Domestic independent password products lead the upgrade of non-connected systems

Part I: Review of the M1 Security Incident

At present, the M1 card market is very large. It sells about 2 billion M1 cards worldwide and has more than 7 million M1 machines. Among them, the total sales volume of China's M1 market in 2008 was about 230 million. The application of the M1 card is also becoming more and more mature, such as identification, management of various types of access control, parking lots, tourist attractions cards, etc., accounting for 45% of the total application, bus card, highway toll, various recharge cards, Payments such as consumer cards account for about 35% of total applications, and other applications such as tickets, anti-counterfeiting, and Internet cafes account for about 20%.


M1 was cracked event:

In December 2007, K. Nohl and H. Plotz published partial results of reverse engineering and safety analysis of the M1 chip, including random number generation methods and algorithms for the authentication process, and pointed out the 48-bit stream cipher algorithm ( That is, CRYPTO1) has also been restored (but not disclosed at the time). In March 2008, the research team led by FD Garcia of Raboud University (NRU) in Nijmegen, the Netherlands, restored the CRYPTO1 algorithm and authentication method and found an effective method to attack the M1 system, but did not immediately publish its findings. In October 2008, NRU presented their findings at the ESORICS 2008 conference in Spain.

The impact of the M1 event:

In August 2008, the Dutch Ministry of Internal Affairs ordered a reassessment of the safety of the M1 system. Some important projects in Europe were affected by the suspension. At the end of 2008, the State Council of China issued a joint document requesting major agencies to carry out IC card security investigations, requiring timely discovery and resolution of problems. Under the organization of major ministries (Ministry of Industry and Information Technology, Ministry of Construction, Ministry of Communications, National Secretarial Bureau, Security Department, Ministry of Public Security, etc.), IC card application industries began comprehensive and systematic security inspections. The domestic smart card systems using M1 technology, such as important access control and card, have been exposed to potential security threats.

Commonly used M1 forgery/alteration:

Counterfeiting/altering for a single card includes the following three common situations:

Basic M1 forgery conditions:

The premise of various forgery classifications is that the core of forgery is to use algorithm weaknesses to obtain keys illegally.

Key attack premise:

First, the acquisition algorithm has been made public;

Second, understand the weaknesses of algorithms and protocols: random number problems, protocol defects, and algorithm strengths, which have also been made public;

Third, the normal transaction process data of the legal card reader and the card is recorded; Fourth, the key is calculated.

Ways to solve security problems:

Existing M1 system protective technical measures:


The most thorough approach is to build an autonomous system:


Part II: Non-connection scheme based on national autonomic algorithm

In 2006, the National Cryptography Administration organized a number of domestic RFID and password-related enterprises to jointly set up a special working group for the research of electronic tag password application technology system. The goal is to establish an RFID security system and application prototype based on the domestic independent cryptographic algorithm. The working group proposed a password security system for electronic tags and contactless smart card systems. A series of cryptographic schemes for RFID system security requirements from low to high have been established. A stream cipher (SM7), a group symmetric cipher (SM1), and an asymmetric cipher (SM2) are used at the card end to construct a non-connected system with different security level requirements.

RFID application system prototype:


RFID application system algorithm requirements:

According to the business characteristics of the RFID application system, the following security requirements can be summarized and corresponding algorithm requirements are proposed.

SM7 application range:

Comparison of SM7 and M1:


SM7 is suitable for non-connected IC card applications including identification applications (access card, work permit, entry permit), ticketing applications (large event tickets, exhibition tickets), payment and card applications (point card, campus card, enterprise) One card, bus card).

SM7 system upgrade:

Method: replace the user card; support the logical encryption card of the SM7 algorithm; modify the card reader; support SM7 authentication, communication encryption and process processing through software upgrade; the hardware structure of the card reader does not need to be changed; replace the SAM card; support the SM1 algorithm for the key Decentralized; support SM7 algorithm for identity authentication and communication encryption and decryption; background management system transformation; application of encryption machine supporting SM7/SM1 algorithm; support SM7 algorithm for issuing cards; support SM1 algorithm for 128-bit key distribution.

Application of SM7 in large-scale event exhibitions:


Algorithms used in large event exhibitions:

SM7 is mainly used for secure authentication and communication encryption of electronic tickets and readers; SM1 algorithm is used for key distribution of electronic tickets, achieving one-vote-one-density and one-vote-multiple secret; large-scale exhibition electronic ticketing system adopts multi-level key management System; support multi-level SAM release management; support multi-application management; support multi-level SAM key security import and export; support 128-bit key decentralization; tickets support multiple sets of SM7 keys; support multi-level ticket issuance management; support multi-application management .

SM7 electronic ticket file system:


Part III: Huahong Domestic Algorithm Product Solution

Hua Hong currently has chips for non-connected applications:

Including: the first SM7 logical encryption card product certified by the confidential service model of the National Secret Service, SHC1112 (SSX0904); ISO14443A compliant; communication rate 106kbps; EEPROM capacity 1k bytes; support SM7 packet encryption algorithm; suitable for electronic access control, Tickets, all kinds of card applications; SSX47 security chip that can be used as the SAM security module for RFID systems.

Huahong product plan:

Huahong is the designated production and sales unit of the commercial password products of the National Cryptographic Authority. In addition to the non-connected chip products supporting the SM7 algorithm, it also has a complete series of domestic independent cryptographic algorithm product lines: social security card chips for social security support SSF33 algorithm. SSX39; U-KEY chip SSX38 supporting SSF33 algorithm for e-government; U-KEY chip SSX47 supporting SSF/SM1 algorithm for network payment security; developing non-contact products supporting multiple domestic independent cryptographic algorithms; SM1 The high-end non-CPU card chip of SM2, SM3, and SSF33.

flowershelf

flowershelf,High Quality flowershelf,flowershelf Details, CN

Jiangxi Yingkai Wood Products Co., Ltd. , https://www.anjufurniture.com

Posted on