A practical attack on the MIFARE Classic

93Citations
Citations of this article
126Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the architecture of the card and the communication protocol between card and reader. Then it gives a practical, low-cost, attack that recovers secret information from the memory of the card. Due to a weakness in the pseudo-random generator, we are able to recover the keystream generated by the CRYPTO1 stream cipher. We exploit the malleability of the stream cipher to read all memory blocks of the first sector of the card. Moreover, we are able to read any sector of the memory of the card, provided that we know one memory block within this sector. Finally, and perhaps more damaging, the same holds for modifying memory blocks. © IFIP International Federation for Information Processing 2008.

Cite

CITATION STYLE

APA

De Koning Gans, G., Hoepman, J. H., & Garcia, F. D. (2008). A practical attack on the MIFARE Classic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5189 LNCS, pp. 267–282). https://doi.org/10.1007/978-3-540-85893-5_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free