Page 14 - Read Online
P. 14

Calderoni et al. J Surveill Secur Saf 2020;1:106-18  I  http://dx.doi.org/10.20517/jsss.2019.01                                            Page 115

               4 DISCUSSION
               In this section, we discuss some notable security and privacy patterns that may be addressed using the
               NT4H2421Gx tag.


               4.1 Communication channel security
               The most commonly known security functionalities are based on three-pass mutual authentication and rely
               on AES symmetric cryptography. The authentication procedure is initiated by the AuthenticateEV2First or
               AuthenticateLRPFirst command.

               When the reader and the tag are in the authenticated state, they are able to communicate using each
               command included in the command set. Performing a successful authentication proves that the reader
               possesses one of the cryptographic keys listed in Table 1. In authenticated mode, each APDU command
               is protected by secure messaging. Thus, message payloads are encrypted using the adopted AES key, and a
               message authentication code is attached as well. It follows that the communication channel is secured with
               respect to sniffing/eavesdropping attacks. Three-pass mutual authentication and secure messaging ensure
               confidentiality, integrity and trust. Of course, as they rely on symmetric AES cryptography, they suffer the
                                                                         [27]
               key distribution problem, which is notably relevant within this field . Some strategies should be adopted
               to provide the readers with one or more AES keys.

               Finally, the SetConfiguration command may be used to enable the leakage-resilient primitive (LRP)
               mode (note that it is not possible to revert the tag to simple AES mode). Under LRP mode, three-pass
               authentication is started by the AuthenticateLRPFirst command and may rely on originality keys as well.
               LRP mode relies on a slightly different AES algorithm which is designed to resist side-channel attacks. An
               in-depth discussion on this subject falls out of the scope of this work.

               4.2 Privacy implications
               The GDPR specifically includes the term online identifiers within the definition of what constitutes personal
               data. These objects may include information relating to the device that an individual is using, such as
               applications, tools or protocols. To this end, the GDPR Recital 30 shows a shortlist as an example and
               explicitly includes RFID tags. To comply with the latest privacy requirements, a good tag should thus be
               allowed to hide its UID under specific circumstances, since this UID may be sniffed out by unauthorized
               readers, threatening the user’s privacy.

               The random ID feature provided by NT4H2421Gx implements this requirement. This setting may be
               triggered through the SetConfiguration command, and prevent the UID to be unveiled through the
               GetVersion command. Specifically, when the tag is in random ID mode, a 4-byte random ID substitutes the
               7-byte UID within the GetVersion response. There are two more options to learn the tag UID: using the
               GetCardUID command or reading it out from the NDEF file when UID mirroring is active. The first option
               does not represent a privacy breach, as the GetCardUID command is not allowed when the reader is not
               authenticated (see Figure 6 for reference). Concerning the latter option, it should be pointed out that UID
               mirroring is not mandatory, and moreover, the mirrored UID may be stored as ciphertext within the NDEF
               file. While the examined tag mirrors the UID as plaintext (see Figure 5 for reference), a proper change in
               the NDEF file settings (through the ChangeFileSettings) would encrypt the UID.

               4.3 Chip cloning
               The ability of a malicious stakeholder to clone the tag is probably the most dangerous event concerning
               NT4H2421Gx. The only countermeasure provided by the tag is represented by the inability of the attacker
               to copy the four originality keys which are stored in the ROM. These keys may be used accessing the MF
               level to perform a successful authentication, proving the tag originality. Unfortunately, it is evident from
   9   10   11   12   13   14   15   16   17   18   19