Abstract
The mifare Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the architecture of the card and the communication protocol between card and reader. Then it gives a practical, low-cost, attack that recovers secret information from the memory of the card. Due to a weakness in the pseudo-random generator, we are able to recover the keystream generated by the CRYPTO1 stream cipher. We exploit the malleability of the stream cipher to read all memory blocks of the first sector of the card. Moreover, we are able to read any sector of the memory of the card, provided that we know one memory block within this sector. Finally, and perhaps more damaging, the same holds for modifying memory blocks.
Keywords
- Field Programmable Gate Array
- Data Block
- Authentication Protocol
- Stream Cipher
- Access Condition
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download conference paper PDF
References
Finkenzeller, K.: RFID Handbook, 2nd edn. John Wiley and Sons, Chichester (2003)
Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W.: Dismantling MIFARE Classic (forthcoming)
Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152–167. Springer, Heidelberg (2006)
ISO/IEC 14443. Identification cards - Contactless integrated circuit(s) cards - Proximity cards (2001)
Nohl, S.K., Evans, D., Plötz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: USENIX Security Symposium, San Jose, CA, 31 July (2008)
Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires, IX, pp. 5–38, January 1983, and pp. 161–191, February 1983(1983)
Nohl, K., Plötz, H.: MIFARE, Little Security, Despite Obscurity. In: Presentation on the 24th Congress of the Chaos Computer Club in Berlin (December 2007)
NXP Semiconductors. MIFARE Standard 4KByte Card IC functional specification (February 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
de Koning Gans, G., Hoepman, JH., Garcia, F.D. (2008). A Practical Attack on the MIFARE Classic. In: Grimaud, G., Standaert, FX. (eds) Smart Card Research and Advanced Applications. CARDIS 2008. Lecture Notes in Computer Science, vol 5189. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85893-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-540-85893-5_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85892-8
Online ISBN: 978-3-540-85893-5
eBook Packages: Computer ScienceComputer Science (R0)