Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Encryption Hardware

MIT Reveals "Hack-Proof" RFID Chip (thestack.com) 53

JustAnotherOldGuy writes: A group of researchers at MIT and Texas Instruments claim that they have developed a new radio frequency identification chip that may be impossible to hack. Traditional RFID chips are vulnerable to side-channel attacks, whereby a hacker can extract a cryptographic key from the chip. The new RFID chip runs a random-number generator that creates a new secret key after each transaction. The key can then be verified with a server to ensure that it is correct. The group at MIT also incorporated protection against a power-glitch attack, an attack that would normally leave a chip vulnerable to an interruption of the power source that would in turn halt the creation of a new secret key. Texas Instruments CTO Ahmad Bahai stated, "We believe this research is an important step toward the goal of a robust, lo-cost, low-power authentication protocol for the industrial internet." The question is, how long will it be before this "hack proof" chip is hacked?
This discussion has been archived. No new comments can be posted.

MIT Reveals "Hack-Proof" RFID Chip

Comments Filter:
  • by Anonymous Coward

    I give it a week. Not that this will ever make it into commercial production anyway

  • Hack proof? (Score:4, Insightful)

    by Viol8 ( 599362 ) on Friday February 05, 2016 @09:08AM (#51445311) Homepage

    How many times have we heard this over the years. To be truly hack proof it'll have to be a quantum system. Is it? Doesn't look like it.

    • Re:Hack proof? (Score:5, Insightful)

      by gstoddart ( 321705 ) on Friday February 05, 2016 @09:21AM (#51445351) Homepage

      Hackproof, unsinkable, indestructible ... at a certain point the superlatives just become meaningless.

      The be truly hack proof it needs no inputs and no outputs. It would be useless, but it would be hackproof.

    • Re:Hack proof? (Score:5, Insightful)

      by AmiMoJo ( 196126 ) on Friday February 05, 2016 @09:37AM (#51445433) Homepage Journal

      TFA says it has its own power supply. Presumably a battery. Kinda breaks the most important feature of RFID.

    • How many times have we heard this over the years. To be truly hack proof it'll have to be a quantum system. Is it? Doesn't look like it.

      The real question should be when will companies learn that using terms like "hack proof" will result in an exponentially shorter life span for their "secure" product.

      At least enjoy some vetting and success in the wild before making such claims, because if you're smart you already fucking know the inevitable will happen.

    • I wish companies and organizations would stop using the term "hack proof," the same way they did with "waterproof." Like "waterproof," there is no such thing in most products. There is only "water resistant" and "hack resistant".

    • Hack proof is like fool proof just ask Douglas Adams
    • by tnk1 ( 899206 )

      I wish they'd simply say: "Not hackable by all currently known methods". This is not an OTP encrypted device, it's breakable in some manner, even if the necessary capability or process is completely impractical at present.

      I hope this is just journalistic bullshitting, because a researcher should know better than that.

  • Because that is what TFS and TFA read like. I hope there is more to this than meets the eye.

    • by rebill ( 87977 ) on Friday February 05, 2016 @09:33AM (#51445415) Journal

      Almost.

      The MIT solution, as described, appears to do away with the clock-based system that RSA uses, and instead has the server and the chip stay in lock-step as transactions occur.

      What happens when the two drift out of synchronization will be the key to disrupting the technology.

      If the server and chip stop talking to each other when they get out of synch, then the whole system is vulnerable to a wide scale DOS simply by corrupting the server's database of keys.

      Imagine an industrial plant manager's reaction when 1000 different devices brick themselves due to a hacker's attack. If it takes a day to replace and reset everything so it all works again, that manager will rip out the technology so that his or her plant is never down that long, ever again.

      On the other hand, if the server and chip and re-synchronize after a glitch, then a hacker can emulate that resynchronization process.

      I wonder if a Man in the Middle attack would work where the MiM and server exchange one set of keys, while the MiM and chip exchange a second set of keys. Would either side know that it was talking to a fraudulent data source?

      • So instead of a time-based RSA key, it's a transaction-based keygen. Sort of like a garage door. Hmm... wonder if those have been hacked.... :-/
  • unhackable? (Score:3, Insightful)

    by Anonymous Coward on Friday February 05, 2016 @09:11AM (#51445323)

    Un-hackable? and a thousand hackers said challenge accepted.

  • by geekmux ( 1040042 ) on Friday February 05, 2016 @09:13AM (#51445331)

    "The question is, how long will it be before this "hack proof" chip is hacked?"

    How long you ask?

    *looks at watch*

  • by spork invasion ( 4443495 ) on Friday February 05, 2016 @09:16AM (#51445341)
    No doubt it's an improvement to use a new key each time a transaction is made. But such a system is only as good as the quality of the pseudo-random number generator. If it's predictable, it can be exploited. It adds another layer of defense, but it's not hack-proof.
  • by aglider ( 2435074 ) on Friday February 05, 2016 @09:23AM (#51445375) Homepage
    It's a definition of time, not a quality: "Until someone will hack it".
  • by AchilleTalon ( 540925 ) on Friday February 05, 2016 @09:27AM (#51445387) Homepage
    It seems even if Slashdot is having a new owner, the Slashdotters are still the same old. Why bothering reading and trying to understand the f... article when you can comment and brag so easily and call everything bullshit?

    "Hack-proof" to SIDE CHANNEL attacks.

    • It seems even if Slashdot is having a new owner, the Slashdotters are still the same old. Why bothering reading and trying to understand the f... article when you can comment and brag so easily and call everything bullshit?

      "Hack-proof" to SIDE CHANNEL attacks.

      If there's been no shift in the fabric of the universe, your first reporting of the article should lead to you being modded informative.

      There's a reason they don't say fireproof or foolproof any more. In both cases, whenever a proof is realized in the laboratory, nature evolves a greater fool.

    • by spork invasion ( 4443495 ) on Friday February 05, 2016 @09:40AM (#51445449)
      Here's the actual MIT article: http://news.mit.edu/2016/hack-proof-rfid-chips-0203 [mit.edu]. It does a good job of explaining the concept. A side channel attack involves analyzing the behavior of the device during encryption to determine its cryptographic key. It's not easy to carry out such an attack, but it's possible. Yes, using a different key each time eliminates the possibility of a side channel at the expense of a new vulnerability, which is the pseudo-random number generator. Perhaps the PRNG is good enough to be less of a vulnerability than a side channel attack, but this is a case of replacing one vulnerability with a different one.
  • So in order to use this whizzy new technology, I must have an independent power source for the RFID chip and I need a server. Yup, that won't be too expensive for most RFID applications.

    • Wouldn't need it's own power source. Just NVRAM to keep track of how far into the PRNG sequence it's at. It doesn't use a running clock.

  • may be impossible to hack

    ...in the same way that I may be the sexiest guy in the world.

  • Seriously, since the buyout almost all slashdot postings are by timothy who might as well be the "I APPROVE ALL STUPID STORIES ROBOT."

    Timothy - I have a captcha for you.

    This story is just in line with the rest of the toilet-bowl material
    - hack proof RFID because... um... MIT?
    - Assange passport because UN committee?
    - Vendors have firewalls with holes?

    Next up something about the superbowl?

    Please. Spare. Us. You can't resurrect good slashdot editors. Obviously you've killed them.
    The honorable thing is to co

  • by PvtVoid ( 1252388 ) on Friday February 05, 2016 @09:47AM (#51445489)

    "Hackproof"?? From TFA

    Traditional RFID chips are vulnerable to side-channel attacks, whereby a hacker can extract a cryptographic key from the chip. However, a hacker would need to execute a cryptographic algorithm many times to extract usable information, as each execution leaks only a small amount of information. The new RFID chip runs a random-number generator that creates a new secret key after each transaction.

    So they're backing up the base crypto in the chip with a stream cipher: instead of generating random session keys with a public-key cipher, they're generating secret keys with a random-number generator (i.e. a stream cipher) and using those to generate a session key to generate a session key. Which may be even less secure, if the RNG (i.e. stream cipher) is itself insecure. Perhaps they can fix that by using another RNG to generate an initial state for the RNG which generates the key which generates the session key for the transaction.

    It's stream ciphers all the way down!

  • I can't believe that in 2016 there's people willing to claim that they invented something unhackable
  • ... hack in rand(), rand(), rand().

  • It's almost like they're begging people to prove them wrong.

  • by TheRealHocusLocus ( 2319802 ) on Friday February 05, 2016 @11:05AM (#51446023)

    Let's begin with a little story. In the 1950s the Betty Crocker company introduced just-add-water 'box' cake recipes that produced cakes that were as good as and often better than peoples' 'scratch' cakes --- sometimes the recipe was better (or) the mix in the factory-sealed box stayed fresher than ingredients taken from the pantry, why does not matter. Betty Crocker cakes aced blind taste-tests and were affordable, and yet the product did not take off as expected.

    A bit of research uncovered a guilty secret. In spite of what the company perceived as pure convenience, cake-making women (and the manly cake-making men of the 1950s) were secretly ashamed of the simple steps to produce a product that had been the subject of family pride. They no longer felt sufficiently empowered by the process. By the simple addition of an actual egg, enough recipe-empowerment returned to remove this psychological deterrent and cake-box sales soared.

    They later refined the tactic by suggesting on the box that the product might even be improved even further by the (optional) addition of that miracle of miracles, the extra egg. Two eggs! Everyone who was anyone tossed in that extra egg. And all remnants of cake-making insecurity vanished completely and America embraced the box-cake, to become the industrial cake-making giant it is today.

    ((SIDE NOTE: Even though this was known to me, to come up with a citation I found it not generally discussed. I had to delve down to 'book' level to find a good reference to it [google.com]. Thanks Google. Folks who imagine that web content sufficiently represents our culture should think again.))

    (DO, a deer, a female deer) So not surprisingly the good people of MIT have re-discovered that to continue the cryptographic arms race every simple hard-coded tag must become a passive device, (RE, a drop of golden sun) every passive device must become an active computing device, (MI) and every active computing device must become a self-contained machine (FA) with an autonomous power source, (SO) non-volatile memory and significant processing power. It will soon move into the next phase where even this is not sufficient because of unforeseen circumstances like new attacks on hash algorithms or implementation errors, and a robust system must also include flash-update capability, (LA) which also requires a separate and secure chain of certificate-based authentication to prevent someone from planting the original 'stoned' virus [wikipedia.org] upon RFID tags. "Your passport is now stoned. Legalize marijuana!" (TI)

    Which is itself moot if someone somewhere manages to leak or crack a single private flash update key. Which brings us back to (DO).

    So the discovery is actually that RFID technology is mirroring nicely the same arms race that computers and communication links everywhere are experiencing. As Bruce Schneier sagely says, "Security is a process, not a product." So be generally conservative and wary every time someone offers a new security end-product --- and remind yourself every now and then, "Why again are we even riding this Merry-Go-Round?" By all rights Schneier should be helping to roll out the gravy train that would place RFID tags everywhere. More work for him! But surprisingly often he comes out in favor of less embed-intrusive and more human-intensive approaches to security. That's why humans love him and robots don't subscribe to his Twitter feed.

    In addition to taking these (seemingly necessary) small steps in the direction of embedding additional complexity, we should devote equal time to considering the possibility of small steps that roll back complexity generally, to reveal what unforeseen benefits they may have. Perhaps the powdered egg once included in box-cakes was actua

  • Take a look at PHD Comics' "Science News Cycle". I think it is much more likely that the media, not the researchers, are the ones claiming that the chip is "hack-proof."
  • ...opening a can of worms, the reaction is predictable, and rightfully so.

    Anything can be reverse engineered and thus hack-proof doesn't really exist.

E = MC ** 2 +- 3db

Working...