Wirelessly Pickpocketing a Mifare Classic Card

被引:146
作者
Garcia, Flavio D. [1 ]
van Rossum, Peter [1 ]
Verdult, Roel [1 ]
Schreur, Ronny Wichers [1 ]
机构
[1] Radboud Univ Nijmegen, Nijmegen, Netherlands
来源
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2009年
关键词
D O I
10.1109/SP.2009.6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious attacks have been proposed. The most serious of them retrieves a secret key in under a second. In order to clone a card, previously proposed attacks require that the adversary either has access to an eavesdropped communication session or executes a message-by-message man-in-the-middle attack between the victim and a legitimate reader Although this is already disastrous from a cryptographic point of view, system integrators maintain that these attacks cannot be performed undetected. This paper proposes four attacks that can be executed by an adversary having only wireless access to just a card (and not to a legitimate reader). The most serious of them recovers a secret key in less than a second on ordinary hardware. Besides the cryptographic weaknesses, we exploit other weaknesses in the protocol stack. A vulnerability in the computation of parity, bits allows an adversary to establish a side channel. Another vulnerability regarding nested authentications provides enough plaintext for a speedy known-plaintext attack.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 12 条
  • [1] [Anonymous], 14443 ISOIEC
  • [2] [Anonymous], USENIX SEC S
  • [3] Biham E, 1997, LECT NOTES COMPUT SC, V1267, P260
  • [4] COURTOIS NT, 2008, 2008166 CRYPT
  • [5] Gans GD, 2008, LECT NOTES COMPUT SC, V5189, P267, DOI 10.1007/978-3-540-85893-5_20
  • [6] Garcia FD, 2008, LECT NOTES COMPUT SC, V5283, P97
  • [7] Krawczyk H., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P310
  • [8] Kumar S, 2006, LECT NOTES COMPUT SC, V4249, P101
  • [9] NOHL K, CRYPTANALYSIS CRYPTO
  • [10] NOHL K, 2007, CHAOS COMP C