We uncover privacy vulnerabilities in the ICAO 9303 standard implemented by ePassports worldwide. These vulnerabilities, confirmed by ICAO, enable an ePassport holder who recently passed through a checkpoint to be reidentified without opening their ePassport. This paper explains how bisimilarity was used to discover these vulnerabilities, which exploit the BAC protocol $-$ the original ICAO 9303 standard ePassport authentication protocol $-$ and remains valid for the PACE protocol, which improves on the security of BAC in the latest ICAO 9303 standards. In order to tackle such bisimilarity problems, we develop here a chain of methods for the applied $\pi$-calculus including a symbolic under-approximation of bisimilarity, called open bisimilarity, and a modal logic, called classical FM, for describing and certifying attacks. Evidence is provided to argue for a new scheme for specifying such unlinkability problems that more accurately reflects the capabilities of an attacker.
翻译:我们发现全世界电子护照公司执行的民航组织9303标准中的隐私弱点,这些弱点得到民航组织的证实,使最近通过检查站的电子护照持有人能够在不开放电子护照的情况下重新确定身份。本文解释了如何利用BAC协议的双重相似性来发现这些弱点,利用BAC协议的美元,即最初的民航组织9303标准电子护照认证协议的美元,对于PACE协议仍然有效,该议定书在最新的民航组织9303标准中改善了BAC的安全。为了解决这种双重相似性问题,我们在此为应用的$\pion-calculus制定了一套方法,包括一种被称为公开两样性的象征性不协调和一种称为经典调频的模型逻辑,用以描述和证明攻击。提供了证据,以论证为更准确地反映攻击者能力的这种不可关联性问题制定新的计划。