Term
What are the five attacks addressing confidentiality? |
|
Definition
Eavesdropping Tracking / tracing Skimming Direct confidentiality attack Decoding encryption |
|
|
Term
|
Definition
Unauthorised listening / interception |
|
|
Term
What three types of eavesdropping are there? |
|
Definition
A detection A transmission only attack A complete attack |
|
|
Term
What is a detection attack? (Eavesdropping) |
|
Definition
Detecting but not being able to trasnslate |
|
|
Term
What is a transmission only attack? (Eavesdropping) |
|
Definition
Due to the difference in transmission range between a reader and a tag the eavesdropper is only able to detect and translate the readers signal |
|
|
Term
What is a complete attack? (Eavesdropping) |
|
Definition
The eavesdropper is able to record and translate both the reader and tag communication. |
|
|
Term
What are the distances for eavesdropping between a tag and reader? |
|
Definition
|
|
Term
What is the distance for eavesdropping between a reader and a tag? |
|
Definition
|
|
Term
What is analysed during a tracking / tracing attack? |
|
Definition
Comms patterns Data Time Location |
|
|
Term
|
Definition
Un-authorised access to data on a tag |
|
|
Term
What is the relationship between distance-cost-availability-knowledge? |
|
Definition
As distance goes up, availability goes down, cost goes up and the amount of knowledge required by the attack goes up. |
|
|
Term
What is the (theoretical) distance / power relationsip for skimming? |
|
Definition
|
|
Term
Why is the distance limited during skimming? |
|
Definition
|
|
Term
What is the practical limit of skimming? |
|
Definition
|
|
Term
What is the practical limit without additional measures for ISO/IEC 14443 |
|
Definition
|
|
Term
What is a direct confidentiality attack? |
|
Definition
RFID tag receives interrogation req from attacker. Data is returned by tag. |
|
|
Term
What two attacks address integrity |
|
Definition
|
|
Term
|
Definition
Sending duplicated or corrupted data to the reader |
|
|
Term
|
Definition
|
|
Term
Where is integrity vulnerable? (2) |
|
Definition
On the tag During transmission |
|
|
Term
Explain how a spoofing attack occurrs (4) |
|
Definition
Data and trx duplicated to the reader
UID and memory data from tag is read and stored
Tag is emulated using UID and memory data
Memory data changed as desired |
|
|
Term
What is in danger of spoofing / cloning? |
|
Definition
Read only and read/write tags without encryption are in danger as the reader is not able to detect spoofing / cloning |
|
|
Term
What is a tag directed integrity attack? |
|
Definition
An attacker sends a corruption attack to the tag, and then RFID tag relays that data to the user. |
|
|
Term
|
Definition
|
|
Term
what two things can crypto do? |
|
Definition
Auth between tag and reader
Encryption between tag and reader |
|
|
Term
What feature does E-passports have? |
|
Definition
Passive authentication (stored data authenticity) |
|
|
Term
Which algorithms can E-passports use? |
|
Definition
|
|
Term
What are the threats to E-passports? |
|
Definition
Tracking Hotlisting Scanning Passive eavesdropping Skimming Leaking biometric data |
|
|
Term
What is the negative of using crypto? |
|
Definition
Increases power, decreases range |
|
|
Term
|
Definition
Shielding / Absorption / Detuning Jamming Destruction Overloading the reader |
|
|
Term
|
Definition
Distrupting function by electro-magnetic signals |
|
|
Term
|
Definition
|
|
Term
What is shielding/ absorption/ detuning? |
|
Definition
Disrupting function by using mechanical means |
|
|
Term
What is overloading the reader? |
|
Definition
|
|
Term
What is the jamming range capable of at 1 W? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Communication between reader and tag is relayed over means supporting fast communication |
|
|
Term
What three countermeasures are there to RFID tags? |
|
Definition
Additional Confirmation
Using sensor information
Key management |
|
|
Term
What can a possible RFID malware payload do? |
|
Definition
Disrupt the working of the back-end RFID system, then infect other RFID systems |
|
|