applies the principles of partial secrecy (“need-to-
know”), segregation of duties (never one developer
should work alone on an application), and monitoring.
For example in Common Criteria evaluations (ISO
15408) of smart card, the entire source code may be
inspected by an independent company: a government
agency or an evaluation lab, preferably mandated and
paid by the customer (to avoid conflicts of interests).
Unhappily, not every vulnerability will be found.
3 DISCLOSE OR NOT?
The question whether it is ethical to actively research
and whether one should disclose security vulnerabil-
ities is not obvious to answer (Rescorla, 2004). As-
suming that the researcher is not going to sell the ex-
ploit to criminals, the simple fact of publishing it, can
have serious consequences. For example, NXP issued
a statement (NXP-statement, 2008) regarding the re-
cent attacks (Garcia et al., 2008), saying that pub-
lishing the vulnerabilities of MiFare classic will harm
system in the field, facilitate “illegal activities” and
that upgrades will unhappily take a number of years.
In the security/research community however, a
great majority of people (Schneier and Shostack,
1999) will agree that “that the best way to ensure the
security of a system is to allow widespread public ex-
amination of it”. And in (Schneier, 2008) we read
that “vulnerability research is vital because it trains
our next generation of computer security experts”.
It is very naive to believe that disclosing facts
about MiFare would not do any harm. It is most likely
doing further harm. Even if some criminals have dis-
covered various attacks on MiFare before, some other
criminals or terrorists will just now discover new op-
portunities. However, we also need to look at the
harm that comes from non-disclosing. The industry
will continue to consider that the security is not im-
portant and as a result everybody will be worse-off.
3.1 Kerckhoff’s Principle in Cryptology
More specifically, what about the secrecy of crypto-
graphic algorithms in smart cards, that in many cases
are the main and the only “anti-clone” functionality
of these products? Most researchers in cryptogra-
phy contend that the design of cryptographic schemes
must be public. But in fact this is neither correct nor
reasonable. The famous 19th century Dutch cryptolo-
gist Auguste Kerckhoffs (Kerckhoffs, 1883) does not
recommend full disclosure. He only proposes the de-
sign of a system should not require secrecy. When the
enemy gets hold of the specification of the system,
the security should still remain very good, based on
the secret key. Every designer should assume that the
cipher is known to the attacker, and it should remain
secure also in this case, but this does not entail an
obligation to automatically make every cipher public.
Modern security is about layering the defenses. If se-
crecy of the algorithm keeps the attacker at bay for an
extra 3 months, it is worth having. But this should not
conceal lousy security that will collapse on the very
day the specification is disclosed.
In some industries algorithm secrecy is indispens-
able. For example it very hard and costly to protect
smart cards against side channel attacks. The secrecy
of the algorithm is an important asset that really im-
provesthe security. Forinstance Pay TV systems have
always greatly depended on the secrecy of the em-
bedded algorithms. It is totally unreasonable to ask
companies that embed their algorithms in inexpensive
hardware that is in the hands of the potential hackers
and to disclose all their details. Of course, secrecy is
a good idea only if these algorithms are good in the
first place. Otherwise we are creating an illusion of
security which can be as bad or worse than having no
security at all.
3.2 Benefits of Disclosure
The main benefit of disclosure is that “the security of
the cipher is not in the design, it is in the analysis” [at-
tributed to Schneier]. A cipher that has been under in-
tense scrutiny over a number of years and yet remains
unbroken, will be the most secure one. This is best ex-
plained by Karl Popper’s philosophy of science. Sci-
entific statements should be hold as provisionally true
until proven false. The more a statement withstands
attempts to falsify it, the more value it has. Some ci-
phers such as triple-DES have undergonea Darwinian
natural selection process. However other ciphers mas-
sively used in the industry such as KeeLoq or MiFare
Classic Crypto-1 cipher are just terribly weak (Garcia
et al., 2008).
3.2.1 Markets for Security
It appears that markets for security, and for security
products tend to be dysfunctional and fail to deliver
anything near the most basic level of security. Several
issues lie at the roots of this problem. In the computer
and IT industry, there are neither legal obligations nor
really strong market incentives for the industry to care
about security and implement it. There is an asymme-
try of information about the security of products. The
disclosure of vulnerabilities is then beneficial because
it can potentially restore the balance and provide in-
centives to fix problems. But it does rarely fix the
THE DARK SIDE OF SECURITY BY OBSCURITY - and Cloning MiFare Classic Rail and Building Passes, Anywhere,
Anytime
333