Skip to main content

Position Statement in RFID S&P Panel: Contactless Smart Cards

  • Conference paper
  • 1955 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4886))

Abstract

When considering the security and risks of RFID systems, we must be careful to consider the issues that are specific to the device being an RFID as opposed to the inherent security issues of the device itself. RFID devices fall into two main categories:

  • Simple devices that are primarily echo-responders. While this is an over-simplification, for example these devices can often be re-programmed to reply with a new response (or none at all), they do little to no actual computing.

  • Smart-card-like systems that are also referred to as “contactless“ smart cards. These devices draw their power from induction and communicate by radio, but are otherwise ordinary smart cards.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-540-77366-5_37

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security Analysis of a Cryptographically-Enabled RFID Device, http://www.rsa.com/rsalabs/staff/bios/ajuels/publications/pdfs/DSTbreak.pdf

  2. Federal Register FR Doc 05-21284 (October 2005), http://edocket.access.gpo.gov/2005/05-21284.htm

  3. Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-passports IACR Cryptology ePrint Archive (2005), http://eprint.iacr.org/2005/095

  4. Kfir, Z., Wool, A.: Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. IACR Cryptology ePrint Archive (2005), http://eprint.iacr.org/2005/052

  5. Mahaffey, K.: RFID Passport Implementation Vulnerabilities: Technical Analysis, http://www.flexilis.com/download/RFIDPassportTechnicalAnalysis.pdf

  6. Mahaffey, K., et al.: RFID Passport Shield Failure Demonstration: FLX[2006?0605] Video Security Brief, http://www.flexilis.com/download/RFIDPassportShieldFailureDemonstration.pdf and Demonstration movie http://www.youtube.com/watch?v=-XXaqraF7pI

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Callas, J. (2007). Position Statement in RFID S&P Panel: Contactless Smart Cards. In: Dietrich, S., Dhamija, R. (eds) Financial Cryptography and Data Security. FC 2007. Lecture Notes in Computer Science, vol 4886. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77366-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77366-5_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77365-8

  • Online ISBN: 978-3-540-77366-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics