Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Proceedings of the 16th ACM conference on Computer and communications security
An introduction to implementation attacks and countermeasures
MEMOCODE'09 Proceedings of the 7th IEEE/ACM international conference on Formal Methods and Models for Codesign
Dismantling SecureMemory, CryptoMemory and CryptoRF
Proceedings of the 17th ACM conference on Computer and communications security
Defeating any secret cryptography with SCARE attacks
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Real-time location and inpatient care systems based on passive RFID
Journal of Network and Computer Applications
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Exposing iClass key diversification
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
mCarve: Carving attributed dump sets
SEC'11 Proceedings of the 20th USENIX conference on Security
Chameleon: a versatile emulator for contactless smartcards
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Identity verification schemes for public transport ticketing with NFC phones
Proceedings of the sixth ACM workshop on Scalable trusted computing
The security of the multi-application public transport card
Annales UMCS, Informatica - Security Systems
All you can eat or breaking a real-world contactless payment system
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Gone in 360 seconds: Hijacking with Hitag2
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
Cryptanalytic attacks on MIFARE classic protocol
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
Secure and efficient design of software block cipher implementations on microcontrollers
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
The Mifare Classic is the most widely used contactless smartcard on the market.The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious attacks have been proposed. The most serious of them retrieves a secret key in under a second. In order to clone a card, previously proposed attacks require that the adversary either has access to an eavesdropped communication session or executes a message-by-message man-in-the-middle attack between the victim and a legitimate reader. Although this is already disastrous from a cryptographic point of view, system integrators maintain that these attacks cannot be performed undetected.This paper proposes four attacks that can be executed by an adversary having only wireless access to just a card (and not to a legitimate reader). The most serious of them recovers a secret key in less than a second on ordinary hardware. Besides the cryptographic weaknesses, we exploit other weaknesses in the protocol stack. A vulnerability in the computation of parity bits allows an adversary to establish a side channel. Another vulnerability regarding nested authentications provides enough plaintext for a speedy known-plaintext attack.