Gemalto Mifare 1K Datasheet



Similar documents
MF1 IC S General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy

Chip Card & Security ICs Mifare NRG SLE 66R35

Security & Chip Card ICs SLE 44R35S / Mifare

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev October Document information

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev October Document information

Secure Automatic Ticketing System

Using RFID Techniques for a Universal Identification Device

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Self-Check-In Hotels Using RFID. Technology

RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY

MF0ICU2. 1. General description. MIFARE Ultralight C. 1.1 Contactless energy and data transfer. 1.2 Anticollision. Rev May

USING MIFARE CLASSIC TAGS VERSION

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

MF3ICD81, MF3ICD41, MF3ICD21

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

School Management System

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

NFC Tag Type 5 Specification

Measurement and Analysis Introduction of ISO7816 (Smart Card)

AN MIFARE DESFire as Type 4 Tag. Rev May Application note COMPANY PUBLIC. Document information.

Security in Near Field Communication (NFC)

Smart Card Application Standard Draft

advant advanced contactless smart card system

SL2 ICS53/SL2 ICS General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

NFC. Technical Overview. Release r05

Hacking Mifare Classic Cards. Márcio Almeida

Exercise 1: Set up the Environment

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

ACR120 Technical Specifications version 2.9 November 2005

CHAPTER 5 SMART CARD TECHNOLOGY

NACCU Migrating to Contactless:

RFID Penetration Tests when the truth is stranger than fiction

Mobile and Contactless Payment Security

Secure recharge of disposable RFID tickets

MF3ICDx21_41_ General description. MIFARE DESFire EV1 contactless multi-application IC. Product short data sheet COMPANY PUBLIC

A Secure and Open Solution for Seamless Transit Systems

Contactless Technology for Secure Physical Access: Technology and Standards Choices

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO BASED TECHNOLOGY FOR PAYMENT 4

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Smart Card Technology Capabilities

NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1

AN mifare Ultralight Features and Hints. Document information. Multiple ticketing, secured data storage, implementation hints

mcard CPK Supported Solutions

ACR880 GPRS Portable Smart Card Terminal

What is a Smart Card?

iclass MHz Contactless Cards and Readers ACCESS SECURE IDENTITY

SALTO Systems I SALTO Carriers. innovation in ID technology. MIFARE DESFire

UM0853 User manual. 1 Introduction. M24LRxx application software user guide

Smart Tiger STARCHIP SMART TIGER PAYMENT PRODUCT LINE. Payment. STiger SDA. STiger DDA. STiger DUAL

The Future is Contactless

Readers and Credentials. from Security Technologies

Enhancing the Contactless Cards UAT. Enabling faster and efficient transactions.

Using Contactless Smart Cards for Secure Applications

MIFARE ISO/IEC PICC

ACR122 NFC Contactless Smart Card Reader

Application Programming Interface

Smart Cards a(s) Safety Critical Systems

CRYPTOMEMORY POWERFUL SECURITY AT LOW COST

RFID MODULE Mifare Reader / Writer SL025B User Manual Version 1.4 Nov 2012 StrongLink

NTAG213/215/216. The mechanical and electrical specifications of NTAG21x are tailored to meet the requirements of inlay and tag manufacturers.

Loyalty Systems over Near Field Communication (NFC)

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

ACR122U USB NFC Reader

Frequently Asked Questions

Description of the Technical Component:

Secure Dual Interface PKI Smart Card Controller

Smart Card Security Access Modules in VeriFone Omni 3350 Countertop and Omni 3600 Portable Terminals

E-Blocks Easy RFID Bundle

Risks of Offline Verify PIN on Contactless Cards

Edge Metrics Data Center User Manual

RFID based Bill Generation and Payment through Mobile

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

RFID READER 13.56MHz Reader / Writer SL500 User Manual Version 2.6 Nov 2011 StrongLink

LibRFID: Automation Software for Library Management System Using RFID Technology

Prox DU & Prox SU. Dual interface USB smart card reader. Installation Guide. Installation Guide. Prox DU & Prox SU. DOC118570D Public Use Page 1/34

Fingerprint Based Biometric Attendance System

Mobile data carrier TW-L80-50-P-B128

NEAR FIELD COMMUNICATION

FUJIFILM Recording Media U.S.A., Inc. LTO Ultrium Technology

Introducing etoken. What is etoken?

Mobile data carrier TW-L86-54-C-B128

Jolly Encoder Configuration Guide

Introducing MIFARE DESFire EV2

PUF Physical Unclonable Functions

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Version Date Author Description Jpo First version Jpo FET output descriptions made clearer

The mobile phone as a contactless ticket

RFID MODULE Mifare Reader / Writer SL030 User Manual Version 2.6 Nov 2012 StrongLink

Using ISO Compliant RFID Tags in an Inventory Control System

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

Mobile Electronic Payments

Significance of Tokenization in Promoting Cloud Based Secure Elements

CRESCENDO SERIES Smart Cards. Smart Card Solutions

W.A.R.N. Passive Biometric ID Card Solution

1. Product Overview 2. Product Features 3. Comparison Chart 4. Product Applications 5. Order Information 6. Q & A

Transcription:

Gemalto Mifare 1K Datasheet

Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4 2.3 Durability...5 2.4 Security...5 3. Memory organization & access...6 3.1 The memory organization...6 3.2 Mifare Memory Commands...7 Released on February 2007 Page 2/7

1. OVERVIEW The Gemalto Mifare is a contactless multi-application smart card that is designed for use as a payment card for public transport ticketing systems. It has been developed with a peculiar emphasis on user convenience, fast transaction speed, exceptional reliability for frequent usage, security against fraud and cost effectiveness. 1.1 User convenience and speed The card and reader start to transmit data as soon as the card enter the reader RF antenna field, thus enabling the card holder to carry out transactions quickly and conveniently, through an intentional action. The RF communication interface transfers data between the Gemalto Mifare card and reader at a baud rate of 106k baud. This high data transfer rate enables ticketing transactions to be handled in 0,1 to 0,5 second. Therefore, transactions can be carried out without cardholders having to stop in front of the reader or remove the Gemalto Mifare card from their wallets. 1.2 Security Mutual challenge and response authentication, data ciphering, and message authentication protect the whole system from the fraud. These checks are implemented in a fraction of the overall transaction time. Furthermore, each Gemalto Mifare has a unique hard-written serial number which guaranties that each card can be individually selected. 1.3 Anticollision If two cards enter a field antenna at the same time, which is most likely to happen in many applications, a fast anticollision algorithm automatically triggers to prevent cross transactions. The reader can select one single card in the field, thus preventing transaction data corruption as a result of other cards being present or entering the RF field reader. Even if a cardholder has more than one Gemalto Mifare card in his wallet, the reader can select the appropriate card related to the application by implementing the anticollision mechanism, and carry out the transaction. Released on February 2007 Page 3/7

2. GEMALTO MIFARE FEATURES The following list provides a summary of the technical information about the Gemalto Mifare 1K. 2.1 Compatibility with norms ISO 14443-1/2/3 Defines a proximity card used for Yes compliant identification that used the credit card form factor (ISO 7810-ID-1) ISO 14443-4 High level protocol (T=CL) No : Mifare Protocol ISO 9798-2 Security techniques 3-pass authentication mechanism Yes compliant ISO 7810 Format for identification card (ID-1) Yes compliant ISO 7813 Additional characteristics of ID-1 plastic Yes compliant banking cards (thickness for example) ISO 7816 ID-1 identification with an embedded chip Yes compliant and contact surfaces ISO 10373 Protocol test methods for proximity cards Yes compliant 2.2 Electrical Chip Memory (EEPROM) Usable EEPROM for data Basic Functionality Operating frequency NXP & Infineon for Mifare 1K 1Kbyte for Mifare 1K 752 bytes for Mifare 1K Contactless card operated remotely from a dedicated reader using RF transmission 13,56 MHz Modulation from reader to card Amplitude modulation ASK 100% (ISO 14443/2 type A) Modulation from card to reader Load modulation (847,5 KHz, ASK ISO 14443 Type A) Communication speed 106 k baud (ISO 14443/2 type A) Operating range Up to 10 cm (depending on the reader and the antenna design) Number of reads Unlimited Number of writes 100 000 Data retention 10 years Released on February 2007 Page 4/7

2.3 Durability Mechanical stress 250 bending cycles on each side, 500 torsion cycles on each side as specified in ISO10373 without loosing functionality and aesthetic aspects. 2.4 Security Mutual 3- pass authentication (ISO/IEC DIS 9789-2). Encryption based on a Mifare cipher algorithm including random generator, serial number and 48bit keys. The encryption provides : Card/Reader mutual authentication, Anti-replay mechanism, Encrypted transmission providing confidentiality of transmitted data. RF Channel data encryption with replay attack protection. Memory structured into sectors with each sector protected by its own key set enabling the use of multiple applications with key hierarchy. Mifare 1K : each of the 16 sectors of the card has two 48-bit diversified keys Anti-cloning Each chip has a unique card serial number (4 bytes) to ensure the uniqueness of each device. Anti-collision Access protection to EEPROM by transport key on chip delivery Released on February 2007 Page 5/7

3. MEMORY ORGANIZATION & ACCESS 3.1 The memory organization The Gemalto Mifare 1K has 8192 bits EEPROM which is organized in 16 sectors with 4 blocks each. Each block is made of. The following diagram shows the Gemalto Mifare 1K memory structure. Gemalto Mifare 1K Memory mapping Sector 15 4 blocks Sector 0 4 blocks Trailer Block 3 Data Block 2 Data Block 1 Data Block 0 Key A 6 bytes Access Conditions 4 bytes Key B 6 bytes 16 sectors * 4 blocks * * 8 bits = 8 Kbits Each sector contains blocks 3 blocks of data configurable o Either as Read/Write Blocks for storing general data o Or as Value Blocks e.g. electronic purse applications. The Sector Trailer contains the individual secret Authentication Key A and optional Key B as well as the block accesses conditions of the respective sector. o 6 byte Authentication Key A : this key can never be read. o Optional 6 byte Authentication Key B : this key can either be read after an authentication or never be read dependant on the setting of the Access bits. o Access Bits to define the access conditions for the specified blocks for every sector individually. The Sector trailer and the data blocks are controlled independently. The first data block of the first sector is the manufacturer block. It is a read-only block that contains the manufacturer serial number. Released on February 2007 Page 6/7

3.2 Mifare Memory Commands Request Anticollision Select Authenticate Read Write Increment Decrement Restore Transfer Prompts cards within the antenna field to return a card type identifier number. Chooses one card out of those that are in the antenna field and return its serial number. Selects the card that the processing commands are sent to using its serial number. Selects a key that is stored in the reader, and challenges it against the corresponding key in the sector to be accessed in the selected card. If the challenge is successful, access is granted to the sector holding the challenged key for the functions defined by the access conditions. Reads one memory block. This command can only be executed if the appropriate key for granting read access (as defined by the target sector access condition) has been successfully challenged using the authenticate command. Writes one memory block of data. This command can only be executed if the appropriate key for granting write access (as defined by the target sector access condition) has been successfully challenged using the authenticate command. Increments the contents of a block and stores the result in the data register Decrements the contents of a block and stores the result in the data register. Read the contents of a block into the data register. Writes the contents of the data register to a block Released on February 2007 Page 7/7