Skip down to main content

More RFID vulnerabilities

Published on
8 Apr 2008
Written by
Anne-Marie Oostveen

Students from the Radboud University in the Netherlands and the Lausitz University of Applied Sciences in Germany have shown more vulnerabilities with RFID technology. In a previous post I mentioned the problems with the new ticket system with embedded RFID chips for use by frequent travellers in the Netherlands, and the possibility to hack into the passes used to enter government buildings and other important locations. Now it is shown by Henning Richter, Wojciech Mostowski, and Erik Poll that there is a way to remotely detect the presence of an e-passport (a passport with an embedded RFID chip that carries digitally signed biometric information) and to determine its nationality. With quite a few foreigners working or studying in their university departments, the researchers managed to test passports from 10 different countries: Australia, Belgium, France, Germany, Greece, Italy, the Netherlands, Poland, Spain, and Sweden.

‘While not an immediate security threat to the passport itself, it could be a concern to the passport holder: this functionality is clearly useful for passport thieves. It strengthens the case for metal shielding in the passport to prevent any communication with the RFID smartcard when the passport is closed (as used in US passport, where it is used instead of Basic Access Control). More generally, it demonstrates the problems associated with making communication wireless, esp. with something as sensitive as an identification document. ‘

Henning et al. have written a paper about their findings which will be presented at the NLUUG Conference on Security.

Related Topics:

Privacy Overview
Oxford Internet Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies
  • moove_gdrp_popup -  a cookie that saves your preferences for cookie settings. Without this cookie, the screen offering you cookie options will appear on every page you visit.

This cookie remains on your computer for 365 days, but you can adjust your preferences at any time by clicking on the "Cookie settings" link in the website footer.

Please note that if you visit the Oxford University website, any cookies you accept there will appear on our site here too, this being a subdomain. To control them, you must change your cookie preferences on the main University website.

Google Analytics

This website uses Google Tags and Google Analytics to collect anonymised information such as the number of visitors to the site, and the most popular pages. Keeping these cookies enabled helps the OII improve our website.

Enabling this option will allow cookies from:

  • Google Analytics - tracking visits to the ox.ac.uk and oii.ox.ac.uk domains

These cookies will remain on your website for 365 days, but you can edit your cookie preferences at any time via the "Cookie Settings" button in the website footer.