Wednesday, February 15, 2006

Adi Shamir points out holes in RFID tags

Shamir points out that "a cellphone has all the ingredients you need to conduct an attack and compromise all the RFID tags in the vicinity"

He proved his point by using a directional antenna and digital oscilloscope to monitor power use by RFID tags while they were being read. Patterns in power use could be analyzed to determine when the tag received correct and incorrect password bits, he added.

This could pose a huge security problem in the way RFID tags were read, making it possible to try out combinations and getting the password right after a while.

Read the full story

0 Comments:

Post a Comment

<< Home