Legic Prime Obscurity in Depth. Henryk Plötz Karsten Nohl
|
|
|
- Sheena Nichols
- 10 years ago
- Views:
Transcription
1 Legic Prime Obscurity in Depth Henryk Plötz Karsten Nohl
2 RFID access control does not widely use appropriate encryption Access control market in Europe (Illustrative) : No encryption Weak encryption Strong encryption Mifare Plus, DESfire, SmartMX HID iclass Legic Advant Mifare Classic & Hitag HID Pro Legic Prime focus of this talk
3
4 Contents Basics Legic Primer Master Token System Control Attack Mitigation 4
5 Legic s RFID access and payment cards have an aura of mistery Contactless smart cards at 13.56MHz Legic Prime Proprietary, marketed since 1992 Legic Advant ISO compliant, marketed since 2004 Predominantly used in access control, but payment applications eist (i.e., cafeteria) Can hold several applications, with easier management compared to Mifare Classic Main difference to other systems: Master Token System Control Legic takes obscurity to the etreme Shrouded in a cloud of closed-ness and eclusivity Compared to Mifare Much harder to get cards and readers No documentation available beyond layer 1/2
6 Legic Prime is outdated but popular Old card type, as old as Mifare Classic (and at least as insecure) Proprietary radio protocol (applied to become ISO Appendi F) LEGIC RF Proprietary Legic Encryption Slow data rate (~10 kbit/s), comparatively high read range (supposedly up to 70 cm) Card types MIM22 (outdated) MIM256 (234 bytes storage) MIM1024 (1002 bytes storage)
7 Legic Advant uses modern encryption New card type, developed in the 2000's Based on ISO 14443A or ISO DES or AES, also backward compatible to Legic Encryption Several ATC card types with varying sizes (15693: bytes, 14443: bytes) Not yet analyzed by us, therefore not covered in this talk
8 Contents Basics Legic Primer Master Token System Control Attack Mitigation
9 Master Token System Control enables hierachichal access rights management The powerful LEGIC Master-Token System Control (MTSC) (...) is unique in the security industry. With MTSC no sensitive passwords are needed. Instead, a special physical Master-Token (...) is used containing a unique genetic code which securely links cards and readers Legic web site Hierarchical structure with Legic or a license partner at its root; system integrators, customers and customer subdivisions at the nodes Node identifer is called the stamp (or genetic code ) Each master token is associated with one stamp Source: security.html
10 MTSC structures tokens in tree A token can only create objects with higher nesting level than its own longer stamp, but same prefi 5B Legic / Legic license partner 5B 01 5B AD Systems integrator 5B AD 01 ACME Ltd. 5B AD C0 Eample Corp. Customer 5B AD C0 01 Bonn site 5B AD C0 DE Berlin site Customer divisions / sites / etc.
11 Multiple applications can be stored in separate segments General access control, corporate Access to high security area, Berlin site Micro-payment in cafeteria, eternal contractor Eample employee card Cards are segmented and read / write access is regulated on a per-segment basis Segment access is bestowed through physical token instead of keys or passwords The MSTC token itself is a Legic Prime or Advant card
12 Segments pretend to be protected Segments on cards are imprinted with a stamp on creation Stamp comes from the token that authorized the creation Stamp can not be changed Optionally, segments can be read protected Readers are loaded with access rights for none / one / multiple stamps Card-Reader interaction Read read-protected segment and write Only if reader has access rights for that segment's stamp Read non-read-protected segments All readers can do this
13 Three types of tokens with special privileges eist General Authorization Media (GAM) Identification Authorization Media (IAM) System Authorization Media (SAM) Token-creating token that carries the temporary authorization to create sub-tokens Segment-creating token that carries the temporary authorization to create segments on cards Reader-creating token that bestows the permanent authorization to write to eisting segments on cards (and read read-protected segments) For the SAM (a.k.a. SAM63, a.k.a Taufkarte ), which,launches readers (,taufen ), there is a counterpart SAM64 (a.k.a,enttaufkarte ) to de-launch readers ( enttaufen )
14 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
15 Legic Prime can be analyzed and attacked with standard tools 3: Sniff 5: Emulate 1: Sniff Card Radio channel 4: Emulate Reader USB connection 4: Partially emulate Attacks were implemented using the Promark3
16 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
17 LEGIC RF Layer 1 is publicly documented ISO Anne F gives general parameters: RWD to TAG Pulse-pause modulation, 100% AM, off-duration: 20μs, 0 -bit: on-duration 40μs,,1 -bit: on-duration 80μs, data rate 10 khz 16.6 khz (data-dependent) TAG to RWD On-off-keying, load-modulation, subcarrier f c / 64 (~212kHz), bit-duration: 100μs Framing defined by the synchronization of the communication No frame start / stop information for tag originated frames
18 LEGIC RF can be sniffed with standard RFID tools Sniffing with OpenPICC2 (fied threshold, not so good) or Promark3 (hysteresis, much better) and oscilloscope or logic analyzer
19 Oscilloscope view
20 Protocol phases can be visualized with cheap logic analyzer Logic analyzer data Get UID type command, cycles through LEGIC RF, then ISO A, then ISO Get UID transaction consists of multiple echanges by card and reader
21 Legic Layer 2 decoder had to be written Custom decoder in C Delay between RWD command and TAG response seems to be constant, appro 330µs As epected TAG-originated frames are not delimited, length unclear From reader From card 7 6 9/11 9/ Comparing many traces yields the protocol structure Setup, once per session 7 bits from RWD 6 bits from TAG 6 bits from RWD Repeat several times, once for each byte requested 9 bits from RWD (Depending on card type: 11 bits for MIM1024) 12 bits from TAG
22 Data stream appears to be encrypted Let the echange be the setup phase and the remainder of the session be the main phase First 7-bit-command from RWD is more or less random, but always has first bit set, name it RAND. Assumption: IV of a stream cipher RNG is weak: a) Too small; b) 055 in ~10% percent of cases (vs. epected 1.5%) For a given RAND the rest of the setup phase is identical over all cards of the same type (MIM256 and MIM1024 differ by one bit) Within a card type, for a fied RAND, all reader command sequences are identical Looks like a stream cipher with weak IV from reader and no random from the card
23 First command in transaction queries card UID UID 3e e UID 3e 58 b8 79 Src Len Bits Src Len Bits R T R R T R R T R T R T R T R T R T R T R T R T R T Note: These eamples are synthetic and do not use the actual generator taps or CRC polynoms
24 First command in transaction queries card UID UID 3e e UID 3e 58 b8 79 : 00 4f fc 47 Src Len He Src Len He R T R R T R R T B11 R T B11 B11 B11 = 000 R T F R T F78 63F F78 = 947 R T A DF3 R T A 50F DF3 50F = 8FC R T D R T F42 10D F42 = E4F R T EF 866 R T EF 54C Note: These eamples are synthetic and do not use the actual generator taps or CRC polynoms
25 Transaction is armored by two CRC check sums Each reader-card request-response pair only transmits one byte of payload The UID is transmitted in order first byte, fourth / last byte, third byte, second byte (Compared to the display in the GUI) Each response is protected by a 4 bit CRC A fifth byte is transmitted after the UID, this is an 8 bit CRC over the UID, stored on the card itself
26 All commands are read commands Hypothesis Command is 1 bit command code, 8 bit (or 10 bit) address, response is 8 bit data and 4 bit CRC Get UID isn't really requesting the UID, but simply reading the first 5 bytes of memory Hypothesis confirmed Lowest bit (first bit transmitted) of command is command code, must not be changed; remaining 8 bits are address First command of Get UID sequence is really Read Byte 0 Cmd Arg C Original ( Read Byte 0 ) C _ New Read Byte 1 C _ New Read Byte 2 C New Read Byte 3 etc. pp. Timing is important. Also: Only one command per setup phase 4s to read a full MIM256 card
27 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
28 CRC provides no protection CRC in stream cipher is well known to be malleable (WEP, Mifare Classic,...) With unknown CRC function, a simple approach is to brute-force the difference values for all 1-bit changes. The Differences are fully additive Data Use as follows CRC Original (valid) 1 st Difference (valid) 2 nd Difference (valid) 3 rd Difference (valid) Modified data (valid CRC) After being able to freely anticipate the transport CRC, the UID-CRC can be attacked in a similar manner Yields two tables: A) Transport CRC: 8 entries of 4 bits; B) UID CRC: 32 entries of 8 bits Gather known UID transactions for as many RANDs as possible (we managed 59 out of theoretically 64), modify responses for requested UID Note: These eamples are synthetic and do not use the actual CRC polynomial
29 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
30 Legic Prime tag was reverse-engineered completely from its silicon implementation
31 Obfuscation function quickly found from reversed circuit The LEGIC obfuscation function consists of two LFSRs Easily invertible, but not even needed for a state this small LFSR A: 7 bit LFSR B: 8 bit MUX 8 to 1 Output
32 Playing with timing discloses further protocol details Until now Replay of recorded sessions with eact timing Set up phase Main phase Fied delay Variable delay From reader From card 7 bit 6 bit 9 bit 9 bit Rand cmd 1 cmd 2 Response 1 Response 2 Time 6 bit 12 bit 12 bit Eperiment Vary the timing before the first command Result Interpretation Conclusion Card response for some delays, no card response for others Result of the de-obfuscation changed, which changes the command bit The obfuscation stream generator is continuously running (at period time ~100µs)
33 Obfuscation stream can be determined eperimentally Vary first bit of command at each time off set gives first bit of obfuscation stream at that time offset Card responds when first bit 1 Card responds when first bit 0 Card doesn't respond at all Time after end of setup phase (ms) Interpretation The obfuscation stream generator generates a new bit appro. every 100µs (more like 99.1µs, might be reader-specific) Complete break, even without a microscope Generate arbitrary amounts of obfuscation stream by leveraging a few bits of known plaintet (optimized attack: 14 hours preparation, 4 kilobytes storage; naive attack: 4 days preparation, 80 kilobytes storage) Note: These eamples are synthetic and do not use the actual obfuscation stream
34 Knowledge of functions and protocol enables compatible Legic reader Knowledge of the eperimentally determined obfuscation stream allows to find the initialization for the function (brute force) Initialization 1 st step Load R a = RAND and R b = (RAND << 1) 1 2 nd step That s it, there s no 2 nd step No key input not technically an encryption Can now generate obfuscation stream at any point in time Can send as many read commands in one single session as necessary 0.69s for a full dump of a MIM256
35 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
36 Full emulation requires deeper understanding of CRC Both the slow and the fast reader ignore the transport CRC, but for a full card emulator we need to generate the CRC Look at the sniffed communication (de-obfuscated) Src Len Binary He Interpretation (setup phase omitted) RWD Read byte 0 TAG F3E Answer: 3e, CRC f RWD Read byte 1 TAG E Answer: 3e, CRC 6 RWD Read byte 2 TAG Answer: 44, CRC 0 RWD Read byte 3 TAG Answer: 17, CRC 4 RWD Read byte 4 TAG E48 Answer: 48, CRC e Note: These eamples are synthetic and do not use the actual CRC polynom
37 CRCs can be reversed with generic approach A CRC is determined by four parameters Register width, polynom, initial value, final XOR Storage CRC is 8 bits, transport CRC is 4 bits Easy to brute-force over the full parameter space If all the known inputs are of the same length, initial value and final XOR are equivalent Fiing one to an arbitrary value gives a solution for the other Better than brute force Analysis of the 1-bit differences allows direct determination of the CRC parameters
38 Knowledge of transport CRC enables card emulation Differently sized commands (9 bit for MIM256, 11 bit for MIM1024) allows to disambiguate initial value and final XOR Result Transport CRC is made over the full command and the full payload of the response From reader From card 1 Address Data CRC 8/10 bits 8 bits 4 bits
39 and provides write access to cards Write commands are 21 bit for MIM256 and 23 bit for MIM1024 Contains command code ( 0 ), 8/10 bit address, 8 bit data, 4 bit CRC Same CRC as for read commands, calculated over the full 17/19 bits 0 Address Data CRC Card acknowledges with a single 1 -bit, after 3.6 ms Obfuscation stream is unaffected by ACK
40 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
41 Master tokens are not read protected Analysis of a load IAM or launch reader process reveals UID is read, UID-CRC is read Bytes 6 and 5 are read (in that order) Byte 7 (7+stamp length) are read Byte 21 is read Launch process takes a long time, ~15s, providing the illusion that something profound is happening (key-derivation? lengthy EEPROM reprogramming?) On the radio channel, byte 4 (UID-CRC) is read every 1s, to ping whether the card is still there Combining the address / data information from a sniff, the following structure of an IAM is revealed Address Data 0 3e 3e f f b ad c0 de 16 0e Note: These eamples are synthetic and do not use the actual CRC polynom. Also, the stamp is fake. Obviously.
42 Tokens can be fully copied and emulated Naive transfer to physical card not successful Bytes 5 and 6 behave strange when writing can only be decremented Complete emulation is successful Playing with the emulated card reveals Byte 21 is a CRC, secures UID and stamp Ehaustive search over the CRC byte enables emulation of an IAM for different stamps
43 Knowledge of content CRC enables easier token creation and emulation Analysis of CRC bit differences reveals Same CRC polynom as for the UID Further analyses find a common set of parameters for the UID CRC and the master token CRC Disambiguates initial value / final XOR Master token CRC is calculated over UID, bytes 0 thru 3 Bytes 6 and 5 Byte 7 Stamp, bytes 8 thru (8+(stamp length)-1) Can now emulate IAM and SAM for arbitrary stamps of length 4
44 S(tamp s)ize matters Now that we can generate the master token CRC, let's play with the different bytes Byte 5 seems to control the token type Byte 6 seems to control the stamp length, in coordination with byte 7 Byte 7 is 004 for the IAM and 044 for the SAM (both of stamp length 4) Wrong values for byte 6 tend to freak out the software Differing error messages, eceptions, crashes or the mute pretense that the card is empty Lucky accident Set byte 7 to 000, byte 6 to 0fc and we got ourselves an IAM of stamp length 0
45 Contents of system master tokens is deterministic Byte 7 is RD / WRP / WRC Low nibble controls the stamp size High nibble controls the stamp size for the launch process Byte 5 is token type MSBit controls whether the token can create sub-tokens (OLE), remaining 7 bits are f IAM f SAM f GAM Byte 6 is the organisational level? Must be 0fc (Stamp length)
46 Etent of pwnage Can create IAMs and SAMs for arbitrary stamps of arbitrary lengths (including 0!) If the SAM should launch readers, its stamp length must be at least 1 Uber-IAM allows full read and creation access to arbitrary stamps Can create GAMs for arbitrary stamps of length 2 or higher The software seems to specifically lock out shorter GAMs, pretends the card is empty
47 Contents Basics Attack Attack overview Analyzing LEGIC RF The case of the CRC The obfuscation function Understanding the Legic Prime protocol Mastering MTSC Comprehending card contents Mitigation
48 Card data needs to be interpreted in light of the application Reverse engineering card contents not necessary for the standardized types (e.g., cash, access, biometric) Simply use the regular software together with the Uber-IAM Otherwise, if available, use csg files (Legic segment definition) to aid in interpretation Data on the card is further obfuscated All payload bytes are XORed with some value. That value is the CRC of the UID (which is also stored on the card) Obscurity In Depth
49 Cards are divided in header and application data 4 bytes UID + 1 byte CRC 2 bytes decremental field (DCF), is 060 0ea for all cards that aren't master token 6 bytes unknown / unused / fied, might be a version identification, possibly related to old unsegmented cards 6 bytes segment header backup area + 1 byte CRC 2 bytes unknown / unused Remainder Obfuscated payload
50 Each application has its own segment 1st byte Lower byte of segment length (including header) 2nd byte, lower nibble High nibble of segment length Segment header is 4 bytes + 1 byte CRC 2nd byte, high nibble Flags: 08 == last segment flag, 04 == segment valid flag (if flag is not set, the segment is deleted) 3rd byte WRP, length of write protected area of the segment. Always includes the stamp length 4th byte, bits 4 thru 6 WRC 4th byte, MSBit RD, read protection Segment header write procedure Save old segment header to backup area First byte of backup area: = 080 (,dirty`) segment number Write new segment header Clear dirty flag in backup area
51 Contents Basics Attack Mitigation Conclusions
52 Legic Prime design is fundamentally flawed No keys, (no key management, no card authentication, no reader authentication) Spoofing, skimming Segments can be created out of thin air Master token can be created out of thin air No authorisation necessary for master token use, master token not inherently necessary for segment creation Master token clonable
53 Legic Prime s weaknesses can be softened through software checks and cryptography Protection 1 Check UID Effect Fraudster must use epensive emulation device Effort Minimal software modifications Encrypt data Sign data Sign counter Reverse-engineering data format becomes difficult Only previously valid states can be cloned Card value cannot be restored Additional layer in software stack; new keys; potentially faster reader hardware 5 Fingerprint cards (timing, emulation bit, etc.) Most emulators will be detected Requires programmable RFID part in reader These Mifare / Legic-specific measures are supplemental to generic protections; in particular Key diversification Anomaly detection in (semi-)online systems
54 mitigated through better cryptographic designs in the mid-term Attack Mitigation Attacks and Mitigations Attack cost $ 1 Replay Encryption < 1,000 2 Cryptanalysis Use standard encryption function < 1,000 3 Replay Use strong random numbers < 1,000 4 Etract master key from card Use diversified keys 1,000 50,000
55 and solved in the long-term by using a new generation of access cards Attack Mitigation 5 Attacks and Mitigations Etract master key from reader (i.e., side-channel analysis, fault injection) Use smart card in reader Attack cost $ 5, ,000 6 Etract master key through chip hacking Increase cost of hack On-chip encryption, meshes Small feature size Reader SAM 20, ,000 Modern RFID cards that combine standard cryptography with secure key storage (SAM modules) can be considered secure in ecess of EUR 100,000 per card. At this security level, attacks on the system backend might very well be the system s weakest link
56 Promark3 allows pen-testing RFID systems We released in December: Legic Prime Reader Test whether an access cards is Legic Prime (or HID, Mifare Classic) and hence vulnerable Test whether private data is stored on the card (including in readprotected segments) We do not release: Legic Emulator & Full Protocol Reverse-engineering these components is not hard Therefore Upgrade ASAP Have since been reverse-engineered Legic Prime writer has appeared in the Promark 3 repository
57 Conclusions Even multi-level obfuscation does not prevent reverse-engineering Access cards at the very least need inherent protection in form of good crypto and secret keys Legic Prime analyzed head to toe No actual, inherent security found Advertised range ~70 cm and card completely unprotected against skimming more significant break than with Mifare Classic Once again Security by obscurity does not work
58 Questions??! Henryk Plötz Karsten Nohl
59 Backup
60 Please upgrade, just not to HID! Several RFID cards have been publicly broken over the past years Mifare Classic, NXP Hitag2, Legic Prime Meanwhile, HID Pro The card with the least security Still has a reputation of being secure Let us recap HID Pro cards can be read and emulated with a $20 device Reading distance is at least 20cm No crypto, no obfuscation, no protection; but: good lawyers
61 Token Sub-Types For the SAM (a.k.a. SAM63, a.k.a Taufkarte ), which,launches readers (,taufen ), there is a counterpart SAM64 (a.k.a,enttaufkarte ) to de-launch readers ( enttaufen ) Other types (possibly restricted to advent) XAM Permanent permission to create segments (e.g. a launching version of IAM) IAM+ Restricted version of IAM, which only allows to create a given number of segments There are references to SAM4,Parametrierkarte, which changes reader parameters. Also some systems may use other,sam... types for sneakernet purposes
Peeling Away Layers of an RFID Security System
Peeling Away Layers of an RFID Security System Henryk Plötz 1 and Karsten Nohl 2 1 Humboldt-Universität zu Berlin 2 Security Research Labs, Berlin Abstract. The Legic Prime system uses proprietary RFIDs
Karsten Nohl University of Virginia. Henryk Plötz HU Berlin
Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already
Hacking Mifare Classic Cards. Márcio Almeida ([email protected])
Hacking Mifare Classic Cards Márcio Almeida ([email protected]) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
advant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
Establishing Security Best Practices in Access Control
Establishing Security Best Practices in Access Control Publication version, v.1.0 Current version available at: www.srlabs.de/pub/acs Andreas Rohr [email protected] Karsten Nohl [email protected] Henryk
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
All You Can Eat. Breaking a Real-World Contactless Payment System
All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {Timo.Kasper,
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Secure Automatic Ticketing System
Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA [email protected]
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Chip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
MF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy
Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in
Analysis of the MIFARE Classic used in the OV-Chipkaart project
Analysis of the MIFARE Classic used in the OV-Chipkaart project Gerhard de Koning Gans Radboud University Nijmegen Supervisors Thesis 584 Jaap-Henk Hoepman Gerhard de Koning Gans Flavio D. Garcia Version
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
Beveiliging van de OV-Chipkaart
Beveiliging van de OV-Chipkaart Antenna RFID Chip Mifare Ultralight (throw away card) Mifare Clasic (subscription card) RFID Technology Reader Modified Miller Encoding Machester Encoding Tag RFID Applications
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
A common weakness in RSA signatures: extracting public keys from communications and embedded devices
A common weakness in RSA signatures: extracting public keys from communications and embedded devices Hackito Ergo Sum 24-26 April 2014 Renaud Lifchitz renaud.lifchitz @ oppida.fr Speaker s bio French computer
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
SALTO Systems I SALTO Carriers. innovation in ID technology. MIFARE DESFire
MIFAR SALTO Systems I SALTO Carriers innov innovation in ID technology MIFARE DESFire SALTO Carriers SALTO offers wide range of carriers(fobs, bracalets, contact less bracelets, contacless fobs, contact
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
USING MIFARE CLASSIC TAGS VERSION 100212
USING MIFARE CLASSIC TAGS VERSION 100212 U s i n g M I F A R E C l a s s i c T a g s P a g e 2 TABLE OF CONTENTS 1 Overview... 4 1.1 Required Reading... 4 1.2 Document Scope... 4 1.3 MIFARE Features...
INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors
INTEGRATED CIRCUITS I CODE SLI Smart Label IC SL2 ICS20 Product Specification Revision 3.1 February July 2005 2001 Public Philips Semiconductors CONTENTS 1 FEATURES...4 1.1 I CODE SLI RF Interface (ISO/IEC
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Aperio Online. Aperio. Online Programming Application Manual. Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013
Aperio TM Online Programming Application Manual Document No: ST-001321-A, Issue date: 8 July 2013 1 Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013 Table of Contents
SAS Data Set Encryption Options
Technical Paper SAS Data Set Encryption Options SAS product interaction with encrypted data storage Table of Contents Introduction: What Is Encryption?... 1 Test Configuration... 1 Data... 1 Code... 2
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model
AUTOMATYKA 2010 Tom 14 Zeszyt 1 Marcin Ko³odziejczyk* Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model 1. Introduction The purpose of this article is to describe some security levels
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
EMV (Chip-and-PIN) Protocol
EMV (Chip-and-PIN) Protocol Märt Bakhoff December 15, 2014 Abstract The objective of this report is to observe and describe a real world online transaction made between a debit card issued by an Estonian
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Mifare DESFire Specification
Mifare DESFire Specification Version 1.0 29 th September 2009 Revision History Version Date Author Description of Changes 1.0 29/09/09 O McLaughlin Ratified by LASSeO 0.2 28/07/09 O McLaughlin Minor changes
Security Analysis of Contactless Payment Systems in Practice
Security Analysis of Contactless Payment Systems in Practice Michael Silbermann November 2, 2009 Diplomarbeit Ruhr-Universität Bochum Lehrstuhl für Embedded Security Prof. Dr.-Ing. Christof Paar Supervisor:
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
E-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
AN 073120. mifare Ultralight Features and Hints. Document information. Multiple ticketing, secured data storage, implementation hints
AN 073120 Rev. 2.0 18 December 2006 Application note Document information Info Keywords Abstract Content Multiple ticketing, secured data storage, implementation hints This document presents features and
Non-Obvious Bugs by Example
Gregor Kopf CONFidence 2011 What and why? Non-obvious (crypto) bugs As an example: two well-known CMS Easy to make, hard to spot Interesting to exploit Fun ;) How? The process from discovery to exploitation
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Defending mobile phones. Karsten Nohl, [email protected] Luca Melette, [email protected]
Defending mobile phones Karsten Nohl, [email protected] Luca Melette, [email protected] GSM networks provide the base for various attacks SS7 Phone Base station GSM backend network User database (HLR) Vulnerability
Cloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
Reverse engineering hardware for software reversers: studying an encrypted external HDD
Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT 2015-10-02 / Hardwear.io 2015-10-02 / Hardwear.io 2 Introduction Why
Data Protection on Progress Databases and Progress 4GL Environment
Proceedings of the 8 th International Conference on Applied Informatics Eger, Hungary, January 27 30, 2010. Vol. 1. pp. 345 352. Data Protection on Progress Databases and Progress 4GL Environment Attila
Keeping SCADA Networks Open and Secure DNP3 Security
Keeping SCADA Networks Open and Secure DNP3 Security June 2008 DNP3 Protocol DNP3 protocol has become widely accepted within water and electrical utilities worldwide for SCADA communications with field
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A
www.acs.com.hk 1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A 2 3 ACOS5 Series (32KB EEPROM) Cryptographic Smart Card and Token Module
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Authentication and Security in Mobile Phones
Authentication and Security in Mobile Phones Greg Rose QUALCOMM Australia [email protected] ABSTRACT Mobile telephone systems have a checkered reputation regarding security and authentication features after
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
NFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
ATTPS Publication: Trustworthy ICT Taxonomy
Publication: worthy ICT Taxonomy Roger Berkley worthy ICT Taxonomy Research Cybersecurity technology is a considerably large subdomain of ICT. Technology experts like Gartner have identified at least 94
WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 5, May 2015, 23-30 Impact Journals WI-FI SECURITY: A LITERATURE
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Bluetooth Packet Sniffing Using Project Ubertooth. Dominic Spill [email protected]
Bluetooth Packet Sniffing Using Project Ubertooth Dominic Spill [email protected] Dominic Spill Bluesniff: Eve meets Alice and Bluetooth Usenix WOOT 07 Building a Bluetooth monitor Shmoo/Defcon/Toorcamp
