透過您的圖書館登入
IP:18.218.127.141

並列摘要


MIFARE Classic is a proprietary contactless smart card technology widely used in public transportation ticketing systems of cities across the world. MIFARE Classic's cryptographic protection to the stored data has been reverse-engineered and broken in a recent series of papers. In this paper, we report our experience attacking a real MIFARE Classic system. Specifically, we have implemented a brute-force search using NVIDIA graphics cards to verify the claims in the literature. Moreover, we have achieved a tremendous improvement over an existing sniffer-based attack that takes advantage of other design and implementation flaws of CRYPTO-1, MIFARE Classic's proprietary cipher. To our best knowledge, this is the first report in the literature of a practical long-range attack. These attacks disarm all cryptographic protection of MIFARE Classic, making it extremely difficult to secure transactions. Lastly, we take up the challenge and present our ideas how to defend against most attacks using practical mechanisms that do not require any hardware changes. Our proposed mechanisms can be easily implemented on a variety of MIFARE Classic readers on the market and only require commodity PCs be used in the backend system with intermittent network connectivity.

並列關鍵字

RFID MIFARE CRYPTO-1 cryptanalysis GPU

被引用紀錄


Kang, Y. C. (2015). 有效更新及檢驗為基礎之隱私保護多關鍵字排序搜尋 [master's thesis, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2015.01004
蔡文誠(2011)。適用於KNN定位系統之相對定位誤差估測方法〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2011.02173
蘇嘉弘(2007)。溫度感應性共聚微乳膠與磁性材料結合應用於熱治療與藥物釋放系統之研究〔碩士論文,國立臺灣大學〕。華藝線上圖書館。https://doi.org/10.6342/NTU.2007.02763

延伸閱讀