London Transport (uk.transport.london) Discussion of all forms of transport in London.

Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #41   Report Post  
Old November 23rd 03, 02:39 PM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 4
Default Security of Oyster Cards

Martin Rich writes:


OK - but that's an issue with whether the police have excessive
powers, not specifically an issue with Oyster.


Oyster is the "enabler" -- without its logging, John Bull can
threaten & demand until the cows come home, and the turnstile
will never talk.

It's far sounder to engineer in the security, than legislate it.

Re-legislation takes only a few minutes, and without much notice,
as just happened here [The Feebees no longer need a warrant to get
your financial records, just a demand.]; re-engineering the system
later to add snooping is far more visible.
--
A host is a host from coast to
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433

  #42   Report Post  
Old November 23rd 03, 07:54 PM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 6
Default Security of Oyster Cards

On Fri, 21 Nov 2003 07:21:05 +0000, Boltar wrote:

"Ernst Lippe" wrote in message ...
Even though there are some possible attacks, in general it is very
difficult to extract those keys from the smart card.


No it isn't. You rip the lid off the chip


Hmm, did you ever tried this with a real smart card?
If you do you will certainly notice that they used some particularly
nasty types of glues. Even for old smart cards, it is pretty difficult
to get at the chips without breaking them. Also several modern chips
have some nasty protection mechanisms, so when even when you are able
to remove the coatings, the chip will simple refuse to work.

and put the EEPROM under
a special microscope. I forget the actual technique used but its been done.


You are probably referring to the work of Ross Anderson and his group
(you can find very interesting links from his personal home page
at http://www.cl.cam.ac.uk/~rja14/).
You should notice that they did not attack a real smart card but only
a standard microprocessor. Also this attack is essentially destructive,
probably you will need a lot of smart cards before you can even break
a single one of them.

There are certainly better techniques known, but they require some
expensive apparatus, and even these techniques won't guarantee 100%
success.

Admittedly its way out of the league of your one man operation but don't
think that professional fraud gangs arn't able to do it.


Even though some criminal organizations have a large resources at their
disposal, I don't think that they will use them to attack smart cards.
It is just a simple matter of economics. The initial investments
are pretty big, you need some highly skilled experts and some pretty
expensive equipment just to break a single smart card. In almost all
smart card systems you don't gain much when you are only able to duplicate
a single smart card, because it will be put on the red list and
you won't be able to really use any of the duplicates.
But even when you are able to make new "cards" (actually, these
new devices probably are not smart cards (it is not at all easy to obtain
a large set of "empty" smart cards), but other microprocessor devices
that pretend that they are smart cards) you still have to make major
investments, like producing these new "cards" and more importantly
you will have to set up an expensive distribution channel. Given
the large financial risks in such an operation, I don't think that
is economically very attractive, even for smart cards that have
high financial values.

Companies always expect the software attack but they never think of the
hardware attack. If you can physcally read the transister/capacitor values
then you can get the data out and given that the memory in most of these
cards is only a few kilobytes this wouldn't take too long. Even encrypting
the data is a waste of time since even if you the fraudster doesn't understand
what he's seeing he can still make an exact copies of it onto operationally
identical hardware (ie duplicate the cards).

Of course whether a duplicated card or any data extracted from it is any
use is another question.

Like I said, duplicating one particular card is hardly ever interesting.

greetings,

Ernst Lippe

  #43   Report Post  
Old November 23rd 03, 09:21 PM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 1
Default Security of Oyster Cards


"Ernst Lippe" writes:
Even though some criminal organizations have a large resources at
their disposal, I don't think that they will use them to attack
smart cards. It is just a simple matter of economics. The initial
investments are pretty big, you need some highly skilled experts and
some pretty expensive equipment just to break a single smart
card. In almost all smart card systems you don't gain much when you
are only able to duplicate a single smart card, because it will be
put on the red list and you won't be able to really use any of the
duplicates. But even when you are able to make new "cards"
(actually, these new devices probably are not smart cards (it is not
at all easy to obtain a large set of "empty" smart cards), but other
microprocessor devices that pretend that they are smart cards) you
still have to make major investments, like producing these new
"cards" and more importantly you will have to set up an expensive
distribution channel. Given the large financial risks in such an
operation, I don't think that is economically very attractive, even
for smart cards that have high financial values.


check out "yes card" references in the following post/trip report
(last paragraph):
http://www.smartcard.co.uk/resources...artes2002.html
The "yes card" label is supposedly started in the UK press(?)

also mentioned/reference in thread on WYTM (whats your threat model)
http://www.garlic.com/~lynn/aadsm15.htm#25 WYTM?

--
Anne & Lynn Wheeler | http://www.garlic.com/~lynn/
Internet trivia 20th anv http://www.garlic.com/~lynn/rfcietff.htm
  #44   Report Post  
Old November 23rd 03, 11:11 PM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 6
Default Security of Oyster Cards

On Sun, 23 Nov 2003 22:21:46 +0000, Anne & Lynn Wheeler wrote:


"Ernst Lippe" writes:
Even though some criminal organizations have a large resources at
their disposal, I don't think that they will use them to attack
smart cards. It is just a simple matter of economics. The initial
investments are pretty big, you need some highly skilled experts and
some pretty expensive equipment just to break a single smart
card. In almost all smart card systems you don't gain much when you
are only able to duplicate a single smart card, because it will be
put on the red list and you won't be able to really use any of the
duplicates. But even when you are able to make new "cards"
(actually, these new devices probably are not smart cards (it is not
at all easy to obtain a large set of "empty" smart cards), but other
microprocessor devices that pretend that they are smart cards) you
still have to make major investments, like producing these new
"cards" and more importantly you will have to set up an expensive
distribution channel. Given the large financial risks in such an
operation, I don't think that is economically very attractive, even
for smart cards that have high financial values.


check out "yes card" references in the following post/trip report
(last paragraph):
http://www.smartcard.co.uk/resources...artes2002.html
The "yes card" label is supposedly started in the UK press(?)


This is not an extremely convincing reference. It has been a very long
time since I looked at the EMV specifications, but as far as I can
tell this is only a threat against cards that use SDA (static data
authentication). Now static data authentication is a very limited
method of card authentication, if I understand it correctly it is just
a public key signature over some static parts of the key contents. (If
mag-stripe cards had sufficient capacity they could also use
SDA). Since every terminal has to be able to read the SDA of the card,
it should be fairly easy to copy. It is not an attack against the
keys of the card itself, but only against some of the contents of the
card that should be easily readable anyhow. It is just an example of
how you can build a not so very secure system with smart cards.

greetings,

Ernst Lippe


  #45   Report Post  
Old November 26th 03, 07:22 AM posted to uk.transport.london,alt.2600,sci.crypt
external usenet poster
 
First recorded activity at LondonBanter: Nov 2003
Posts: 1
Default Security of Oyster Cards

Phil Carmody writes:
If these cards are what have been introduced in Espoo/Helsinki/Vantaa
over the last year or so, then the above is theoretical nonsense.
As a regular bus user I can honestly say that the new cards make
embarkation massively slower than the old 'punch-card' tickets.


This is OT, but FWIW the Oysters seem to need about a second of
contact for the gates to open. Once you get used to the timing you
don't have to break your stride.
--
__ Paul Crowley
\/ o\
/\__/
http://www.ciphergoth.org/


Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Oyster Cards damaged by proximity door entry cards neill London Transport 5 March 24th 12 06:28 PM
Oyster and the b***y security question!! jedy London Transport 0 October 28th 09 11:45 AM
New National Security Technology ignored that might have stopped the bombing Scott Anderson London Transport 3 July 7th 05 05:50 PM
removing staff? What happens to security? CharlesPottins London Transport 12 July 3rd 04 10:16 AM
How do you enter your security answer on the Oyster Sales site? TheOneKEA London Transport 5 January 25th 04 05:46 PM


All times are GMT. The time now is 07:13 AM.

Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 London Banter.
The comments are property of their posters.
 

About Us

"It's about London Transport"

 

Copyright © 2017