Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Encryption Security

British "Secure" Passports Cracked 305

hard-to-get-a-nickna writes "The Guardian has cracked the so-trumpeted secure British passports after 48 hours of work: 'Three million Britons have been issued with the new hi-tech passport, designed to frustrate terrorists and fraudsters. So why did Steve Boggan and a friendly computer expert find it so easy to break the security codes?'"
This discussion has been archived. No new comments can be posted.

British "Secure" Passports Cracked

Comments Filter:
  • News at 11 (Score:3, Insightful)

    by giorgiofr ( 887762 ) on Friday November 17, 2006 @07:38AM (#16881966)
    Governments fail. Shocking!
    Remember, kids: government intervention is good.
  • by geoff lane ( 93738 ) on Friday November 17, 2006 @07:51AM (#16882018)
    The dumb thing is that the personal information is SUPPOSED to be unencrypted - it's part of the spec. Thus, the 3DES (Ha Ha) encryption of the "hello" connection is irrelevant; though if the key really is based on public information it looks like someone really has lost the plot.

    In any case, isn't 3DES being phased out because the cost of cracking it has fallen dramatically recently?
  • by ericlondaits ( 32714 ) on Friday November 17, 2006 @07:51AM (#16882022) Homepage
    The author of the piece (yeah, TFA) gets his panties in a bunch because the encryption key of the passport (which has the data encrypted with 3DES) is passport number, date of birth and expiration date. Then he says:
    So they are using strong cryptography to prevent conversations between the passport and the reader being eavesdropped, but they are then breaking one of the fundamental principles of encryption by using non-secret information actually published in the passport to create a 'secret key'
    What fundamental principle of encryption are they breaking? If anything, a fundamental principle of encryption is that there can't be such a thing as a "secret key" if you're either putting it in the passport or if you're deploying it to everybody that needs to scan passports (remember DVD encryption?).

    What's important is to have the data in the passport (along with the picture) digitally signed, in order to avoid tampering. The article claims that these passports are indeed signed and they didn't break the signature. Big surprise, since all they did was get a RFID reader and decrypt 3DES with the key right in front of them.
    "If you can read the chip, then you can clone it," he says. "You could use this to clone a passport that would exploit the system to illegally enter another country."
    Don't see how you can... but anyway an exploit would be a problem with the reading software, not with the passports. And it could be more easily patched after deployment.

    The article then presents some more valid points... but these have nothing to do with the basic encryption being broken. FUD mostly, surprise, surprise.
  • by testadicazzo ( 567430 ) on Friday November 17, 2006 @07:55AM (#16882042) Homepage
    from the article:
    irst it is necessary to explain why the new passports were introduced, and how they work.After the 9/11 attack on the World Trade Centre, in which fake passports were used, the US decided it wanted foreign citizens who presented themselves

    Is this true? I had the impression that the 911 terrorists had valid ID, but I haven't read the 911 commssion report...

    Can somone point me to some information confirming or disproving this assertion?

  • Re:How indeed ... (Score:5, Insightful)

    by pe1chl ( 90186 ) on Friday November 17, 2006 @07:55AM (#16882044)
    This is because the encryption is not supposed to make the content inaccessible.
    The reader at the cutoms employee's desk has to be able to read the passport data. It has to know the key.
    Instead of installing a super-secret key in all readers around the world (and having to pray that it does not somehow leak out), the designers opted to use a separate key for each passport and have it printed on the passport itself, so that it can be used by the reader.
    This is only intended to protect against the "reading in the metro" scenario. Not to protect against reading your own passsport using an RFID reader.

    Also, many scenarios written after such discoveries assume that the readability of the data implies it can be modified to commit fraud. This is not true. The data is signed using public-key encryption, and modifications are easily detected by the reader.
  • by Colin Smith ( 2679 ) on Friday November 17, 2006 @07:56AM (#16882048)
    It means you can get away with all sorts of stuff and then claim "It wasn't me mate", someone must have cloned my passport.

    We do have some complete fuckwits in charge. Of course, we do have some complete fuckwits voting for them, so it kind of balances out. Someone care to suggest an improvement on democracy?

     
  • by Anonymous Coward on Friday November 17, 2006 @08:01AM (#16882066)
    For many years, the authorities in the USA got more and more irritated by the fact that it was so easy to commit all kinds of fraud in a free country.
    But it was very difficult to tighten the grip on the citizens and visitors. After all, it was a free country. In the cold-war years, they were pointing fingers at "the enemy" and explaining that citizens were "not free" there. They were being tracked.

    But when the cold war was over, the authorities really wanted to limit this freedom. They were waiting for an opportunity to do so. 9/11 was the big opportunity.
  • by Big Nothing ( 229456 ) <tord.stromdal@gmail.com> on Friday November 17, 2006 @08:01AM (#16882068)
    FTA: "Remember, information - such as a new picture - cannot be added to a cloned chip."

    I believe the missing word is "yet".

  • As usual, it leaks (Score:3, Insightful)

    by TrueKonrads ( 580974 ) on Friday November 17, 2006 @08:04AM (#16882084)
    As usual, the RFID passport leaks information and is easy to clone.
    I don't want to sound trollish, but the major force behind biometric passports worldwide is Homeland Security in USA: "You want visa free entrance to US? Make biometric passports!". Honestly, this is plain bullying.
    Besides, if the border guard thinks the passport is "secure", then he'll spend less time thinking about that person and just rely on the big "OK" that pops on his screen when he swipes the thing instead of evaluating the person with his brain and guts.
    TFA mentions brute-force protection. For a thing, like credit card, that can be replaced within 3-5 days, it's ok, but for a passport, that some joker "brute-forced" and now it is locked, it is really tragic, especially if You are away from home and this is Your only ID.
    I think that the ID should be un-trivial to counterfeit. It should deter "common" people from tampering with it for some small, petty crimes. For well funded operations, obtaining a real passport isn't a problem - bribe the migration official and he issues You one on whatever name.
    My slightly watered point is - ID should be used for "some" identification. Trust is a human thing and not machine solvable.
    Heck, Your motherboard may be bugged right now by some weird conspiracy and no matter what security measures You take, such as bug sweeps or cable checks, You're screwed already since CIA and NSA and Mossad altered the CPU. It's a human thing.
  • by Jah-Wren Ryel ( 80510 ) on Friday November 17, 2006 @08:07AM (#16882098)
    "If you can read the chip, then you can clone it," he says. "You could use this to clone a passport that would exploit the system to illegally enter another country."

    Don't see how you can
    Which part are you disputing?

    The, "if you can read it you can clone it" part?
    Or the, "you could use a cloned passport to exploit the system" part?

    I think the first is obviously true.

    I think the second only requires a small amount of imagination - clone a passport of someone who looks similar to you and you are good to go, especially since the customs agents will inevitably start relying on the computer to validate people rather than their own judgement.
  • by Tainek ( 912325 ) on Friday November 17, 2006 @08:12AM (#16882132)
    And Again, We the british Public ask, what exactly have we gained from being forced to pay over our hard earned cash for these cards?
  • by ericlondaits ( 32714 ) on Friday November 17, 2006 @08:16AM (#16882146) Homepage
    I think the second only requires a small amount of imagination - clone a passport of someone who looks similar to you and you are good to go, especially since the customs agents will inevitably start relying on the computer to validate people rather than their own judgement.

    You wouldn't even need to clone it for that... merely steal it. If agents inevitably start relying on the computer that's where the problem lies. The checking procedure could be designed in order to somehow "force" a visual ID.

    There's a lot you can innovate in that direction, which deals more with psychology than encryption. While making un-clonable passports would probably be a lot harder if not impossible.
  • Re:Easy to clone (Score:1, Insightful)

    by Anonymous Coward on Friday November 17, 2006 @08:17AM (#16882152)
    If my passport gets stolen, I report it. It gets cloned, I've no idea somebody is impersonating me, screwing up my life (and others).
    But that's exactly the point of this 'cracked' encryption: you *can't* clone the passport just by reading the RFID in someone's coat pocket.

    You need to read printed details to get access to the RFID. Sure, you can pick-pocket the passport, read what you need and then clone the RFID - but then you could just pick-pocket an old fashioned passport and spy-camera the page. But I can't pwn your life just by standing next to you on the tube.

    RFID's coming whether you tinfoil types like it or not. Why not start a business manufacturing Faraday-cage passport holders or something?
  • by dpbsmith ( 263124 ) on Friday November 17, 2006 @08:20AM (#16882174) Homepage
    Oh, how I hate this kind of spin: "This doesn't matter," says a Home Office spokesman. "By the time you have accessed the information on the chip, you have already seen it on the passport."

    It matters a great deal because what they said couldn't be done can be done.

    It transpired a couple of years ago that some models of the expensive Kryptonite bicycle lock could be opened with a BIC pen. The Kryptonite company could have spun this by saying "This doesn't matter, because the security expert who demonstrated this didn't really steal the bicycle, and bicycle owners actually keep their valuables in their safe deposit boxes."

    What the Kryptonite company really did was acknowledge that this was a serious problem and recalled all the locks.

    Would that the UK government addressed the security problem instead of the PR problem.
  • two things (Score:3, Insightful)

    by tonigonenstein ( 912347 ) on Friday November 17, 2006 @08:21AM (#16882176)
    1. I don't understand why they use RFID. If you are not supposed to read it from further than two centimeters then why not use a contact chip (smartcard) ? It would be as practical to read and you would be sure that no one could read it without your knowledge. 2. The argument in the article that goes "if you can read it you can clone it" it completely bogus and make them sound like idiots. Have they never heard of challenge-request authentication ? The basic idea is that the reader authenticates the chip to ensure it is not a forged one. To do this you have a shared secret in both the chip and the reader. The reader then sends a random challenge to the chip, which encrypts it with the secret and send the result back. The reader does the same operation and compares the result. If it matches it considers that the chip knows the secret and is thus original.

    The key idea then is that the chip never sends the secret directly, so a cloner could never guess it, even if it could issue an unlimited number of challenges to the original chip. And without the secret, it cannot produce a clone that would authenticate.

    So in short to clone the chip you need more than the chip, you need to compromise the manufacturer of the system to get the secret.
  • Re:Another DRM? (Score:3, Insightful)

    by ObsessiveMathsFreak ( 773371 ) <obsessivemathsfreak.eircom@net> on Friday November 17, 2006 @08:31AM (#16882260) Homepage Journal
    I don't know why a simple thing as desgining a security algorithm can be so hard.
    It's not hard at all! The trouble is you see, it's not cheap.
  • by mikerich ( 120257 ) on Friday November 17, 2006 @08:36AM (#16882280)
    I think the second only requires a small amount of imagination - clone a passport of someone who looks similar to you and you are good to go, especially since the customs agents will inevitably start relying on the computer to validate people rather than their own judgement.

    Yep - just think how often your credit card signature is actually checked against that on the slip. Over here in the UK we've moved to chip 'n PIN, but a couple of recent trips to America really shocked me - my signature was NEVER checked against that on the card and on several occasions I paid using a terminal where the card was swiped, no PIN needed, no signature.

    Passports and ID cards are going to go the same way. The government is telling us the passports/cards are guaranteed unforgeable so the users of the card are going to assume the card is the 'gold standard' for identity. If the card says it is genuine, then let that person through, don't worry about double-checking - the system has to be right doesn't it?

  • Re:Another DRM? (Score:5, Insightful)

    by Anonymous Coward on Friday November 17, 2006 @08:38AM (#16882306)
    The basic problem isn't the algorithm they choose. It's that their goal is incompatible with security.

    They wish to establish a world where all people can be instantly identified, correlated with commercial profiles, and tracked wherever they travel.

    How can this be done "securely"? It cannot.

    Let's assume you get these politicians to understand some basics of encryption and physical security (and good luck with that). So, you now have a system where all people can be instantly identified and tracked by the government. Secure from... what, exactly? Secure from being tracked by unauthorized people?

    Who is unauthorized, and why? I certainly have no say in who gets authorized to track me. Thousands or hundreds of thousands of random workers have access to the "authorized" level. This doesn't sound very "secure" to me.

    It's like an electrocution collar you get to wear around town, "secure" in the knowledge that its encryption protocol is flawless. The only people who can activate it are from the police department, or friends of police officers, or people who sneak into the police building and use a computer there when nobody's looking. It is secure, and cannot be triggered except from the police station. Yet, in the broader sense of security, the mere fact of the collar's existence around my neck is the absolute opposite of security.

    It doesn't really matter how secure they make the algorithms. A system whose purpose is to authoritatively track and identify all individual humans "from above" is insecure, by definition.
  • Re:Another DRM? (Score:2, Insightful)

    by sarathmenon ( 751376 ) <{moc.nonemhtaras} {ta} {mrs}> on Friday November 17, 2006 @08:41AM (#16882330) Homepage Journal
    It's not hard at all! The trouble is you see, it's not cheap.

    But just look at history. A better choice always takes more time to create, and is more expensive to design and implement, but in the long run it pays off much better. Take Unix, most of RSA's products, etc. There's no short cut to success, there is no overnight solution. Its just that a lot of people with power can't simply realize that common fact.
    Well, to whoever said common sense was common ....
  • Re:Easy to clone (Score:1, Insightful)

    by Anonymous Coward on Friday November 17, 2006 @08:46AM (#16882374)
    OK, fair enough, I stopped at the paragraph before that as it happens. So put in measures so the passport can't be read through the envelope, e.g. sealed foil jacket. Of course the postman could just open the letter anyway but hey he already could to read the details from the passport.

    Back-off is reasonable except then someone just wanders through Heathrow spamming passports with their 10m-range RFID reader and then nobody flies.
  • Re:two things (Score:3, Insightful)

    by CortoMaltese ( 828267 ) on Friday November 17, 2006 @08:50AM (#16882394)
    1. They do use a smart card chip, it's just contactless, or RFID if you will. It's not a dumb RFID tag. The most time consuming operation at the border control is reading the face image from the chip. The protocols available in contact chips have almost an order of magnitude slower communication speeds than in the protocols for contactless chips. It matters.

    2. In the case of basic access control, as specified by ICAO, being able to read the chip means that you are able to clone the chip. It's a weakness in the protocol. Basically the big secret is printed on the passport (passport number, date of birth, expiration date), so it's not difficult to obtain. And even if you don't have physical access to the passport, the key entropy is low, which helps eavesdropping considerably. You don't have to compromise the manufacturer or anything. The big challenge is coming up with a passport book that passes as a real one.

  • Re:News at 11 (Score:2, Insightful)

    by Anonymous Coward on Friday November 17, 2006 @08:52AM (#16882410)
    Er, I know this place is infested with raving Libertarians, but surely even you lot can manage to agree that border security is one of the few small areas that a Government has legitimate domain?
  • by Anonymous Coward on Friday November 17, 2006 @09:03AM (#16882490)
    How is this cracked?

    The passport functioned as designed. The only thing the key is designed to prevent is remote surreptitious downloading of the data from the chip. If you hand someone the passport, what sort of privacy do you expect?

    Call me when they can successfully ALTER the chip data and create a valid digital signature. Merely copying the data won't help.
  • by LordKronos ( 470910 ) on Friday November 17, 2006 @09:16AM (#16882598)
    It matters a great deal because what they said couldn't be done can be done.

    Well, until a cloned passport successfully makes it through one of their scanners, we don't know that it can be done. One possibility (though it's probably giving them too much credit to have thought of this) is that the passports actually contain 2 sets of data: one that is readable using all of the known key (as discussed in the article), and a second set that is only readable via a secret key. The purpose of the known key it to provide passport forgers with a red herring. They think "aha...I'm much smarter than them. They thought they had this secure, but they've screwed up, and now I've got the data". Then they clone it, try to get through customs with it, and...the forgery is detected. So now...how did it fail? Did they screw up during the cloning? Who knows?

    Its easy to crack a system when you can brute force it in private. It's a lot more difficult when you've got one attempt with someone standing there watching.

    Again, I doubt this is the case, but it's a possibility.
  • Clueless (Score:3, Insightful)

    by delt0r ( 999393 ) on Friday November 17, 2006 @09:18AM (#16882612)
    This reporter is clueless. I stoped reading when he/she said that 3DES is "military encryption times 3". DES was a civ cyper by desgin and was "broken" a long time ago due to weak keys and such a small key space. 3DES was quick fix and is still used and is still OK in some situations. But it is not military standard (I think AES is however).

    As others above have stated, this is not "cracked" either and they are unable to change the data on the chip. Futhermore they need to read the inside page of the passport to "sniff" for the chip data. I would be happier however, with a contact card rather than contanctless....
  • So What? (Score:3, Insightful)

    by Luscious868 ( 679143 ) on Friday November 17, 2006 @09:25AM (#16882684)
    The question isn't whether it's crackable. You're never going to be able to make a 100% secure passport or any other type of identification for that matter. If you get a smart enough group of people together with the proper resources they will be able to crack it. The question is whether or not the technology in question is a cost effective improvement over it's predecessor.
  • Re:How indeed ... (Score:1, Insightful)

    by Anonymous Coward on Friday November 17, 2006 @09:26AM (#16882690)
    If there was no encryption of the information on the RFID chip, anyone within a certain RFID range would be able to steal it.

    By putting the "key", albeit plainly visible as name, date-of-birth and passport-number information, inside the passport, you at least limit access to people who can read the RFID chip *and* physically access the passport.
  • by Anonymous Coward on Friday November 17, 2006 @09:44AM (#16882838)
    that there can't be such a thing as a "secret key" if you're either putting it in the passport or if you're deploying it to everybody that needs to scan passports

    Well the same is true of the keys used by ATM machines but I don't recall that system ever being cracked. People stole the machines in ram raids, but apparently they still never cracked the bank's transaction network wide open.

    Secret keys embedded in hardware that is only used in secure areas of airports with full CCTV and manual security coverage is not really open to the same kind of cracking as, say, the authentication code in the Xing software DVD player. In theory, they are the same. In practice, no way.

    And you are assuming there would be only one secret key. Not so - they could have multiply encrypted the data with a hundred private keys and then had each scanner hold 5 of those keys at random. That would be, in practical terms, a strong system - you'd need the codes from the scanners at every airport you wanted to travel through. It would need the next RFID chip up in terms of price, though.

    The article points out weaknesses in the scheme which are real and present; how is that FUD?

    What's FUD is saying that all theoretically imperfect systems are equivalently bad in practice. It simply isn't true but in any kind of discussion like this on Slashdot someone always pipes up with the same nonsense.
  • FUD (Score:3, Insightful)

    by slb ( 72208 ) * on Friday November 17, 2006 @09:47AM (#16882874) Homepage
    It has not been cracked !

    As usual the journalist is confusing everything. What these bozos have done is just read the content of the RFID chip exactly in the same way a custom officer would have done: using the key which is *printed* on the passport !

    Basically this chip do what it has been designed for: improve the difficulty to create fake passports.

    Now of course you have always some neo-luddites like those who are spreading FUD in order to sway opinions who will never read the details of the article and just remember the passports have been "cracked"

    Pityfull ....
  • Re:Another DRM? (Score:5, Insightful)

    by Alioth ( 221270 ) <no@spam> on Friday November 17, 2006 @09:48AM (#16882880) Journal
    That's a big part of the problem. Whose retarded idea was it to use RFID? Wouldn't, say, a smart card chip like the chip & pin card in credit cards have been MUCH better because then you actually need to physically have the passport in your hand to read it - instead of being able to read it through envelopes, clothing and the like with no evidence that it's been read?
  • Re:Easy to clone (Score:5, Insightful)

    by Calinous ( 985536 ) on Friday November 17, 2006 @10:28AM (#16883362)
    Even better: read a passport's chip, follow the man until he reaches his car. Make a small accident (your guilt), and let repairs be solved the official way - you will know his name (full name), address, and maybe other info from the exchange of insurance info
  • Re:Another DRM? (Score:2, Insightful)

    by newt0311 ( 973957 ) on Friday November 17, 2006 @10:32AM (#16883408)
    It makes the perfectly pragmatic assumption that, if the bad hats get physical posession of the passport you're screwed anyway.
    Bzzt. WRONG. Without the RFID chip, you would have had to make a physical replica of th passport will all the problems of doing to therein. Compared to this, all you have to do now is to take any passport and insert a cracked chip with cloned data inside. since the passport is "known to be secure," the physical contents would probably not be physically checked again and even if they are checked, the check would still not be as rigorous as it would have normally been. This really is a major security hole and a massive waste of money.
  • Re:News at 11 (Score:1, Insightful)

    by Anonymous Coward on Friday November 17, 2006 @10:59AM (#16883870)
    Yes, let's have our trackable ID cards issued by a private company. Great idea there.
  • Re:FUD (Score:2, Insightful)

    by slb ( 72208 ) * on Friday November 17, 2006 @12:42PM (#16885680) Homepage
    > How exactly has it made it harder to create fake passports?

    Because the biometric information stored in the chip is digitally signed ! In order to create a fake passport, the counterfeiter would have to obtain the private key used to sign those.

    This is not something "impossible" to do, but certainly harder than fake a simple paper passport.

    Notice that in the article, the author mention the fact that you could "clone" a passport, not create a fake one: And what the heck will you do with the cloned passport, since you're obviously not the same person on the photo ?

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...