{"id":27133,"date":"2014-10-31T16:44:19","date_gmt":"2014-10-31T20:44:19","guid":{"rendered":"http:\/\/www.opensource.im\/?p=27133"},"modified":"2014-10-31T16:44:19","modified_gmt":"2014-10-31T20:44:19","slug":"free-government-penned-crypto-can-swipe-identities","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/free-government-penned-crypto-can-swipe-identities.php","title":{"rendered":"Free government-penned crypto can swipe identities"},"content":{"rendered":"<p><p>        Top 5 reasons to deploy VMware with Tegile  <\/p>\n<p>    The PLAID (Protocol for Lightweight Authentication of Identity)    cryptography kit appears to be insecure.  <\/p>\n<p>    PLAID is a homebrew cryptography system designed by Centrelink    - the Australian government agency that shovels out tens of    billions a year in welfare payments. The system has been    considered for use by US government agencies.  <\/p>\n<p>    The software offers a means of contactless authentication using    smart cards and is designed not to leak identities to scammers    with dodgy card readers.  <\/p>\n<p>    The newly-disclosed flaws allow an attacker to fuzz cards in    order to generate error messages. Attackers armed with a bushel    of error messages could identify individual identity numbers.  <\/p>\n<p>    Further problems identified included a lack of RSA padding    leaving certain implementations of PLAID open RSA signature    cloning in a mode similar to Bleichenbacher's     attack, cryptographers Matthew Green and a team of eight    colleagues from the universities of London and Darmstadt found.  <\/p>\n<p>    \"I figure if someone has to use 'free' to lure you in the door,    there's a good chance they're waiting on the other side with a    hammer and a bottle of chloroform, or whatever the    cryptographic equivalent might be,\" Green said of a     PLAID story broken by this correspondent in a previous    life.  <\/p>\n<p>    \"A quick look at PLAID didn't disappoint. The designers used    ECB like it was going out of style; did unadvisable things with    RSA encryption, and that was only the beginning.\"  <\/p>\n<p>    Green offered a concise analysis of the recent university paper    A Cryptographic    Analysis of an ISO-standards-track Authentication    Protocol.  <\/p>\n<p>    \"As well as reporting a number of undesirable cryptographic    features of the protocol, we show that the privacy properties    of PLAID are significantly weaker than claimed: using a variety    of techniques we can fingerprint and then later identify    cards,\" the researchers wrote. \"These techniques involve a    novel application of standard statistical and data analysis    techniques in cryptography.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<br \/>\n<a target=\"_blank\" href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2014\/10\/31\/privacy_flaws_found_in_fed_govts_560k_crypto\" title=\"Free government-penned crypto can swipe identities\">Free government-penned crypto can swipe identities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Top 5 reasons to deploy VMware with Tegile The PLAID (Protocol for Lightweight Authentication of Identity) cryptography kit appears to be insecure. PLAID is a homebrew cryptography system designed by Centrelink - the Australian government agency that shovels out tens of billions a year in welfare payments<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-27133","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27133"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=27133"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/27133\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=27133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=27133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=27133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}