Back to Search Start Over

Vulnerabilities in First-Generation RFID-enabled Credit Cards.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Dietrich, Sven
Dhamija, Rachna
Heydt-Benjamin, Thomas S.
Bailey, Daniel V.
Fu, Kevin
Source :
Financial Cryptography & Data Security (978-3-540-77365-8); 2008, p2-14, 13p
Publication Year :
2008

Abstract

RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around $150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540773658
Database :
Complementary Index
Journal :
Financial Cryptography & Data Security (978-3-540-77365-8)
Publication Type :
Book
Accession number :
33897934
Full Text :
https://doi.org/10.1007/978-3-540-77366-5_2