Content deleted Content added
add apostrophe |
m →Security: replaced: specially-designed → specially designed |
||
(4 intermediate revisions by 3 users not shown) | |||
Line 1:
'''Basic access control''' ('''BAC''') is a mechanism specified to ensure only authorized parties<ref>{{cite web |url=https://www.icao.int/publications/pages/publication.aspx?docnum=9303 |title=ICAO Document 9303, Part 1 |format=PDF |accessdate=2023-04-12 }}{{cbignore|bot=medic}}</ref> can wirelessly read personal information from [[passport]]s with an [[RFID]] chip. It uses data such as the passport number, date of birth and expiration date to negotiate a session key. This key can then be used to encrypt the communication between the passport's chip and a reading device. This mechanism is intended to ensure that the owner of a passport can decide who can read the electronic contents of the passport. This mechanism was first introduced into the German passport on 1 November 2005 and is now also used in many other countries (e.g., [[United States passport]]s since August 2007).<ref>[https://travel.state.gov/passport/eppt/eppt_2788.html#Eleven ] {{webarchive |url=https://web.archive.org/web/20071230072602/http://travel.state.gov/passport/eppt/eppt_2788.html#Eleven |date=December 30, 2007 }}</ref>
== Inner workings ==
Line 9:
There is a replay attack against the basic access control protocol that allows an individual passport to be traced.<ref>{{cite web|last=Goodin |first=Dan |url=https://www.theregister.co.uk/2010/01/26/epassport_rfid_weakness/ |title=Defects in e-passports allow real-time tracking, The Register, Dan Goodin, 26th Jan 2010 |publisher=Theregister.co.uk |date=2010-01-26 |accessdate=2012-01-15}}</ref><ref>{{cite web|url=http://www.cs.bham.ac.uk/~tpc/Papers/PassportTrace.pdf |title=A Traceability Attack Against e-Passports, Tom Chothia and Vitaliy Smirnov, 14th International Conference on Financial Cryptography and Data Security 2010 |format=PDF |date= |accessdate=2012-01-15}}</ref> The attack is based on being able to distinguish a failed nonce check from a failed MAC check and works against passports with randomized unique identifiers and hard to guess keys.
The basic access control mechanism has been criticized as offering too little protection from unauthorized interception. Researchers claim
In other words, the data used as an encryption key has low [[entropy]], meaning that guessing the session key is possible via a modest [[brute force attack]].
This effect increases when passport numbers are issued sequentially or contain a redundant [[checksum]]. Both are proven to be the case in passports issued by the [[Netherlands]]
The [[German passport]] serial-number format (previously 10-digit, all-numeric, sequentially assigned) was modified on 1 November 2007, in response to concerns about the low entropy of BAC session keys. The new 10-character serial number is alphanumeric and generated with the help of a specially
== See also ==
Line 28:
==External links==
*[
[[Category:Passports]]
|