206 research outputs found

    A Practical Attack on the MIFARE Classic

    Get PDF
    The MIFARE Classic is the most widely used contactless smart card in the market. Its design and implementation details are kept secret by its manufacturer. This paper studies the architecture of the card and the communication protocol between card and reader. Then it gives a practical, low-cost, attack that recovers secret information from the memory of the card. Due to a weakness in the pseudo-random generator, we are able to recover the keystream generated by the CRYPTO1 stream cipher. We exploit the malleability of the stream cipher to read all memory blocks of the first sector of the card. Moreover, we are able to read any sector of the memory of the card, provided that we know one memory block within this sector. Finally, and perhaps more damaging, the same holds for modifying memory blocks

    Risks of Offline Verify PIN on Contactless Cards

    Get PDF
    Contactless card payments are being introduced around the world al- lowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require veri- fication of the cardholder’s PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which exploits contactless verify PIN to give unlimited attempts to guess the cardholder’s PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder

    The security of the multi-application public transport card

    Get PDF
    Mifare Classic widely used as a public transport card based on the weak cipher Crypto-1 broken three years ago with a number of serious attacks published by researchers from the Dutch University of Nijmegen and still another was developed at University College of London. The report entitled Cloning Reactivation published in the Polish Computerworld magazine presented the security of Warsaw City Card at that time. It also announced that starting from 2010 the security of the Warsaw system would undergo an upgrade with the usage of 3DES algorithm. While in London all new Oyster cards emitted since 2010 are more secureDesFire cards, the security of the Warsaw card stays nearly the same

    A comprehensive review of RFID and bluetooth security: practical analysis

    Get PDF
    The Internet of Things (IoT) provides the ability to digitize physical objects into virtual data, thanks to the integration of hardware (e.g., sensors, actuators) and network communications for collecting and exchanging data. In this digitization process, however, security challenges need to be taken into account in order to prevent information availability, integrity, and confidentiality from being compromised. In this paper, security challenges of two broadly used technologies, RFID (Radio Frequency Identification) and Bluetooth, are analyzed. First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out. Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis. Lastly, risk mitigation and counter measures are proposed

    The Study of RFID Authentication Protocols and Security of Some Popular RFID Tags

    Get PDF

    Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Get PDF
    In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1

    Contraste de los riesgos valorados para los tipos de tarjetas que han sido utilizadas como medio de pago en el sistema integrado de transporte público

    Get PDF
    Trabajo de InvestigaciónEl sistema integrado de transporte público SITP, es uno de los sistemas más grandes y sofisticados de transporte en Colombia; el ingreso a este se hace mediante tarjetas inteligentes sin contacto entre las cuales se encuentran: tarjeta monedero, cliente frecuente y tullave bajo la licitación de recaudo Bogotá. Debido a diferentes sucesos presentados, vulneración del medio de pago, se realizó una valoración de riesgos por medio de la norma ISO 27005,seguridad de la información de activos, basándose en la identificación de amenazas, vulnerabilidades y riesgos de las tarjetas utilizadas en el sistema.RESUMEN ABSTRACT INTRODUCCIÓN 1. GENERALIDADES 2. ESTABLECIMIENTO DEL CONTEXTO 3. IDENTIFICACIÓN DE RIESGOS 4. ESTIMACIÓN DE RIESGOS 5. EVALUACIÓN DE RIESGOS 6. CONCLUSIONES 7. RECOMENDACIONES Y TRABAJOS FUTUROS 8. ANEXOS 9. REFERENCIASPregradoIngeniero de Sistema
    corecore