Authentication
Mutual Authentication
DES
Procedure
sequenceDiagram
Note over R/W,PICC: Authentication1
R/W->>PICC: [Area code list, Service code list, Reader challenge];
PICC->>R/W: [Response to reader challenge, Card challenge];
Note over R/W,PICC: Authentication2
R/W->>PICC: [Response to card challenge];
PICC->>R/W: [IDtc, IDi, PMi];
Group Service Key & User Service Key
TODO: actually confirm definition of Group Service Key and User Service Key
Mentioned in Security Target documents1 and referred to as the "Area Intermediate Key" and "Service Intermediate Key" respectively in patent filings2. This keypair is used as access keys and as intermediates in diversified key generation when authenticating to a FeliCa IC.
A keypair is used in conjunction with a fixed set of area codes (group service) and service codes (user service) respectively.
A GSK is composed of the System Key, the Area 0000 key, and all the keys of the specified subareas, and relates to a corresponding Area Code List. As generating a GSK requires the PICC's System Key as an initialisation vector, this means the issuer is the root of trust. The GSK is generated by continually encrypting with DES using each specified area's key as the encryption key.
GSKs can be appended to, which is useful if an area owner wants to provide authenticated capabilities to the owners of a sub area. However, the appended area(s) must be a direct subarea of one of the prior areas. Suppose the owner of subareas 1100 and 2100 wishes to generate their own GSK and they receive a GSK from the owner of Area 1000, which already corresponds to the System, Area 0000, and Area 1000. The owner can only append the key for Area 1100, as appending Area 2100 would be invalid(?).
Upon the creation of a GSK, the USK can be created. The USK is composed of the GSK, and all the keys of the specified services, and relates to a corresponding Service Code List. As the USK uses the GSK as an initialisation vector, its GSK is then immutable and cannot be appended to without creating a new related USK. The USK is generated by continually encrypting with DES using each corresponding service's key as the encryption key.
Similar to GSKs, USKs can be appended to, which is useful if the owner of a service wants to provide authenticated capabilities on their service to other users. However, the appended service(s) must be belong to one of the areas specified in its corresponding GSK.
These keys are a precursor to the 3DES keys used in mutual authentication2:
Following mutual authentication, the reader-generated Ra is the initial transaction ID, whereas the card-generated Rb is the shared DES transaction key34.
AES
Group Key
Of unknown structure; mentioned in several public Security Target documents, and one with DES out-of-scope does not reference a manual for generating GSKs or USKs5, meaning that this pertains to only the AES authentication.
It is unknown if and how access control is implemented across managers/issuers, and whether it is constructed similar to GSKs and USKs.
A Group Key may be a merger of both GSK and USK, into one key and corresponding list of areas and services.
PIN code6
Deprecated?
Mentioned in patents but not public documentation. A separate service (not an overlay service) that doesn't handle data, but reads in PIN access attempts such that the user can write input attempts to the PIN code service(?) and then be authenticated to the corresponding service/area.
A PIN service code is the corresponding area/service code (not number(?)) with the 5th bit (0x20) set.
-
Sony Corporation. Security Target RC-SA00/1 Series and RC-SA00/2 Series. Technical Report A00-STP-E01-40, Nederlands Schema voor Certificatie op het gebied van IT-Beveiliging, July 2012. URL: https://commoncriteriaportal.org/files/epfiles/[ST]%20A00-STP-E01-40.pdf (visited on 2024-06-22). ↩
-
進 日下部, 昌幸 高田, and 将央 佐々木. データ記憶装置およびデータ記憶方法. February 2008. URL: https://patents.google.com/patent/JP4051510B2/ja (visited on 2024-06-23). ↩↩
-
Masahiro Sueyoshi and 正弘 末吉. マルチプロセッサ・システム及びマルチプロセッサ・システムにおけるデータ通信制御方法. August 2002. URL: https://patents.google.com/patent/JP2002215480A/ja (visited on 2024-07-03). ↩
-
佳久 高山 and 進 日下部. 通信システム、通信装置および通信方法、並びにプログラム. May 2008. URL: https://patents.google.com/patent/JP4092692B2/ja (visited on 2024-07-03). ↩
-
Sony Corporation. Security Target RC-SA20, RC-SA21 and RC-SA24 Series. Technical Report SA2-STP-E01-02, Nederlands Schema voor Certificatie op het gebied van IT-Beveiliging, June 2020. URL: https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/06/nscib-cc-214607-st.pdf (visited on 2024-06-22). ↩
-
俊治 竹村, 直 森田, 文夫 久保野, 太郎 栗田, and 琢也 市川. 通信装置及び通信装置のメモリ管理方法. May 2011. URL: https://patents.google.com/patent/JP4682498B2/en/ (visited on 2024-07-13). ↩