Information technology - Privacy capability features of current RFID technologies

CEN/TR 16672 is to identify technical characteristics of particular RFID air interface protocols that need to be taken into consideration by operators of RFID systems in undertaking their privacy impact assessment. It also provides information for those operators who provide RFID-tagged items that are likely to be read by customers or other organizations. This Technical Report provides detailed privacy and security characteristics that apply to products that are compliant with specific air interface protocols, and also to variant models that comply with such standards. The Technical Report also identifies proprietary privacy and security features which have been added to tags, which are problematic of being implemented in open systems which depend on interoperability between different devices. Such proprietary solutions, whilst being technically sound, in fact impede interoperability. The gap analysis thus identified can be used to encourage greater standardization.

Informationstechnik - Leistungsmerkmale für den Schutz der Privatsphäre in gegenwärtigen RFID-Technologien

Technologie de l’information - Fonctions de protection des données personnelles des technologies RFID actuelles

Informacijska tehnologija - Zmogljivost zaščite osebnih podatkov pri današnjih tehnologijah RFID

Standard CEN/TR 16672 določa tehnične lastnosti posameznih protokolov radijskega vmesnika RFID, ki jih morajo upoštevati izvajalci sistemov RFID pri ocenjevanju vpliva na zaščito osebnih podatkov. Prav tako zagotavlja informacije za tiste izvajalce, ki zagotavljajo elemente, označene z RFID, ki jih utegnejo prebrati stranke ali druge organizacije. To tehnično poročilo zagotavlja podrobne lastnosti zasebnosti in varnosti, ki veljajo za izdelke, skladne z določenimi protokoli radijskega vmesnika, in različice modelov, ki so v skladu s temi standardi. To tehnično poročilo prav tako določa lastnosti lastniške zasebnosti in varnosti, ki so dodane oznakam, kar je problematično pri uporabi v odprtih sistemih, ki so odvisni od medoperabilnosti različnih naprav. Takšne lastniške rešitve so tehnično ustrezne, vendar ovirajo medoperabilnost. Analiza tako odkritih vrzeli se lahko uporabi za spodbujanje večje standardizacije.

General Information

Status
Published
Publication Date
03-Aug-2014
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
18-Jun-2014
Due Date
23-Aug-2014
Completion Date
04-Aug-2014

Buy Standard

Technical report
TP CEN/TR 16672:2014
English language
18 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day
Technical report
TP CEN/TR 16672:2014
English language
18 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST-TP CEN/TR 16672:2014
01-september-2014
Informacijska tehnologija - Zmogljivost zaščite osebnih podatkov pri današnjih
tehnologijah RFID
Information technology - Privacy capability features of current RFID technologies
Informationstechnik - Leistungsmerkmale für den Schutz der Privatsphäre in
gegenwärtigen RFID-Technologien
Technologie de l’information - Fonctions de protection des données personnelles des
technologies RFID actuelles
Ta slovenski standard je istoveten z: CEN/TR 16672:2014
ICS:
35.040.50 Tehnike za samodejno Automatic identification and
razpoznavanje in zajem data capture techniques
podatkov
SIST-TP CEN/TR 16672:2014 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST-TP CEN/TR 16672:2014

---------------------- Page: 2 ----------------------
SIST-TP CEN/TR 16672:2014

TECHNICAL REPORT
CEN/TR 16672

RAPPORT TECHNIQUE

TECHNISCHER BERICHT
June 2014
ICS 35.240.60
English Version
Information technology - Privacy capability features of current
RFID technologies
Technologies de l'information - Fonctions de protection de Informationstechnik - Leistungsmerkmale für den Schutz
la vie privée dans les technologies RFID actuelles der Privatsphäre in gegenwärtigen RFID-Technologien


This Technical Report was approved by CEN on 20 January 2014. It has been drawn up by the Technical Committee CEN/TC 225.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.





EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2014 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TR 16672:2014 E
worldwide for CEN national Members.

---------------------- Page: 3 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Contents Page
Foreword .4
Introduction .5
1 Scope .6
2 Terms and definitions .6
3 Symbols and abbreviations .7
4 Access protection features .7
4.1 General .7
4.2 Overview of access protection features .7
4.2.1 General .7
4.2.2 No protection .7
4.2.3 Password protection .7
4.2.4 Cryptographic protection .8
4.3 Application of access protection features .9
5 Features to protect Consumer Privacy. 10
5.1 General . 10
5.2 Unique chip ID or Tag ID . 10
5.3 Chip selection with random number. 10
5.4 Reduced read range on the tag . 10
5.5 Untraceable . 10
5.6 Hide . 11
5.7 Kill . 11
5.8 Destroy . 11
5.9 Remove . 11
6 Features to protect Data Security . 11
6.1 Features to protect Read access to the tag data . 11
6.1.1 Protection level . 11
6.1.2 "Normal" Read access . 11
6.1.3 Read (Lock) protection . 11
6.1.4 Data protection using the TID . 12
6.2 Features to protect Write access to the tag data . 12
6.2.1 General . 12
6.2.2 Protection level . 12
6.2.3 "Normal" Write access . 12
6.2.4 Write (Lock) protection . 12
6.2.5 Write protection using the TID . 12
6.2.6 Write protection using a digital signature in User Memory . 13
7 Features for tag authentication . 13
7.1 General . 13
7.2 Verification using the Unique chip ID or Tag ID . 13
7.3 Verification using the Unique chip ID or Tag ID with a digital signature . 13
7.4 Verification using a password . 13
8 Standards support of privacy capability features . 13
9 Proprietary features . 17
Bibliography . 18
2

---------------------- Page: 4 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Foreword
This document (CEN/TR 16672:2014) has been prepared by Technical Committee CEN/TC 225 “AIDC
Technologies”, the secretariat of which is held by NEN.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
This Technical Report is one of a series of related deliverables, which comprise mandate 436 Phase 2. The
other deliverables are:
— EN 16570, Information technology — Notification of RFID — The information sign and additional
information to be provided by operators of RFID application systems
— EN 16571, Information technology — RFID privacy impact assessment process
— EN 16656, Information technology - Radio frequency identification for item management - RFID Emblem
(ISO/IEC 29160:2012, modified)
— CEN/TR 16684, Information technology — Notification of RFID — Additional information to be provided
by operators
— CEN/TS 16685, Information technology — Notification of RFID — The information sign to be displayed in
areas where RFID interrogators are deployed
— CEN/TR 16669, Information technology — Device interface to support ISO/IEC 18000-3
— CEN/TR 16670, Information technology — RFID threat and vulnerability analysis
— CEN/TR 16671, Information technology — Authorisation of mobile phones when used as RFID
interrogators
— CEN/TR 16673, Information technology — RFID privacy impact assessment analysis for specific sectors
— CEN/TR 16674, Information technology — Analysis of privacy impact assessment methodologies relevant
to RFID
3

---------------------- Page: 5 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Introduction
In response to the growing deployment of RFID systems in Europe, the European Commission published in
2007 the Communication COM (2007) 96 ‘RFID in Europe: steps towards a policy framework’. This
Communication proposed steps which needed to be taken to reduce barriers to adoption of RFID whilst
respecting the basic legal framework safeguarding fundamental values such as health, environment, data
protection, privacy and security.
In December 2008, the European Commission addressed Mandate M/436 to CEN, CENELEC and ETSI in the
field of ICT as applied to RFID systems. The Mandate M/436 was accepted by the ESOs in the first months of
2009. The Mandate addresses the data protection, privacy and information aspects of RFID, and is being
executed in two phases. Phase 1, completed in May 2011, identified the work needed to produce a complete
framework of future RFID standards. The Phase 1 results are contained in the ETSI Technical Report TR 187
020, which was published in May 2011.
Phase 2 is concerned with the execution of the standardisation work programme identified in the first phase.
This Technical Report provides privacy and security characteristics that apply to the relevant standards.
Furthermore it provides an overview of these standards and their respective support of the described features.
4

---------------------- Page: 6 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
1 Scope
The scope of the Technical Report is to identify technical characteristics of particular RFID air interface
protocols that need to be taken into consideration by operators of RFID systems in undertaking their privacy
impact assessment. It also provides information for those operators who provide RFID-tagged items that are
likely to be read by customers or other organizations.
This Technical Report provides detailed privacy and security characteristics that apply to products that are
compliant with specific air interface protocols, and also to variant models that comply with such standards.
The Technical Report also identifies proprietary privacy and security features which have been added to tags,
which are problematic of being implemented in open systems which depend on interoperability between
different devices. Such proprietary solutions, whilst being technically sound, in fact impede interoperability.
The gap analysis thus identified can be used to encourage greater standardization.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
authentication
process of determining whether an entity or data is/are who or what, respectively, it claims to be.
Note 1 to entry: The types of entity authentication referred-to in this document are Tag authentication, Interrogator
authentication, and Tag-Interrogator mutual authentication
2.2
key
value used to influence the output of a cryptographic algorithm or cipher
2.3
KeyID
numerical designator for a secret key
2.4
password
secret value sent by an Interrogator to a Tag to enable restricted Tag operations
2.5
permalock
lock status that is unchangeable
EXAMPLE The memory location is permanently locked or permanently unlocked.
2.6
tag authentication
means for an Interrogator to determine, via cryptographic means, that a tag’s identity is as claimed
2.7
TID
tag ID
unique tag identifier
5

---------------------- Page: 7 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
3 Symbols and abbreviations
For the purposes of this document, the following symbols and abbreviations apply.
UII Unique Item Identifier
4 Access protection features
4.1 General
This clause identifies several features used to protect access as part of the communication protocol between
the interrogator and the tag.
4.2 contains an overview of possible access protection features.
4.3 describes how the protection features can be applied.
4.2 Overview of access protection features
4.2.1 General
This subclause contains a general overview of possible features to protect the access to "resources" on a tag,
like access to data in memory, secret keys, flags, configuration settings etc.
The list is presented in an order-ranking of approximate increasing protection level.
NOTE The ranking is approximate, because not all features are available in some RFID technologies, and there are
associated features that influence the degree of protection, such as read distance and timeouts.
4.2.2 No protection
The lowest protection level is no protection. If there is no protection, all resources on the tags are freely
accessible and can be read and alerted by any interrogator that has access to the tag. This does depend on
the interrogator and the tag supporting the same air interface protocol.
4.2.3 Password protection
4.2.3.1 General
Access to the resources on the tag can be protected with an access password. In this document the password
protection should only be considered as it is protecting the consumer's privacy. To use this feature a copy of
the password needs to be stored in the memory of the tag. When an interrogator requests access to a
resource, it first has to provide the password. The tag will compare the password that is provided by the
interrogator with the copy of the password that is stored in memory. If both copies match the interrogator is
"authenticated" and the tag will provide the interrogator with access to the requested resource. The tag could
also store the "authenticated" status in a flag.
A general weakness of the password feature is that for it to be functional, few stakeholders need to be aware
of its value. As such, passwords have limited contribution in open systems where the organization responsible
for encoding the tag (for example a product manufacturer) has limited knowledge of the specific organization
that will read a particular tag (e.g. which retail store).
A technical weakness of the password feature is that the password needs to be transmitted over the air.
Therefore it can easily be intercepted by an intruder, who can then use the password later to also get access
6

---------------------- Page: 8 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
to the same resource. An increased level of protection can be provided if the password is transmitted in
segments, thus requiring more than one interception to capture the entire password.
A practical limitation of password protection is the possibility to find the password with a "brute force" attack;
the interrogator can simply try to find the password starting with binary "0" and then increase the password by
"1" after the tag rejects the request, until it has found the right password.
The protection level of the password feature is a function of its length given that all the communication is at
the binary level. A brute force attack on an 8-bit password can be achieved in 255 attempts, while a 32-bit
password requires 4.3 billion attempts, or over 2 billion attempts on average. While modern computers can
process tens of thousands of passwords a second, a brute force attack on an RFID tag requires a new
command to be generated each time and is therefore limited by the air interface speed. Also, unlike cracking a
password to access a computer system, a password found in one RFID tag might have limited value.
Practically this means that the password features has the best value if it needs to be used only once.
4.2.3.2 Password protection with security timeout
The protection level of the password feature can be improved by implementing a security timeout. The tag can
introduce a time delay before it replies to the interrogator. A long delay will result in a brute force attack taking
a long time.
There are various possibilities, like a configurable delay or a delay that increases with the number of failed
requests.
4.2.3.3 Password protection with cover coding
Cover coding can be used to improve the protection against incepting the password over the air. It obscures
information that it is transmitting to a tag. To cover-code a password, an interrogator first requests a random
number from the tag. The interrogator then performs a bit-wise XOR of the password with this random
number, and transmits the cover-coded string to the tag. The tag uncovers the password by performing a bit-
wise XOR of the received cover-coded string with the original random number and then compares the values
of both copies. XOR based cover coding can be implemented in a state machine, and therefore in a passive
tag.
4.2.4 Cryptographic protection
4.2.4.1 General
Cryptographic protection can be used if the tag is equipped with a processor to perform a cryptographic
calculation and has memory to store a secret key. Before requesting access to a resource, an interrogator first
needs to request a random number from the tag. The interrogator needs to encrypt the random number with
the secret key and return the encrypted secret key to the tag. The tag will use the on-board cryptographic
processor to decrypt the received data with the secret key that is stored in its memory and compare the result
with the random number that it has initially generated. If the numbers match the interrogator is "authenticated"
and the tag will provide the interrogator with access to the resource. The tag could also store the
"authenticated" status in a flag.
An inverse process is that the interrogator sends a random challenge, the tag encrypts it and sends back the
encrypted data to the interrogator. In this case the interrogator decrypts it and can check the originality of the
tag.
A tag could have several secret keys stored on the tag. In that case an interrogator needs to indicate which
key needs to be used for authentication and after a successful authentication the tag could store the number
that has been used.
There are several forms of cryptography. The chief ones are Symmetric-key and Public-key.
7

---------------------- Page: 9 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
4.2.4.2 Symmetric-key cryptography
In Symmetric-key cryptography the interrogator and the tag share the same secret key to encrypt and decrypt
the data.
The main disadvantage of Symmetric-key cryptography is that the secret keys need to be stored in a secret
manner in the infrastructure.
Symmetric key cryptography is also referred to as shared-key, single-key, secret-key, and private-key or one-
key cryptography.
4.2.4.3 Public-key cryptography
Public-key cryptography uses two keys: a public key and a private key. The public and the private key are
different, but mathematically linked. One key encrypts the random number and the other decrypts the cypher
text. Neither key can perform both functions. For authentication of the:
— Tag, the public key is made publicly available and is used by the interrogator to decrypt messages. The
private key is stored in the tag and kept secret;
— Interrogator, the interrogator holds a private key and sends the encrypted message to the tag, which will
decrypt it with the public key to authenticate the interrogator.
For further encryption of the communication it is common to derive the session key from the exchanged
random numbers and use that session key to encrypt/decrypt the message received from / sent to the
interrogator.
Public-key cryptography is also referred to as Asymmetric cryptography.
4.3 Application of access protection features
The right to get access to a resource can be obtained by exchanging a shared-secret, usually a password or a
secret key. After a successful exchange of the shared secret, the interrogator will gain the "authenticated"
status and be granted access to the requested resource. The "authenticated" status could also be stored in a
flag (for later use in the same session), as long as the tag remains in the field of the interrogator.
A tag might have the capability to support several secret keys, for example if there are separately accessible
areas of memory using appropriately set commands for reading and writing to the tag. In these more
sophisticated tags different access protection features might be applied by the design of the tag and an RFID
operator's option to invoke the feature. The access protection features can also differ.
EXAMPLE An RFID tag has the following features:
— an area of memory used to identify a product, although password protected this has not been set to enable the
code to be read by any interrogator
— an area of memory that control the destination of the item in a supply chain, where read access is permitted, but
write access is protected
— an area of memory containing data used by field service engineers where read access is protected, and write
access only permitted by a service engineer in the factory when the item has to be returned
In the case where a tag has stored several secret keys on the tag, access to a particular resource could also
be linked to a specific key. In that case an interrogator needs to indicate which key needs to be used for
authentication and after a successful authentication the tag needs to store the number that has been used.

8

---------------------- Page: 10 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Access to a resource on the tag will only be granted when the interrogator has received the "authenticated"
state, through a successful authentication with either a password or cryptographic key.
5 Features to protect Consumer Privacy
5.1 General
This clause identifies features associated with the protection of consumer privacy. The list is presented in an
order-ranking of approximate increasing protection level.
5.2 Unique chip ID or Tag ID
A unique chip ID feature is a factory programmed unique identification number of a tag that enables different
tags to be reliably distinguished. The tag is traceable when the unique chip ID is accessible without protection
and can then be linked to an individual that can then be tracked as well.
For some tags, the unique chip ID is an essential part of the air interface protocol to ensure that
communication is with one tag and not others in the read range.
Access to the unique chip ID feature can be protected and might only be granted when the interrogator has
received the "authenticated" state, through a successful authentication with either a password or
cryptographic key.
5.3 Chip selection with random number
The random number for access is only valid for one communication session between interrogator and tag and
does change for the next session. Therefore it prevents tracking. The feature can be turned off or on. Access
to the feature will only be granted when the interrogator has received the "authenticated" state, through a
successful authentication with either a password or cryptographic key.
Some tags that use a random number for access also have a unique chip ID, which can be protected as
described in 5.2.
5.4 Reduced read range on the tag
The reduced read range feature allows a tag essentially reduce the distance it can communicate with an
interrogator, compared to the distance when the feature is not enabled. An essential reduction could be down
to 25 %. The feature can be turned off or on. Access to the feature will only be granted when the interrogator
has received the "authenticated" state, through a successful authentication with either a password or
cryptographic key.
5.5 Untraceable
The Untraceability feature allows a tag to modify the amount of identifying information it exposes. The tag's
reply could consist of configurable "fixed" and "variable" part. The feature can be turned off or on. Access to
the feature will only be granted when the interrogator has received the "authenticated" state, through a
successful authentication with either a password or cryptographic key.
EXAMPLE In a tag that has no hardware feature of a permanent unique chip ID, there is still the possibility that data
can be traced by the application of some form of serialisation, making the associated item an instance of a product. This is
certainly a requirement in some applications. If the tagged is to remain in the possession of a person and the product
identity needs to remain readable, all or part of the serialised component can be overwritten with a string of zero bits. This
then renders the tag still readable, but reduces the uniqueness. Removing 16 bits makes the tag and the item the same as
65,535 other instances of the same product and less traceable.
5.6 Hide
9

---------------------- Page: 11 ----------------------
SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
The Hide feature allows a tag to be unresponsive until it gets authenticated by an interrogator. The feature can
be turned off or on. Access to the feature will only be granted when the interrogator has received the
"authenticated" state, through a successful authentication with either a password or cryptographic key.
5.7 Kill
The Kill feature allows an interrogator to Kill the tag and render it unreadable, even though it remains attached
to its associated item. The Kill feature can only be used after the interrogator has received the "authenticated"
state, through a successful authentication with either a password or cryptographic key.
After a successful execution of a Kill command the tag will remain permanently silent and can never be
activated or turned on again.
5.8 Destroy
All previous features are associated with the functionality of the chip. The Destroy feature will render a tag
permanently silent by physically destroying the chip or the antenna, which is essential for communication. If
the antenna is cut, on certain types the tag might not function anymore.
5.9 Remove
A tag may be removed from an object. Although the tag remains readable, the associated link with a person or
item is broken.
6 Features to protect Data Security
6.1 Features to protect Read access to the tag data
6.1.1 Protection level
The features in this clause are listed in order of increased protection level.
6.1.2 "Normal" Read access
"Normal" Read access allows data to be read from the tag's memory. In fact memory with "normal" Read
access contains no protection and is considered as the lowest protection level.
6.1.3 Read (Lock) protection
6.1.3.1 General
Read, or Read Lock protection prevents all or part of the memory of a tag can be read by an interrogator.
Read access to all or part of the tags memory will only be granted when the interrogator has received the
"authenticated" state, through a successful authentication with either a password or cryptographic key.
The read lock feature can be temporary or permanent.
6.1.3.2 Temporary read Lock protection
A temporary lock can be lifted when the interrogator has received the "authenticated" state, through a
successful authentication with either a password or cryptographic key.
6.1.3.3 Permanent (or Perma) read L
...

SLOVENSKI STANDARD
SIST-TP CEN/TR 16672:2014
01-september-2014
,QIRUPDFLMVNDWHKQRORJLMD=PRJOMLYRVW]DãþLWHRVHEQLKSRGDWNRYSULGDQDãQMLK
WHKQRORJLMDK5),'
Information technology - Privacy capability features of current RFID technologies
Informationstechnik - Leistungsmerkmale für den Schutz der Privatsphäre in
gegenwärtigen RFID-Technologien
Technologie de l’information - Fonctions de protection des données personnelles des
technologies RFID actuelles
Ta slovenski standard je istoveten z: CEN/TR 16672:2014
ICS:
35.020 Informacijska tehnika in Information technology (IT) in
tehnologija na splošno general
SIST-TP CEN/TR 16672:2014 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST-TP CEN/TR 16672:2014

---------------------- Page: 2 ----------------------

SIST-TP CEN/TR 16672:2014

TECHNICAL REPORT
CEN/TR 16672

RAPPORT TECHNIQUE

TECHNISCHER BERICHT
June 2014
ICS 35.240.60
English Version
Information technology - Privacy capability features of current
RFID technologies
Technologies de l'information - Fonctions de protection de Informationstechnik - Leistungsmerkmale für den Schutz
la vie privée dans les technologies RFID actuelles der Privatsphäre in gegenwärtigen RFID-Technologien


This Technical Report was approved by CEN on 20 January 2014. It has been drawn up by the Technical Committee CEN/TC 225.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.





EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

CEN-CENELEC Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2014 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TR 16672:2014 E
worldwide for CEN national Members.

---------------------- Page: 3 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Contents Page
Foreword .4
Introduction .5
1 Scope .6
2 Terms and definitions .6
3 Symbols and abbreviations .7
4 Access protection features .7
4.1 General .7
4.2 Overview of access protection features .7
4.2.1 General .7
4.2.2 No protection .7
4.2.3 Password protection .7
4.2.4 Cryptographic protection .8
4.3 Application of access protection features .9
5 Features to protect Consumer Privacy. 10
5.1 General . 10
5.2 Unique chip ID or Tag ID . 10
5.3 Chip selection with random number. 10
5.4 Reduced read range on the tag . 10
5.5 Untraceable . 10
5.6 Hide . 11
5.7 Kill . 11
5.8 Destroy . 11
5.9 Remove . 11
6 Features to protect Data Security . 11
6.1 Features to protect Read access to the tag data . 11
6.1.1 Protection level . 11
6.1.2 "Normal" Read access . 11
6.1.3 Read (Lock) protection . 11
6.1.4 Data protection using the TID . 12
6.2 Features to protect Write access to the tag data . 12
6.2.1 General . 12
6.2.2 Protection level . 12
6.2.3 "Normal" Write access . 12
6.2.4 Write (Lock) protection . 12
6.2.5 Write protection using the TID . 12
6.2.6 Write protection using a digital signature in User Memory . 13
7 Features for tag authentication . 13
7.1 General . 13
7.2 Verification using the Unique chip ID or Tag ID . 13
7.3 Verification using the Unique chip ID or Tag ID with a digital signature . 13
7.4 Verification using a password . 13
8 Standards support of privacy capability features . 13
9 Proprietary features . 17
Bibliography . 18
2

---------------------- Page: 4 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Foreword
This document (CEN/TR 16672:2014) has been prepared by Technical Committee CEN/TC 225 “AIDC
Technologies”, the secretariat of which is held by NEN.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. CEN [and/or CENELEC] shall not be held responsible for identifying any or all such patent rights.
This Technical Report is one of a series of related deliverables, which comprise mandate 436 Phase 2. The
other deliverables are:
— EN 16570, Information technology — Notification of RFID — The information sign and additional
information to be provided by operators of RFID application systems
— EN 16571, Information technology — RFID privacy impact assessment process
— EN 16656, Information technology - Radio frequency identification for item management - RFID Emblem
(ISO/IEC 29160:2012, modified)
— CEN/TR 16684, Information technology — Notification of RFID — Additional information to be provided
by operators
— CEN/TS 16685, Information technology — Notification of RFID — The information sign to be displayed in
areas where RFID interrogators are deployed
— CEN/TR 16669, Information technology — Device interface to support ISO/IEC 18000-3
— CEN/TR 16670, Information technology — RFID threat and vulnerability analysis
— CEN/TR 16671, Information technology — Authorisation of mobile phones when used as RFID
interrogators
— CEN/TR 16673, Information technology — RFID privacy impact assessment analysis for specific sectors
— CEN/TR 16674, Information technology — Analysis of privacy impact assessment methodologies relevant
to RFID
3

---------------------- Page: 5 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Introduction
In response to the growing deployment of RFID systems in Europe, the European Commission published in
2007 the Communication COM (2007) 96 ‘RFID in Europe: steps towards a policy framework’. This
Communication proposed steps which needed to be taken to reduce barriers to adoption of RFID whilst
respecting the basic legal framework safeguarding fundamental values such as health, environment, data
protection, privacy and security.
In December 2008, the European Commission addressed Mandate M/436 to CEN, CENELEC and ETSI in the
field of ICT as applied to RFID systems. The Mandate M/436 was accepted by the ESOs in the first months of
2009. The Mandate addresses the data protection, privacy and information aspects of RFID, and is being
executed in two phases. Phase 1, completed in May 2011, identified the work needed to produce a complete
framework of future RFID standards. The Phase 1 results are contained in the ETSI Technical Report TR 187
020, which was published in May 2011.
Phase 2 is concerned with the execution of the standardisation work programme identified in the first phase.
This Technical Report provides privacy and security characteristics that apply to the relevant standards.
Furthermore it provides an overview of these standards and their respective support of the described features.
4

---------------------- Page: 6 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
1 Scope
The scope of the Technical Report is to identify technical characteristics of particular RFID air interface
protocols that need to be taken into consideration by operators of RFID systems in undertaking their privacy
impact assessment. It also provides information for those operators who provide RFID-tagged items that are
likely to be read by customers or other organizations.
This Technical Report provides detailed privacy and security characteristics that apply to products that are
compliant with specific air interface protocols, and also to variant models that comply with such standards.
The Technical Report also identifies proprietary privacy and security features which have been added to tags,
which are problematic of being implemented in open systems which depend on interoperability between
different devices. Such proprietary solutions, whilst being technically sound, in fact impede interoperability.
The gap analysis thus identified can be used to encourage greater standardization.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
authentication
process of determining whether an entity or data is/are who or what, respectively, it claims to be.
Note 1 to entry: The types of entity authentication referred-to in this document are Tag authentication, Interrogator
authentication, and Tag-Interrogator mutual authentication
2.2
key
value used to influence the output of a cryptographic algorithm or cipher
2.3
KeyID
numerical designator for a secret key
2.4
password
secret value sent by an Interrogator to a Tag to enable restricted Tag operations
2.5
permalock
lock status that is unchangeable
EXAMPLE The memory location is permanently locked or permanently unlocked.
2.6
tag authentication
means for an Interrogator to determine, via cryptographic means, that a tag’s identity is as claimed
2.7
TID
tag ID
unique tag identifier
5

---------------------- Page: 7 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
3 Symbols and abbreviations
For the purposes of this document, the following symbols and abbreviations apply.
UII Unique Item Identifier
4 Access protection features
4.1 General
This clause identifies several features used to protect access as part of the communication protocol between
the interrogator and the tag.
4.2 contains an overview of possible access protection features.
4.3 describes how the protection features can be applied.
4.2 Overview of access protection features
4.2.1 General
This subclause contains a general overview of possible features to protect the access to "resources" on a tag,
like access to data in memory, secret keys, flags, configuration settings etc.
The list is presented in an order-ranking of approximate increasing protection level.
NOTE The ranking is approximate, because not all features are available in some RFID technologies, and there are
associated features that influence the degree of protection, such as read distance and timeouts.
4.2.2 No protection
The lowest protection level is no protection. If there is no protection, all resources on the tags are freely
accessible and can be read and alerted by any interrogator that has access to the tag. This does depend on
the interrogator and the tag supporting the same air interface protocol.
4.2.3 Password protection
4.2.3.1 General
Access to the resources on the tag can be protected with an access password. In this document the password
protection should only be considered as it is protecting the consumer's privacy. To use this feature a copy of
the password needs to be stored in the memory of the tag. When an interrogator requests access to a
resource, it first has to provide the password. The tag will compare the password that is provided by the
interrogator with the copy of the password that is stored in memory. If both copies match the interrogator is
"authenticated" and the tag will provide the interrogator with access to the requested resource. The tag could
also store the "authenticated" status in a flag.
A general weakness of the password feature is that for it to be functional, few stakeholders need to be aware
of its value. As such, passwords have limited contribution in open systems where the organization responsible
for encoding the tag (for example a product manufacturer) has limited knowledge of the specific organization
that will read a particular tag (e.g. which retail store).
A technical weakness of the password feature is that the password needs to be transmitted over the air.
Therefore it can easily be intercepted by an intruder, who can then use the password later to also get access
6

---------------------- Page: 8 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
to the same resource. An increased level of protection can be provided if the password is transmitted in
segments, thus requiring more than one interception to capture the entire password.
A practical limitation of password protection is the possibility to find the password with a "brute force" attack;
the interrogator can simply try to find the password starting with binary "0" and then increase the password by
"1" after the tag rejects the request, until it has found the right password.
The protection level of the password feature is a function of its length given that all the communication is at
the binary level. A brute force attack on an 8-bit password can be achieved in 255 attempts, while a 32-bit
password requires 4.3 billion attempts, or over 2 billion attempts on average. While modern computers can
process tens of thousands of passwords a second, a brute force attack on an RFID tag requires a new
command to be generated each time and is therefore limited by the air interface speed. Also, unlike cracking a
password to access a computer system, a password found in one RFID tag might have limited value.
Practically this means that the password features has the best value if it needs to be used only once.
4.2.3.2 Password protection with security timeout
The protection level of the password feature can be improved by implementing a security timeout. The tag can
introduce a time delay before it replies to the interrogator. A long delay will result in a brute force attack taking
a long time.
There are various possibilities, like a configurable delay or a delay that increases with the number of failed
requests.
4.2.3.3 Password protection with cover coding
Cover coding can be used to improve the protection against incepting the password over the air. It obscures
information that it is transmitting to a tag. To cover-code a password, an interrogator first requests a random
number from the tag. The interrogator then performs a bit-wise XOR of the password with this random
number, and transmits the cover-coded string to the tag. The tag uncovers the password by performing a bit-
wise XOR of the received cover-coded string with the original random number and then compares the values
of both copies. XOR based cover coding can be implemented in a state machine, and therefore in a passive
tag.
4.2.4 Cryptographic protection
4.2.4.1 General
Cryptographic protection can be used if the tag is equipped with a processor to perform a cryptographic
calculation and has memory to store a secret key. Before requesting access to a resource, an interrogator first
needs to request a random number from the tag. The interrogator needs to encrypt the random number with
the secret key and return the encrypted secret key to the tag. The tag will use the on-board cryptographic
processor to decrypt the received data with the secret key that is stored in its memory and compare the result
with the random number that it has initially generated. If the numbers match the interrogator is "authenticated"
and the tag will provide the interrogator with access to the resource. The tag could also store the
"authenticated" status in a flag.
An inverse process is that the interrogator sends a random challenge, the tag encrypts it and sends back the
encrypted data to the interrogator. In this case the interrogator decrypts it and can check the originality of the
tag.
A tag could have several secret keys stored on the tag. In that case an interrogator needs to indicate which
key needs to be used for authentication and after a successful authentication the tag could store the number
that has been used.
There are several forms of cryptography. The chief ones are Symmetric-key and Public-key.
7

---------------------- Page: 9 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
4.2.4.2 Symmetric-key cryptography
In Symmetric-key cryptography the interrogator and the tag share the same secret key to encrypt and decrypt
the data.
The main disadvantage of Symmetric-key cryptography is that the secret keys need to be stored in a secret
manner in the infrastructure.
Symmetric key cryptography is also referred to as shared-key, single-key, secret-key, and private-key or one-
key cryptography.
4.2.4.3 Public-key cryptography
Public-key cryptography uses two keys: a public key and a private key. The public and the private key are
different, but mathematically linked. One key encrypts the random number and the other decrypts the cypher
text. Neither key can perform both functions. For authentication of the:
— Tag, the public key is made publicly available and is used by the interrogator to decrypt messages. The
private key is stored in the tag and kept secret;
— Interrogator, the interrogator holds a private key and sends the encrypted message to the tag, which will
decrypt it with the public key to authenticate the interrogator.
For further encryption of the communication it is common to derive the session key from the exchanged
random numbers and use that session key to encrypt/decrypt the message received from / sent to the
interrogator.
Public-key cryptography is also referred to as Asymmetric cryptography.
4.3 Application of access protection features
The right to get access to a resource can be obtained by exchanging a shared-secret, usually a password or a
secret key. After a successful exchange of the shared secret, the interrogator will gain the "authenticated"
status and be granted access to the requested resource. The "authenticated" status could also be stored in a
flag (for later use in the same session), as long as the tag remains in the field of the interrogator.
A tag might have the capability to support several secret keys, for example if there are separately accessible
areas of memory using appropriately set commands for reading and writing to the tag. In these more
sophisticated tags different access protection features might be applied by the design of the tag and an RFID
operator's option to invoke the feature. The access protection features can also differ.
EXAMPLE An RFID tag has the following features:
— an area of memory used to identify a product, although password protected this has not been set to enable the
code to be read by any interrogator
— an area of memory that control the destination of the item in a supply chain, where read access is permitted, but
write access is protected
— an area of memory containing data used by field service engineers where read access is protected, and write
access only permitted by a service engineer in the factory when the item has to be returned
In the case where a tag has stored several secret keys on the tag, access to a particular resource could also
be linked to a specific key. In that case an interrogator needs to indicate which key needs to be used for
authentication and after a successful authentication the tag needs to store the number that has been used.

8

---------------------- Page: 10 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
Access to a resource on the tag will only be granted when the interrogator has received the "authenticated"
state, through a successful authentication with either a password or cryptographic key.
5 Features to protect Consumer Privacy
5.1 General
This clause identifies features associated with the protection of consumer privacy. The list is presented in an
order-ranking of approximate increasing protection level.
5.2 Unique chip ID or Tag ID
A unique chip ID feature is a factory programmed unique identification number of a tag that enables different
tags to be reliably distinguished. The tag is traceable when the unique chip ID is accessible without protection
and can then be linked to an individual that can then be tracked as well.
For some tags, the unique chip ID is an essential part of the air interface protocol to ensure that
communication is with one tag and not others in the read range.
Access to the unique chip ID feature can be protected and might only be granted when the interrogator has
received the "authenticated" state, through a successful authentication with either a password or
cryptographic key.
5.3 Chip selection with random number
The random number for access is only valid for one communication session between interrogator and tag and
does change for the next session. Therefore it prevents tracking. The feature can be turned off or on. Access
to the feature will only be granted when the interrogator has received the "authenticated" state, through a
successful authentication with either a password or cryptographic key.
Some tags that use a random number for access also have a unique chip ID, which can be protected as
described in 5.2.
5.4 Reduced read range on the tag
The reduced read range feature allows a tag essentially reduce the distance it can communicate with an
interrogator, compared to the distance when the feature is not enabled. An essential reduction could be down
to 25 %. The feature can be turned off or on. Access to the feature will only be granted when the interrogator
has received the "authenticated" state, through a successful authentication with either a password or
cryptographic key.
5.5 Untraceable
The Untraceability feature allows a tag to modify the amount of identifying information it exposes. The tag's
reply could consist of configurable "fixed" and "variable" part. The feature can be turned off or on. Access to
the feature will only be granted when the interrogator has received the "authenticated" state, through a
successful authentication with either a password or cryptographic key.
EXAMPLE In a tag that has no hardware feature of a permanent unique chip ID, there is still the possibility that data
can be traced by the application of some form of serialisation, making the associated item an instance of a product. This is
certainly a requirement in some applications. If the tagged is to remain in the possession of a person and the product
identity needs to remain readable, all or part of the serialised component can be overwritten with a string of zero bits. This
then renders the tag still readable, but reduces the uniqueness. Removing 16 bits makes the tag and the item the same as
65,535 other instances of the same product and less traceable.
5.6 Hide
9

---------------------- Page: 11 ----------------------

SIST-TP CEN/TR 16672:2014
CEN/TR 16672:2014 (E)
The Hide feature allows a tag to be unresponsive until it gets authenticated by an interrogator. The feature can
be turned off or on. Access to the feature will only be granted when the interrogator has received the
"authenticated" state, through a successful authentication with either a password or cryptographic key.
5.7 Kill
The Kill feature allows an interrogator to Kill the tag and render it unreadable, even though it remains attached
to its associated item. The Kill feature can only be used after the interrogator has received the "authenticated"
state, through a successful authentication with either a password or cryptographic key.
After a successful execution of a Kill command the tag will remain permanently silent and can never be
activated or turned on again.
5.8 Destroy
All previous features are associated with the functionality of the chip. The Destroy feature will render a tag
permanently silent by physically destroying the chip or the antenna, which is essential for communication. If
the antenna is cut, on certain types the tag might not function anymore.
5.9 Remove
A tag may be removed from an object. Although the tag remains readable, the associated link with a person or
item is broken.
6 Features to protect Data Security
6.1 Features to protect Read access to the tag data
6.1.1 Protection level
The features in this clause are listed in order of increased protection level.
6.1.2 "Normal" Read access
"Normal" Read access allows data to be read from the tag's memory. In fact memory with "normal" Read
access contains no protection and is considered as the lowest protection level.
6.1.3 Read (Lock) protection
6.1.3.1 General
Read, or Read Lock protection prevents all or part of the memory of a tag can be read by an interrogator.
Read access to all or part of the tags memory will only be granted when the interrogator has received the
"authenticated" state, through a successful authentication with either a password or cryptographic key.
The read lock feature can be temporary or permanent.
6.1.3.2 Temporary read Lock protection
A temporary lock can be lifted when the interrogator has received the "authenticated" state, through a
successful authentication with either a password or cryptographic key.
6.1.3.3 Permanent (or Perma) read Loc
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.