Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags...

61
Intl. Conf. on Computers, Privacy & Data Protection Pi b D i Privacy by Design Marc Langheinrich University of Lugano (USI) Switzerland

Transcript of Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags...

Page 1: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Intl. Conf. on Computers, Privacy & Data Protection

P i b D iPrivacy by Design

Marc LangheinrichUniversity of Lugano (USI)

Switzerland

Page 2: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 3: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

NON PRIVACY BY NON DESIGNExample 1

NON PRIVACY BY NON DESIGN

Page 4: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 5: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 6: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

2006

Page 7: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

20 cards20 cards

no encryption

Page 8: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

C dh ld ‘ NCardholder‘s NameCard Number

Expiration DateExpiration Date

Page 9: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 10: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

2008

Page 11: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 12: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

C dh ld ‘ NCardholder‘s NameCard Number

Expiration DateExpiration Date

Page 13: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 14: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 15: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

*MacBook Air not included

Page 16: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

2008

Page 17: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 18: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 19: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 20: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Non Privacy By Non Designy y g

Page 21: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

NON PRIVACY BY BAD DESIGNExample 2

NON PRIVACY BY BAD DESIGN

Page 22: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 23: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 24: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 25: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

P<D<<LANGHEINRICH<<MARC<<<<<<<<<<<<<<<<<<<<<123456789?D<<710123?M070101?<<<<<<<<<<<<<<<?123456789?D<<710123?M070101?<<<<<<<<<<<<<<<?

Page 26: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Protection from Forgery!!Protection from Forgery!!

Page 27: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Digital Signature

Page 28: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

„ ...cloned and manipulated... “

Page 29: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 30: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

MustermannChristian

?Christian0000000000000

?Proof of Genuine Passport ?

Page 31: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 32: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 33: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Non Privacy By Bad Designy y g

Page 34: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

PRIVACY BY DESIGN?Example 3

PRIVACY BY DESIGN?

Page 35: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 36: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Smart Fridgeg

Page 37: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Smart Stove

Page 38: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Receiptless Returns

Page 39: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Fast Checkout

Page 40: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 41: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 42: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 43: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

WhiggModel #2342

Material: PolyesterTiger Tanga

Maker: Aldi (Suisse)Last washed: 5 days ago

ViagraLabo

rato

ries

Maker: PfitzerSize: Maxi (60 pills)

2006

Ari

Juel

s, R

SA

D-M

an”

Art

wor

k (c

) O

rigi

nal “

RFID

Page 44: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 45: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 46: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 47: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in
Page 48: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Working Hypothesis

Page 49: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

People don‘t wantPeople don t want privacy toolsprivacy tools

Page 50: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

People want toPeople want to get things done!get things done!The more secure, private, safe, the better

Page 51: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Getting ThingsGetting Things Done?Done?

Page 52: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Vision

Page 53: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Hands Free PrivacyHands Free Privacy

The more secure, private, safe, the better

Page 54: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Example: The Shamir TagExample: The Shamir Tag

Langheinrich, Marti: Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal, Vol. 1, No. 2, 2007

Page 55: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Example: The Shamir TagExample: The Shamir Tag

• Unsolicited read outs take long time• Unsolicited read-outs take long time–Difficult (but not impossible) to track

or identify

• Instant Identification for known tags• Instant Identification for known tags–Owner uses tags without restrictions

Langheinrich, Marti: Practical Minimalist Cryptography for RFID Privacy. IEEE Systems Journal, Vol. 1, No. 2, 2007

Page 56: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Shamir Tags IllustratedShamir Tags Illustrated

Original d bOriginalRFID-Tag:

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

Page 57: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Shamir Tags IllustratedShamir Tags Illustrated

Original d bOriginalRFID-Tag:

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

UnknownReader sees:

wait wait wait

Only few shares disclosed A few more shares disclosed Still not enough shares…

titime

Page 58: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Shamir Tags IllustratedShamir Tags Illustrated

Original d bOriginalRFID-Tag:

RFID-Tag contains encrypted ID + Key, but cut in many small pieces. All pieces are needed to decrypt Tag ID.

UnknownReader sees:

wait wait wait

Owner‘s

Only few shares disclosed A few more shares disclosed Still not enough shares…

+ =Owner‘sReader sees:

Owner checks for Instant IdentificationOnly few shares disclosed Owner checks forknown (cached) tag

y

Page 59: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Consumers receive basicprotection for all tagged goods

Additional security mechanism ycan be layered above Shamir Tags

Page 60: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Summary

Page 61: Intl. Conf. on Computers, Privacy & Data Protection Pi b D ......Shamir Tags IllustratedShamir Tags Illustrated Original d b RFID-Tag: RFID-Tag contains encrypte ID + Key, ut cut in

Privacy by DesignPrivacy by Design

• Difficult to do even for technology expertsDifficult to do even for technology experts– Industrial (RFID Credit Cards)

Government (ePassport)– Government (ePassport)

• Difficult if wrong user model– People want to get things done

– Privacy, security often gets in the way

• We need usable security and privacy– Sometimes less security may mean more privacy