We uncover privacy vulnerabilities in the ICAO 9303 standard implemented by ePassports worldwide. These vulnerabilities, confirmed by ICAO, enable an ePassport holder who recently passed through a checkpoint to be reidentified without opening their ePassport. This paper explains how bisimilarity was used to discover these vulnerabilities, which exploit the BAC protocol - the original ICAO 9303 standard ePassport authentication protocol - and remains valid for the PACE protocol, which improves on the security of BAC in the latest ICAO 9303 standards. In order to tackle such bisimilarity problems, we develop here a chain of methods for the applied $\pi$-calculus including a symbolic under-approximation of bisimilarity, called open bisimilarity, and a modal logic, called classical FM, for describing and certifying attacks. Evidence is provided to argue for a new scheme for specifying such unlinkability problems that more accurately reflects the capabilities of an attacker.
翻译:我们发现全世界电子护照公司执行的民航组织9303标准中的隐私弱点。这些弱点得到民航组织的证实,使最近通过检查站的电子护照持有人能够在不开放电子护照的情况下重新确定身份。本文解释了如何利用两个相似性来发现这些弱点,利用BAC议定书——最初的民航组织9303标准电子护照认证议定书——和对计算机设备公司议定书仍然有效,该议定书在最新的民航组织9303标准中改善了BAC的安全。为了解决这种两样性问题,我们在此为应用的$pi$-calcululs制定了一套方法,包括两样性象征性的不协调,称为公开的两样性,以及称为经典调频的典型逻辑,用来描述和证明攻击。提供了证据,以论证为更准确地反映攻击者能力的这种不相联性问题制定新的计划。