Abstract
Many studies have shown the weaknesses in MIFARE Classic, which is the most commonly used in access control systems, and conducted several attacks successfully. But in the situation of multi-section attacks, it would cost long time to retrieve the key of Crypto-1 cipher which is used in MIFARE Classic. We have designed a new algorithm to retrieve the key of Crypto-1 based on parallel computing using GPU so that we can reduce the time consumption for multi-section attacks. We have implemented and optimized our algorithm using CUDA and OpenCL, and tested them on different platforms contrast with the traditional method using multi-core CPU. Experimental results show that our algorithm is quite efficient on a GPU and get better performance than the traditional method on a 12-core CPU. This should be a better method to retrieve the key of Crypto-1 cipher for multi-section attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Courtois, N.T.: The dark side of security by obscurity. In: International Conference on Security and Cryptography (2009)
de Koning Gans, G., Hoepman, J.-H., Garcia, F.D.: A practical attack on the MIFARE classic. In: International Conference on Smart Card Research and Advanced Applications, pp. 267–282. Springer, Berlin (2008)
Garcia, F.D., Van Rossum, P., Verdult, R., Schreur, R.W.: Wirelessly pickpocketing a Mifare Classic card. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 3–15. IEEE (2009)
Garcia, F.D., de Koning Gans, G., Muijrers, R., Van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: European Symposium on Research in Computer Security, pp. 97–114. Springer, Berlin (2008)
Tan, W.H.: Practical Attacks on the Mifare Classic. Imperial College London, London (2009)
Oswald, D., Paar, C.: Breaking Mifare DESFire MF3ICD40: power analysis and templates in the real world. In: CHES 2011, Nara (2011)
Mitrokotsa, A., Rieback, M.R., Tanenbaum, A.S.: Classifying RFID attacks and defenses. Inf. Syst. Front. 12(5), 491–505 (2010)
Nohl, K: Cryptanalysis of crypto-1. Computer Science Department, University of Virginia, White Paper (2008)
Nohl, K., Evans, D., Starbug, S., Plötz, H.: Reverse-engineering a cryptographic RFID tag. In: USENIX Security Symposium, vol. 28 (2008)
Nohl, K., Plötz, H.: Mifare, little security, despite obscurity. In: Presentation on the 24th Congress of the Chaos Computer Club in Berlin (2007)
Courtois, N., Nohl, K., O’Neil, S.: Algebraic attacks on the Crypto-1 stream cipher in MiFare classic and oyster cards. IACR Cryptology ePrint Archive 2008 (2008)
Dimitrov, H., van Erkelens, K.: Evaluation of the feasible attacks against RFID tags for access control systems (2014)
GitHub - christianpanton/mfkeys: mfkeys is tool to extract keys from Mifare classic cards. https://github.com/christianpanton/mfkeys
Acknowledgement
This work is sponsored by the National Natural Science Foundation of China (61402116).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Gu, W., Huang, Y., Qian, R., Liu, Z., Gu, R. (2018). Attacking Crypto-1 Cipher Based on Parallel Computing Using GPU. In: Abawajy, J., Choo, KK., Islam, R. (eds) International Conference on Applications and Techniques in Cyber Security and Intelligence. ATCI 2017. Advances in Intelligent Systems and Computing, vol 580. Edizioni della Normale, Cham. https://doi.org/10.1007/978-3-319-67071-3_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-67071-3_36
Published:
Publisher Name: Edizioni della Normale, Cham
Print ISBN: 978-3-319-67070-6
Online ISBN: 978-3-319-67071-3
eBook Packages: EngineeringEngineering (R0)