Term
| What are the five attacks addressing confidentiality? |
|
Definition
Eavesdropping Tracking / tracing Skimming Direct confidentiality attack Decoding encryption |
|
|
Term
|
Definition
| Unauthorised listening / interception |
|
|
Term
| What three types of eavesdropping are there? |
|
Definition
A detection A transmission only attack A complete attack |
|
|
Term
| What is a detection attack? (Eavesdropping) |
|
Definition
| Detecting but not being able to trasnslate |
|
|
Term
| What is a transmission only attack? (Eavesdropping) |
|
Definition
Due to the difference in transmission range between a reader and a tag the eavesdropper is only able to detect and translate the readers signal |
|
|
Term
| What is a complete attack? (Eavesdropping) |
|
Definition
The eavesdropper is able to record and translate both the reader and tag communication. |
|
|
Term
| What are the distances for eavesdropping between a tag and reader? |
|
Definition
|
|
Term
| What is the distance for eavesdropping between a reader and a tag? |
|
Definition
|
|
Term
| What is analysed during a tracking / tracing attack? |
|
Definition
Comms patterns Data Time Location |
|
|
Term
|
Definition
| Un-authorised access to data on a tag |
|
|
Term
| What is the relationship between distance-cost-availability-knowledge? |
|
Definition
| As distance goes up, availability goes down, cost goes up and the amount of knowledge required by the attack goes up. |
|
|
Term
| What is the (theoretical) distance / power relationsip for skimming? |
|
Definition
|
|
Term
| Why is the distance limited during skimming? |
|
Definition
|
|
Term
| What is the practical limit of skimming? |
|
Definition
|
|
Term
| What is the practical limit without additional measures for ISO/IEC 14443 |
|
Definition
|
|
Term
| What is a direct confidentiality attack? |
|
Definition
| RFID tag receives interrogation req from attacker. Data is returned by tag. |
|
|
Term
| What two attacks address integrity |
|
Definition
|
|
Term
|
Definition
| Sending duplicated or corrupted data to the reader |
|
|
Term
|
Definition
|
|
Term
| Where is integrity vulnerable? (2) |
|
Definition
On the tag During transmission |
|
|
Term
| Explain how a spoofing attack occurrs (4) |
|
Definition
Data and trx duplicated to the reader
UID and memory data from tag is read and stored
Tag is emulated using UID and memory data
Memory data changed as desired |
|
|
Term
| What is in danger of spoofing / cloning? |
|
Definition
| Read only and read/write tags without encryption are in danger as the reader is not able to detect spoofing / cloning |
|
|
Term
| What is a tag directed integrity attack? |
|
Definition
| An attacker sends a corruption attack to the tag, and then RFID tag relays that data to the user. |
|
|
Term
|
Definition
|
|
Term
| what two things can crypto do? |
|
Definition
Auth between tag and reader
Encryption between tag and reader |
|
|
Term
| What feature does E-passports have? |
|
Definition
| Passive authentication (stored data authenticity) |
|
|
Term
| Which algorithms can E-passports use? |
|
Definition
|
|
Term
| What are the threats to E-passports? |
|
Definition
Tracking Hotlisting Scanning Passive eavesdropping Skimming Leaking biometric data |
|
|
Term
| What is the negative of using crypto? |
|
Definition
| Increases power, decreases range |
|
|
Term
|
Definition
Shielding / Absorption / Detuning Jamming Destruction Overloading the reader |
|
|
Term
|
Definition
| Distrupting function by electro-magnetic signals |
|
|
Term
|
Definition
|
|
Term
| What is shielding/ absorption/ detuning? |
|
Definition
| Disrupting function by using mechanical means |
|
|
Term
| What is overloading the reader? |
|
Definition
|
|
Term
| What is the jamming range capable of at 1 W? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Communication between reader and tag is relayed over means supporting fast communication |
|
|
Term
| What three countermeasures are there to RFID tags? |
|
Definition
Additional Confirmation
Using sensor information
Key management |
|
|
Term
| What can a possible RFID malware payload do? |
|
Definition
| Disrupt the working of the back-end RFID system, then infect other RFID systems |
|
|