Radio Frequency Identification Securing Your Personal Information November 10, 2005.

10
Radio Frequency Identification Securing Your Personal Information November 10, 2005

Transcript of Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Page 1: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Radio Frequency IdentificationSecuring Your Personal Information

November 10, 2005

Page 2: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

What is RFID?

Radio Frequency Identification1. RF Transmitter & Reader

2. RFID-Enabled Transponder

RF Transmitter broadcasts signal

RFID-Enabled

Transponder

RF Transmitter

& Reader

Signal

RFID Data

Page 3: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

RFID in the Marketplace

RFID technology is present in many areas of business1 “Blink” credit card processing

Image provided by: JP Morgan Chase & Co.

Page 4: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

RFID in the Marketplace

RFID technology is present in many areas of business1 “Blink” credit card processing

2 Employee identification

Image provided by: RFID USA

Page 5: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

RFID in the Marketplace

RFID technology is present in many areas of business1 “Blink” credit card processing

2 Employee identification

3 US Passports

Image provided by: US Department of State

Page 6: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Security Standards

RFID uses basic hash table encryption3 RF Transmitters can be easily replicated

4 Transponders can be activated unintentionally

RFID-Enabled

Transponder

RF Transmitter

& Reader

1. Transponder Activation Signal

2. Encrypted DataCard Number: 54485891230985648923098435709634098234579523

Page 7: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Linear Probing

Image provided by: http://www.cs.umu.se/~jopsi/dinf504/hashing_probe.gif

Page 8: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Double Hashing

RFID uses basic hash table encryption3 RF Transmitters can be easily replicated

4 Transponders can be activated unintentionally

RFID-Enabled

Transponder

RF Transmitter

& Reader

1. Transponder Activation Signal

2. Encrypted DataCard Number: 5485891230985648923098435709634098234579523

Key mod 5 Key mod 20

Page 9: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Double Hashing

H1(key) = Key mod 5

H2(key)Key mod 20

2 * (Key mod 20)3 * (Key mod 20)4 * (Key mod 20)

[H1(key) +i*H2(key)] % M

Image provided by: http://www.cs.umu.se/~jopsi/dinf504/hashing_probe.gif

Page 10: Radio Frequency Identification Securing Your Personal Information November 10, 2005.

Questions