[LINK] Code highlights e-passport eavesdropping risk
Geoffrey Ramadan
gramadan at umd.com.au
Wed Nov 1 23:17:43 AEDT 2006
Adam
Did you also read the following paragraph from your link.
"The approach still requires knowing a secret key, derived from data
printed inside a passport, which is designed to protect against
eavesdropping."
There is nothing magical about reading data from a RFID chip.
Regards
Geoffrey Ramadan B.E.(Elec)
Chairman, Automatic Data Capture Association (www.adca.com.au)
and
Managing Director, Unique Micro Design (www.umd.com.au)
Adam Todd wrote:
>
>
> Sheesh, some people just can't help themselves.
>
> See this is plain wrong. Releasing a "hack" process without providing
> a means to remedy it. Well I guess I don't need to put any more
> effort into the issue any more. <sigh>
>
>
> At 10:03 AM 1/11/2006, brd at iimetro.com.au wrote:
>> Code highlights e-passport eavesdropping risk
>> What RFIDIOt chipped my passport?
>> By John Leyden
>> Published Tuesday 31st October 2006 12:42 GMT
>> http://www.theregister.co.uk/2006/10/31/rfid_e-passport_attack/
>>
>> Researchers have released proof-of-concept code that creates a means
>> to read
>> personal details from next-generation passports outfitted with RFID
>> chips.
>>
>> In a posting on security mailing list BugTraq, Adam Laurie of secure
>> hosting
>> facility the bunker explains how the latest version RFIDIOt, an
>> open-source
>> python library for RFID exploration, contains code that implements
>> the standard
>> for machine readable travel documents in the shape of a test program
>> called
>> mrpkey.py.
>
> _______________________________________________
> Link mailing list
> Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link
More information about the Link
mailing list