Position Statement in RFID S&P Panel: RFID and the Middleman

  • Ross Anderson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4886)


Existing bank-card payment systems, such as EMV, have two serious vulnerabilities: the user does not have a trustworthy interface, and the protocols are vulnerable in a number of ways to man-in-the-middle attacks. Moving to RFID payments may, on the one hand, let bank customers use their mobile phones to make payments, which will go a fair way towards fixing the interface problem; on the other hand, protocol vulnerabilities may become worse. By 2011 the NFC vendors hope there will be 500,000,000 NFC-enabled mobile phones in the world. If these devices can act as cards or terminals, can be programmed by their users, and can communicate with each other, then they will provide a platform for deploying all manner of protocol attacks. Designing the security protocols to mitigate such attacks may be difficult. First, it will include most of the hot topics of IT policy over the last ten years (from key escrow through DRM to platform trust and accessory control) as subproblems. Second, the incentives may lead the many players to try to dump the liability on each other, leading to overall system security that is equivalent to the weakest link rather than to sum-of-efforts and is thus suboptimal.


Mobile Phone Credit Card Message Authentication Code Bank Customer Payment Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Adida, B., Bond, M., Clulow, J., Lin, A., Murdoch, S., Anderson, R.J., Rivest, R.:“Phish and Chips”. In: Security Protocols Workshop (March 2006),
  2. 2.
    Anderson, R.J.: “Why Cryptosystems Fail”. Communications of the ACM 37(11), 32–40 (1994)CrossRefGoogle Scholar
  3. 3.
    Anderson, R.J.: Security Engineering – A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)Google Scholar
  4. 4.
    Anderson, R.J.: Why Information Security is Hard – An Economic Perspective. In: Proceedings of the Seventeenth Computer Security Applications Conference, pp. 358–365. IEEE Computer Society Press, Los Alamitos (2001), CrossRefGoogle Scholar
  5. 5.
    Anderson, R.J., Bond, M.: The Man-in-the-Middle Defence. In: Security Protocols Workshop (March 2006),
  6. 6.
    Baard, M.: Will new RFID technology help or hinder security? (April 27, 2005),,289142,sid14_gci1083417,00.html
  7. 7.
    Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O’Hare, T.: Vulnerabilities in First-Generation RFID-enabled Credit Cards. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 2–14. Springer, Heidelberg (2007)Google Scholar
  8. 8.
    Jayawardhana, W.: Tamil Tigers suspected of scamming millions in Britain,
  9. 9.
    Murdoch, S.J.: Chip & PIN relay attacks (February 6, 2007),
  10. 10.
    Near Field Communication and the NFC Forum: The Keys to Truly Interoperable Communications (2006),
  11. 11.
    Clonavano carte con il bluetooth Scoperta nuova truffa telematica. In: la Repubblica (September 4, 2006),
  12. 12.
    Shoesmith, K.: Garage Scam funded Terror Group, Hull Daily Mail, p. 1, (January 16, 2007),
  13. 13.

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ross Anderson
    • 1
  1. 1.Cambridge UniversityUK

Personalised recommendations