i.e. in a situation where you can't use something like Diffie-Hellman to negotiate a random key)

  • by ericlondaits (32714) on Friday November 17, 2006 @07:51AM (#16882022) Homepage
    The author of the piece (yeah, TFA) gets his panties in a bunch because the encryption key of the passport (which has the data encrypted with 3DES) is passport number, date of birth and expiration date. Then he says:
    So they are using strong cryptography to prevent conversations between the passport and the reader being eavesdropped, but they are then breaking one of the fundamental principles of encryption by using non-secret information actually published in the passport to create a 'secret key'
    What fundamental principle of encryption are they breaking? If anything, a fundamental principle of encryption is that there can't be such a thing as a "secret key" if you're either putting it in the passport or if you're deploying it to everybody that needs to scan passports (remember DVD encryption?).

    What's important is to have the data in the passport (along with the picture) digitally signed, in order to avoid tampering. The article claims that these passports are indeed signed and they didn't break the signature. Big surprise, since all they did was get a RFID reader and decrypt 3DES with the key right in front of them.
    "If you can read the chip, then you can clone it," he says. "You could use this to clone a passport that would exploit the system to illegally enter another country."
    Don't see how you can... but anyway an exploit would be a problem with the reading software, not with the passports. And it could be more easily patched after deployment.

    The article then presents some more valid points... but these have nothing to do with the basic encryption being broken. FUD mostly, surprise, surprise.
    • Re: (Score:3, Insightful)

      by Jah-Wren Ryel (80510)

      "If you can read the chip, then you can clone it," he says. "You could use this to clone a passport that would exploit the system to illegally enter another country."

      Don't see how you can

      Which part are you disputing?

      The, "if you can read it you can clone it" part?
      Or the, "you could use a cloned passport to exploit the system" part?

      I think the first is obviously true.

      I think the second only requires a small amount of imagination - clone a passport of someone who looks similar to you and you are good to go,

      • Re: (Score:3, Insightful)

        by ericlondaits (32714)

        I think the second only requires a small amount of imagination - clone a passport of someone who looks similar to you and you are good to go, especially since the customs agents will inevitably start relying on the computer to validate people rather than their own judgement.

        You wouldn't even need to clone it for that... merely steal it. If agents inevitably start relying on the computer that's where the problem lies. The checking procedure could be designed in order to somehow "force" a visual ID.

        There'

        • You wouldn't even need to clone it for that... merely steal it. If agents inevitably start relying on the computer that's where the problem lies. The checking procedure could be designed in order to somehow "force" a visual ID.

          But if the passport is stolen, then it's possible for the rightful owner to report it as stolen, in which case when that similar looking person tries to use the passport to cross a border, the nice officer doesn't need to bother doing a visual check because the computer would signal t

        • by finkployd (12902)
          You wouldn't even need to clone it for that... merely steal it.

          Ah, but then the owner would realize it was missing and report it. This way nobody is the wiser.

          If agents inevitably start relying on the computer that's where the problem lies.

          If...IF?!!! Are you on crack? OF COURSE they will rely entirely on the computer. That is what computers are for. They never make mistakes, and they never lie. Mark my words, the first couple of people who's passports are cloned by terrorists, criminals, etc. will face sig
      • Re: (Score:3, Insightful)

        by mikerich (120257)
        I think the second only requires a small amount of imagination - clone a passport of someone who looks similar to you and you are good to go, especially since the customs agents will inevitably start relying on the computer to validate people rather than their own judgement.

        Yep - just think how often your credit card signature is actually checked against that on the slip. Over here in the UK we've moved to chip 'n PIN, but a couple of recent trips to America really shocked me - my signature was NEVER ch

        • Re: (Score:3, Interesting)

          by Venner (59051)
          You'll probably find this guy's experience both amusing and utterly appalling. How far can you really go with credit card signatures?
          http://www.zug.com/pranks/credit/ [zug.com]

        • Yep - just think how often your credit card signature is actually checked against that on the slip. Over here in the UK we've moved to chip 'n PIN, but a couple of recent trips to America really shocked me - my signature was NEVER checked against that on the card and on several occasions I paid using a terminal where the card was swiped, no PIN needed, no signature.

          And thank god for that--I really don't need to be held up in line because some junior private eye behind the checkout counter thinks he's a hand

        • I certainly agree that making sure the checks are made is an issue. But the willingness of a store employee to check my personal data shouldn't be the same as a federal agent in a more critical situation.

          You could mandate a delay in authorizations (like Firefox does with downloads and extensions) during which the agent could check the face... you could have the agent's screen next to the window where the traveler is, so the photo would appear right next to the face... you could have the software take a pi
    • You can clone the passport, as the article says the facial biometric is a joke, 20-25% false positives or negatives. Which leaves just the photo, a bit of makeup, coloured contacts, hair dye. So essentially the new passport is no better than the old one but gives people the warm fuzzy feeling that all is right with the world because the computer says so.

       
    • by archeopterix (594938) on Friday November 17, 2006 @08:25AM (#16882218) Journal
      "If you can read the chip, then you can clone it," he says.
      Don't see how you can... but anyway an exploit would be a problem with the reading software, not with the passports.
      The "read -> clone" implication might be a bit of an overstatement, but if the chip identifies itself (and the passport) to the reader by revealing _all_ of its contents, then the only barrier to cloning is the availability of programmable RFID chips. Cryptographically speaking (*), they could have done better. There exists something called zero knowledge protocols [wikipedia.org] which makes it possible to identify a party without revealing the secret information used for identification, i.e. without helping the potential cloner.


      (*)I don't know whether RFID chips are capable of implementing zero knowledge protocols (they require some computing power), but if they can handle 3DES, then the answer is probably yes.

      • Re: (Score:2, Informative)

        by Paradise Pete (33184)
        if they can handle 3DES, then the answer is probably yes.

        all they have to do is verify the key. They don't have to do any heavy lifting.

    • Re: (Score:3, Interesting)

      by CortoMaltese (828267)
      The encryption and message authentication keys for the so called basic access control, specified by ICAO, are based on the machine readable zone of the passport. It's the funny lines at the bottom of the passport, with a lot of filler characters '<'. Passport number, date of birth, and expiration date are the only fields that have a check digit, which is why they were chosen as the base for the keys. The entropy is not very high, especially because the fields are not random.

      The machine readable zone wa

      • by Xugumad (39311)
        > The entropy is not very high, especially because the fields are not random.

        The entropy is a joke. Expiration date - what's the lifespan of a UK passport (don't have mine to hand, or I'd check)? That's your window for expiration date. Most people will replace passports before they expire, so you can even shorten that window. Not to mention, it's a date, which severely limits the number of valid values. Date of birth? A little harder; if you can see the person, you can get an idea of likely birth years
        • The BSI EAC spec I referred to in grandparent actually contains some analysis of the basic access control, and an approximation of the maximum key strength for passports valid for 10 years. It's 56 bits for documents with random numeric passport number, and 73 bits for documents with random alphanumeric passport numbers. But the passport numbers are, as you said, usually sequential.

          Even so, the spec goes on to mention that cracking the key still requires more effort than obtaining the less-sensitive infor

    • Why would you want to tamper an already perfectly good passport? It's cloning of perfectly good passports that they need to prevent.
    • by thebdj (768618)

      What fundamental principle of encryption are they breaking? If anything, a fundamental principle of encryption is that there can't be such a thing as a "secret key" if you're either putting it in the passport or if you're deploying it to everybody that needs to scan passports (remember DVD encryption?).

      Okay, that you for showing you have no understanding of cryptography. The problem with DVD encryption is that is what a weak cipher. It is built on a 40-bit key (mistake one) and a stream cipher (potential

      • Okay, that you for showing you have no understanding of cryptography. The problem with DVD encryption is that is what a weak cipher. It is built on a 40-bit key (mistake one) and a stream cipher (potential mistake two). This weak encryption method was the real problem with CSS, not some fundamental flaw of cryptography.

        My understanding of cryptography is probably weak... yet I though that CSS was not broken because they cracked the weak cipher, but rather because whoever made the XING software DVD Player

  • by Red Moose (31712)
    Why was it easy to crack the passports? Because they never had anything to do with security, dumbass. Like all other contracts, the purpose was to make money by taking it from the population that gave it up in taxes.

    The world, QED.

  • by testadicazzo (567430) on Friday November 17, 2006 @07:55AM (#16882042) Homepage
    from the article:
    irst it is necessary to explain why the new passports were introduced, and how they work.After the 9/11 attack on the World Trade Centre, in which fake passports were used, the US decided it wanted foreign citizens who presented themselves

    Is this true? I had the impression that the 911 terrorists had valid ID, but I haven't read the 911 commssion report...

    Can somone point me to some information confirming or disproving this assertion?

    • by myspys (204685) *
      Is this true? I had the impression that the 911 terrorists had valid ID, but I haven't read the 911 commssion report...

      oh, you mean one of these terrorists http://news.bbc.co.uk/2/hi/middle_east/1559151.stm [bbc.co.uk]?
    • by will_die (586523)
      Kind of true.
      The hijackers, all but one, used authentice state issued identification in order to hide thier nationalities. However they did use fake passports to obtain that autentic ID.
      The one who did not used this actual passport, again authentic.
      It should be noted that a passport was not needed for the flights they were on(all internal to the US) but they needed some form of ID to prove who they were when at check in.
      http://www.9-11commission.gov/report/911Report_No t es.htm [9-11commission.gov]
  • by Big Nothing (229456) <big.nothing@bigger.com> on Friday November 17, 2006 @08:01AM (#16882068)
    FTA: "Remember, information - such as a new picture - cannot be added to a cloned chip."

    I believe the missing word is "yet".

  • As usual, it leaks (Score:3, Insightful)

    by TrueKonrads (580974) on Friday November 17, 2006 @08:04AM (#16882084)
    As usual, the RFID passport leaks information and is easy to clone.
    I don't want to sound trollish, but the major force behind biometric passports worldwide is Homeland Security in USA: "You want visa free entrance to US? Make biometric passports!". Honestly, this is plain bullying.
    Besides, if the border guard thinks the passport is "secure", then he'll spend less time thinking about that person and just rely on the big "OK" that pops on his screen when he swipes the thing instead of evaluating the person with his brain and guts.
    TFA mentions brute-force protection. For a thing, like credit card, that can be replaced within 3-5 days, it's ok, but for a passport, that some joker "brute-forced" and now it is locked, it is really tragic, especially if You are away from home and this is Your only ID.
    I think that the ID should be un-trivial to counterfeit. It should deter "common" people from tampering with it for some small, petty crimes. For well funded operations, obtaining a real passport isn't a problem - bribe the migration official and he issues You one on whatever name.
    My slightly watered point is - ID should be used for "some" identification. Trust is a human thing and not machine solvable.
    Heck, Your motherboard may be bugged right now by some weird conspiracy and no matter what security measures You take, such as bug sweeps or cable checks, You're screwed already since CIA and NSA and Mossad altered the CPU. It's a human thing.
    • by will_die (586523)
      I don't want to sound trollish, but the major force behind biometric passports worldwide is Homeland Security in USA: "You want visa free entrance to US? Make biometric passports!".
      Not really the plans for the electronic passport started in the 1990 by the UN's ICAO, the first set of written/approved plans came in early 2002, it was agreed to by the member of ICAO in 2004. In the agreement they said they would implement and require its use. The US got the members to move up the time table, and implement
    • by kahei (466208)
      Besides, if the border guard thinks the passport is "secure", then he'll spend less time thinking about that person and just rely on the big "OK" that pops on his screen when he swipes the thing instead of evaluating the person with his brain and guts.


      Good. I've been evaluated by the 'brain and guts' of a few immigration officials in my life and I haven't acquired much faith in the process. Better a flawed electronic system than a guy who just won't let you in because he doesn't like the way you look.
  • by Tainek (912325)
    And Again, We the british Public ask, what exactly have we gained from being forced to pay over our hard earned cash for these cards?
  • by OeLeWaPpErKe (412765) on Friday November 17, 2006 @08:19AM (#16882160) Homepage
    That would enable very cheap readers to authenticate passports and holders, and no option to fake it.

    Even if people were to succeed in faking it, a criminal (let's not go down the terrorist route for once) wouldn't be able to erase his old identity from the books without deep inside help, which would probably be noticed by too many people.
  • by dpbsmith (263124) on Friday November 17, 2006 @08:20AM (#16882174) Homepage
    Oh, how I hate this kind of spin: "This doesn't matter," says a Home Office spokesman. "By the time you have accessed the information on the chip, you have already seen it on the passport."

    It matters a great deal because what they said couldn't be done can be done.

    It transpired a couple of years ago that some models of the expensive Kryptonite bicycle lock could be opened with a BIC pen. The Kryptonite company could have spun this by saying "This doesn't matter, because the security expert who demonstrated this didn't really steal the bicycle, and bicycle owners actually keep their valuables in their safe deposit boxes."

    What the Kryptonite company really did was acknowledge that this was a serious problem and recalled all the locks.

    Would that the UK government addressed the security problem instead of the PR problem.
    • Re: (Score:2, Insightful)

      by LordKronos (470910)
      It matters a great deal because what they said couldn't be done can be done.

      Well, until a cloned passport successfully makes it through one of their scanners, we don't know that it can be done. One possibility (though it's probably giving them too much credit to have thought of this) is that the passports actually contain 2 sets of data: one that is readable using all of the known key (as discussed in the article), and a second set that is only readable via a secret key. The purpose of the known key it to p
  • two things (Score:3, Insightful)

    by tonigonenstein (912347) on Friday November 17, 2006 @08:21AM (#16882176)
    1. I don't understand why they use RFID. If you are not supposed to read it from further than two centimeters then why not use a contact chip (smartcard) ? It would be as practical to read and you would be sure that no one could read it without your knowledge. 2. The argument in the article that goes "if you can read it you can clone it" it completely bogus and make them sound like idiots. Have they never heard of challenge-request authentication ? The basic idea is that the reader authenticates the chip to ensure it is not a forged one. To do this you have a shared secret in both the chip and the reader. The reader then sends a random challenge to the chip, which encrypts it with the secret and send the result back. The reader does the same operation and compares the result. If it matches it considers that the chip knows the secret and is thus original.

    The key idea then is that the chip never sends the secret directly, so a cloner could never guess it, even if it could issue an unlimited number of challenges to the original chip. And without the secret, it cannot produce a clone that would authenticate.

    So in short to clone the chip you need more than the chip, you need to compromise the manufacturer of the system to get the secret.
    • But as I understand the article, the UK passport does not include any sort of challenge-response authentication - that's part of the problem.
    • Re: (Score:3, Insightful)

      by CortoMaltese (828267)
      1. They do use a smart card chip, it's just contactless, or RFID if you will. It's not a dumb RFID tag. The most time consuming operation at the border control is reading the face image from the chip. The protocols available in contact chips have almost an order of magnitude slower communication speeds than in the protocols for contactless chips. It matters.

      2. In the case of basic access control, as specified by ICAO, being able to read the chip means that you are able to clone the chip. It's a weakness i

  • So how long will it be before someone calls for their arrest and they get thrown in jail?
  • Hadn't seen articles posted from someone's Slashdot journal to the front page before. Is this a new trend or just a random occurrence?
  • How much happier would /. be it they based the security of the nation on a system that assumed you could make it imposible to copy digital data?

    For once the experts got it right and realised the chips would always be copyable - and concentraited on making them unmodifiable!

    The encription was only to stop people skiming your passpord whilst it is in your pocket (think Tin Foil Hat), and this has certanly not been broken. By using a unique key for each passport and not doing a centerilised lookup for each rea
  • by ajs318 (655362) <sd_resp2.earthshod@co@uk> on Friday November 17, 2006 @08:42AM (#16882342)
    Have we learned nothing?

    The article states that if you can see the human-readable part of the passport, or even just take a good guess at the details, you can extract the rest of the data from the RFID chip -- and clone it. Encryption is used to ensure that nobody can eavesdrop on a transaction once initiated, but that doesn't help the fact that every transaction is presumed legitimate -- and the very nature of RFID means that you aren't always able to know that a transaction is taking place. If there isn't a human being checking passports, just a machine -- and one day, that is exactly how it will be -- one of those cloned RFID chips will be enough to get you past it.

    Attempting to automate people out of the loop is asking for trouble, because we can always know what tests a machine is performing and falsify the results. Criminals are not stupid -- and smart people can often be bought. If the anticipated returns are high enough, you can be sure that someone will put up the stake. Security through obscurity is worse than no security, because it leads people to believe that their details are safe when they are not.

    By the way, if you want to see how easy it is to commit identity theft, start here [google.co.uk].
  • by Anonymous Coward
    How is this cracked?

    The passport functioned as designed. The only thing the key is designed to prevent is remote surreptitious downloading of the data from the chip. If you hand someone the passport, what sort of privacy do you expect?

    Call me when they can successfully ALTER the chip data and create a valid digital signature. Merely copying the data won't help.
  • See. I told you no one beats the British Government for incompetence for very long:

    http://it.slashdot.org/comments.pl?sid=206936&cid= 16872562 [slashdot.org]
  • Clueless (Score:3, Insightful)

    by delt0r (999393) on Friday November 17, 2006 @09:18AM (#16882612)
    This reporter is clueless. I stoped reading when he/she said that 3DES is "military encryption times 3". DES was a civ cyper by desgin and was "broken" a long time ago due to weak keys and such a small key space. 3DES was quick fix and is still used and is still OK in some situations. But it is not military standard (I think AES is however).

    As others above have stated, this is not "cracked" either and they are unable to change the data on the chip. Futhermore they need to read the inside page of the passport to "sniff" for the chip data. I would be happier however, with a contact card rather than contanctless....
  • Basicly, the machines owned by the various governments would encrypt the data with a key belonging to that government (e.g. the UK has a machine) and then the machines at the airports (if the airports are fancy enough to be able to read the machine readable part of the passport) use a matching public key.
    As only the government would have the private part of the key, only the government can encrypt data that the processing machines can read (and for those who say the keys will be stolen, look at things like
  • So What? (Score:3, Insightful)

    by Luscious868 (679143) on Friday November 17, 2006 @09:25AM (#16882684)
    The question isn't whether it's crackable. You're never going to be able to make a 100% secure passport or any other type of identification for that matter. If you get a smart enough group of people together with the proper resources they will be able to crack it. The question is whether or not the technology in question is a cost effective improvement over it's predecessor.
  • A brief analysis (Score:2, Informative)

    by mjc82 (818189)
    The RFID chip makes it much more difficult to alter a stolen passport e.g. by replacing the picture, BUT if you have the resources to clone ALL of the security features and print your own passport, you can conceivably clone the passport without even having to see it. However, on top of the marginally increased cost of manufacturing cloned passports due to the inclusion of an RFID chip (and the possible scenario of having to perform the brute force attack) it is now necessary that the bearer of the fake pass
  • From TFA:

    The Home Office thinks not. It correctly points out that the information sucked out of the chip is only the same as that which appears on the page, readable with the human eye. And to obtain the key in the first place, you would need to have access to the passport to read (with the naked eye) its number, expiry date and the date of birth of its holder.

    "This doesn't matter," says a Home Office spokesman. "By the time you have accessed the information on the chip, you have already seen it on the pass

  • FUD (Score:3, Insightful)

    by slb (72208) * on Friday November 17, 2006 @09:47AM (#16882874) Homepage
    It has not been cracked !

    As usual the journalist is confusing everything. What these bozos have done is just read the content of the RFID chip exactly in the same way a custom officer would have done: using the key which is *printed* on the passport !

    Basically this chip do what it has been designed for: improve the difficulty to create fake passports.

    Now of course you have always some neo-luddites like those who are spreading FUD in order to sway opinions who will never read the details of the article and just remember the passports have been "cracked"

    Pityfull ....
  • Why would a criminal need to crack the encryption on a passport's RFID chip? An encrypted DVD can be copied bit-by-encrypted-bit to another DVD and get played on any DVD player without the copying process needing to decrypt anything. If the encrypted information on the RFID contains nothing that isn't printed on the passport, what's the point?
  • by Prototerm (762512) on Friday November 17, 2006 @11:38AM (#16884494)
    Then it would be perfectly secure, because nobody would bother to read the chip, just pontificate endlessly on what they *believed* was on it.

"Life, loathe it or ignore it, you can't like it." -- Marvin the paranoid android

Working...