Near Field Communication Security

Size: px
Start display at page:

Download "Near Field Communication Security"

Transcription

1 Near Field Communication Security Thomas Patzke

2 Who am I... Thomas Patzke (formerly Skora)

3 Who am I... Thomas Patzke (formerly Skora) Started with security related topics somewhere in the 90s University degree in 2006, RWTH Aachen, thesis about VoIP security Security Consulting since 2006 Primary security analysis/penetration testing

4 Who am I... Thomas Patzke (formerly Skora) Started with security related topics somewhere in the 90s University degree in 2006, RWTH Aachen, thesis about VoIP security Security Consulting since 2006 Primary security analysis/penetration testing (Web) Application Security Security analysis of unusual stuff: POS, cash machines, head units, security protocols Security Research in various areas Writing Security Tools Cryptography

5 What is this talk about? A introduction to NFC

6 What is this talk about? A introduction to NFC Security of the girogo system Security of Credit Cards How doors get open with replay attacks

7 What is this talk about? A introduction to NFC Security of the girogo system Security of Credit Cards How doors get open with replay attacks Securing NFC applications The NFC hackers toolbox

8 NFC=?

9 NFC=?

10 NFC=... Near Field Communication

11 NFC=... Near Field Communication Few cm communication distance Power supply by reader

12 NFC=... Near Field Communication Few cm communication distance Power supply by reader 13,56 MHz, 424kBit/s

13 NFC=... Near Field Communication Few cm communication distance Power supply by reader 13,56 MHz, 424kBit/s ISO standards 14443: Physical layer, frequency, transmitting power, initialisation, anti-collision, bit transfer 15693: Increased communication distance up to 1,5m 18092, 21481: NFCIP - NFC Interface and Protocol

14 Other systems

15 Other systems 125 khz Proximity Cards: Access Control

16 Other systems 125 khz Proximity Cards: Access Control Legic Prime: Proprietary in 13,56MHz, Access Control, Company Cards

17 Other systems 125 khz Proximity Cards: Access Control Legic Prime: Proprietary in 13,56MHz, Access Control, Company Cards iclass,...

18 Other systems 125 khz Proximity Cards: Access Control Legic Prime: Proprietary in 13,56MHz, Access Control, Company Cards iclass,... NFC RFID

19 Use Cases Access Control Payment Tickets in Public Transportation Determination of Position Verification of Ownership Smart Posters Business Cards Personalized Key Generally: Storage

20

21 Power Supply & Communication Basics Power supply via induction field

22 Power Supply & Communication Basics Power supply via induction field Two transmission modes: passive and active

23 Power Supply & Communication Basics Power supply via induction field Two transmission modes: passive and active Passive Connectionless Roles: Initiator (Reader) and Target (Tag/Card) Request/Response communication

24 Power Supply & Communication Basics Power supply via induction field Two transmission modes: passive and active Passive Connectionless Roles: Initiator (Reader) and Target (Tag/Card) Request/Response communication Active Connection-oriented Equal communication partners Unusual

25 Low Level Communication ISO : Initialization and Anticollision 8 Bit + 1 Parity Bit Basic Protocol: Command + Parameter + Data + CRC

26 Low Level Communication ISO : Initialization and Anticollision 8 Bit + 1 Parity Bit Basic Protocol: Command + Parameter + Data + CRC ISO : Transmission Protocol Length + Format + Interface Bytes + Historical Bytes + Data + CRC Interface Bytes: communication options (optional) Historical Bytes: misc. infos (optional, ISO )

27 Anti Collision Protocol Usual Question: what happens if multiple cards are in the range of a reader?

28 Anti Collision Protocol Usual Question: what happens if multiple cards are in the range of a reader? Solution: Anticollision Protocol

29 Anti Collision Protocol Usual Question: what happens if multiple cards are in the range of a reader? Solution: Anticollision Protocol Initiator chooses target by unique target identifiers (UIDs) Some kind of binary search: targets send UID prefixes, initiator chooses

30 Anti Collision Protocol Usual Question: what happens if multiple cards are in the range of a reader? Solution: Anticollision Protocol Initiator chooses target by unique target identifiers (UIDs) Some kind of binary search: targets send UID prefixes, initiator chooses Negotiation of higher level protocols

31 Anti Collision Protocol CC BY-NC-SA 2.0 libnfc.org

32 Anti Collision Protocol Any security here?

33 Anti Collision Protocol

34 Anti Collision Protocol

35 Anti Collision Protocol Nope! No transport encryption Overwritten data visible

36 Anticollision Protocol Example 1. R: 26 Welcome (REQA) 2. T: Respond (ATQA) CC BY-NC-SA 2.0 libnfc.org

37 Anticollision Protocol Example 1. R: 26 Welcome (REQA) 2. T: Respond (ATQA) 3. R: Select cascade 1 (SEL) 4. T: cc CT, UID(byte 1,2,3), BCC CC BY-NC-SA 2.0 libnfc.org

38 Anticollision Protocol Example 1. R: 26 Welcome (REQA) 2. T: Respond (ATQA) 3. R: Select cascade 1 (SEL) 4. T: cc CT, UID(byte 1,2,3), BCC 5. R: cc 0e 05 Select available tag (SEL) 6. T: 24 d8 36 Select Acknowledge (SAK) CC BY-NC-SA 2.0 libnfc.org

39 Anticollision Protocol Example 1. R: 26 Welcome (REQA) 2. T: Respond (ATQA) 3. R: Select cascade 1 (SEL) 4. T: cc CT, UID(byte 1,2,3), BCC 5. R: cc 0e 05 Select available tag (SEL) 6. T: 24 d8 36 Select Acknowledge (SAK) 7. R: Select cascade 2 (SEL) 8. T: e1 e3 1c 80 9e UID(byte 4,5,6,7), BCC CC BY-NC-SA 2.0 libnfc.org

40 Anticollision Protocol Example 1. R: 26 Welcome (REQA) 2. T: Respond (ATQA) 3. R: Select cascade 1 (SEL) 4. T: cc CT, UID(byte 1,2,3), BCC 5. R: cc 0e 05 Select available tag (SEL) 6. T: 24 d8 36 Select Acknowledge (SAK) 7. R: Select cascade 2 (SEL) 8. T: e1 e3 1c 80 9e UID(byte 4,5,6,7), BCC 9. R: e1 e3 1c 80 9e b9 e1 Finish select (SEL) 10. T: 20 fc 70 SAK without cascade bit set CC BY-NC-SA 2.0 libnfc.org

41 Anticollision Protocol Example 1. R: 26 Welcome (REQA) 2. T: Respond (ATQA) 3. R: Select cascade 1 (SEL) 4. T: cc CT, UID(byte 1,2,3), BCC 5. R: cc 0e 05 Select available tag (SEL) 6. T: 24 d8 36 Select Acknowledge (SAK) 7. R: Select cascade 2 (SEL) 8. T: e1 e3 1c 80 9e UID(byte 4,5,6,7), BCC 9. R: e1 e3 1c 80 9e b9 e1 Finish select (SEL) 10. T: 20 fc 70 SAK without cascade bit set 11. R: e0 50 bc a5 Request Answer to Select (RATS) 12. T: ATS (DESFire EV1) 13. R: cd Disable (HALT) CC BY-NC-SA 2.0 libnfc.org

42 Lets talk about security!

43 Lets talk about security! NFC itself was made to be contactless, not secure. There is no security at lower protocol layers!

44 Lets talk about security! NFC itself was made to be contactless, not secure. There is no security at lower protocol layers! Security is implemented at the application layer

45 Lets talk about security! NFC itself was made to be contactless, not secure. There is no security at lower protocol layers! Security is implemented at the application layer... if it is implemented.

46 NFC in EC Cards Since end of 2011, Sparkassen in Germany started to issue cards with a contactless payment system.

47 NFC in EC Cards Since end of 2011, Sparkassen in Germany started to issue cards with a contactless payment system. Somewhere in 2012 it was rebranded to girogo

48 NFC in EC Cards Since end of 2011, Sparkassen in Germany started to issue cards with a contactless payment system. Somewhere in 2012 it was rebranded to girogo Basically it is the GeldKarte system with a radio interface. There s an app for reading these cards (S-Reader) Loaded amount of money Validity of card Charging and Payments

49 NFC in EC Cards Since end of 2011, Sparkassen in Germany started to issue cards with a contactless payment system. Somewhere in 2012 it was rebranded to girogo Basically it is the GeldKarte system with a radio interface. There s an app for reading these cards (S-Reader) Loaded amount of money Validity of card Charging and Payments Is this all data?

50 Reverse Engineering of girogo 1. Is there existing information?

51 Reverse Engineering of girogo 1. Is there existing information? Yes: a leaked spec from 1997: EMV specs, publicly available:

52 Reverse Engineering of girogo 1. Is there existing information? Yes: a leaked spec from 1997: EMV specs, publicly available: 2. Decompilation of the app dex2jar jd-gui

53 Reverse Engineering of girogo

54 Reverse Engineering of girogo 1. Is there existing information? Yes: a leaked spec from 1997: EMV specs, publicly available: 2. Decompilation of the app dex2jar jd-gui 3. Built a fuzzer that tries to access further records

55 Reverse Engineering of girogo

56 Reverse Engineering of girogo 1. Is there existing information? Yes: a leaked spec from 1997: EMV specs, publicly available: 2. Decompilation of the app dex2jar jd-gui 3. Built a fuzzer that tries to access further records 4. Built an app that extracts the data It reads everything that the official app reads and additionally...

57 Reverse Engineering of girogo 1. Is there existing information? Yes: a leaked spec from 1997: EMV specs, publicly available: 2. Decompilation of the app dex2jar jd-gui 3. Built a fuzzer that tries to access further records 4. Built an app that extracts the data It reads everything that the official app reads and additionally... The date of activation (boring) bank code number (hmmm) an unique card identifier (privacy) the card number (privacy)

58 Reverse Engineering of girogo 1. Is there existing information? Yes: a leaked spec from 1997: EMV specs, publicly available: 2. Decompilation of the app dex2jar jd-gui 3. Built a fuzzer that tries to access further records 4. Built an app that extracts the data It reads everything that the official app reads and additionally... The date of activation (boring) bank code number (hmmm) an unique card identifier (privacy) the card number (privacy) an account number, but not the customers (what???) for each transaction: the identifier of the counterpart (privacy!)

59 Screenshots

60 Screenshots

61 Screenshots

62 Screenshots

63 Summary of the (short) girogo analysis Payment is secured cryptographically, at least nothing that is breakable in few days.

64 Summary of the (short) girogo analysis Payment is secured cryptographically, at least nothing that is breakable in few days. Kasse2Go (the payment app, very short analysis without retailer card) online verification of retailer card - no possibility was found to convince the backend that I m a retailer. communication with backend is authenticated and encrypted.

65 Summary of the (short) girogo analysis Payment is secured cryptographically, at least nothing that is breakable in few days. Kasse2Go (the payment app, very short analysis without retailer card) online verification of retailer card - no possibility was found to convince the backend that I m a retailer. communication with backend is authenticated and encrypted. No obvious possibilities to interfere the payment process from the network. Payment runs on a smartphone, software under control of potentially malicious merchants.

66 Summary of the (short) girogo analysis Payment is secured cryptographically, at least nothing that is breakable in few days. Kasse2Go (the payment app, very short analysis without retailer card) online verification of retailer card - no possibility was found to convince the backend that I m a retailer. communication with backend is authenticated and encrypted. No obvious possibilities to interfere the payment process from the network. Payment runs on a smartphone, software under control of potentially malicious merchants. Some privacy-relevant information is available via NFC.

67 Summary of the (short) girogo analysis Payment is secured cryptographically, at least nothing that is breakable in few days. Kasse2Go (the payment app, very short analysis without retailer card) online verification of retailer card - no possibility was found to convince the backend that I m a retailer. communication with backend is authenticated and encrypted. No obvious possibilities to interfere the payment process from the network. Payment runs on a smartphone, software under control of potentially malicious merchants. Some privacy-relevant information is available via NFC. How widespread is this app?

68 Summary of the (short) girogo analysis

69 EMV Communication is defined in the EMV standard APDU: CLA + INS + P1 + P2 + Ld + Data + Le EMV further defines a structure somewhat similar to folders (Application IDs) and files

70 EMV Communication is defined in the EMV standard APDU: CLA + INS + P1 + P2 + Ld + Data + Le EMV further defines a structure somewhat similar to folders (Application IDs) and files Activation of the GeldKarte/girogo AID: 00 A4 04 0C 09 D

71 EMV Communication is defined in the EMV standard APDU: CLA + INS + P1 + P2 + Ld + Data + Le EMV further defines a structure somewhat similar to folders (Application IDs) and files Activation of the GeldKarte/girogo AID: 00 A4 04 0C 09 D B2 01 xx 00 reads a data record C4: EF BETRAG (amount of loaded money) CC: EF BOERSE (bank id, account number) 00 B2 xx EC 00: read transactions

72 EMV Communication is defined in the EMV standard APDU: CLA + INS + P1 + P2 + Ld + Data + Le EMV further defines a structure somewhat similar to folders (Application IDs) and files Activation of the GeldKarte/girogo AID: 00 A4 04 0C 09 D B2 01 xx 00 reads a data record C4: EF BETRAG (amount of loaded money) CC: EF BOERSE (bank id, account number) 00 B2 xx EC 00: read transactions Data is clear-text (ASCII) or BCD encoded (25,00 EUR = 0x25 0x00)

73 Lets look at credit cards

74 Lets look at credit cards Mastercard PayPass Visa PayWave

75 Lets look at credit cards Mastercard PayPass Visa PayWave Again looked with the NFC Fuzzer at it...

76 Lets look at credit cards

77 Lets look at credit cards

78 Lets look at credit cards But there is the CVC!!1 The shops must verify it!!!

79 Lets look at credit cards Really?

80 Implementation Details AIDs depend on card, they are printed on receipts and available from public sources, e.g. knowledge-base/211-emv-aid-rid-pix AIDs differ even between countries

81 Implementation Details AIDs depend on card, they are printed on receipts and available from public sources, e.g. knowledge-base/211-emv-aid-rid-pix AIDs differ even between countries Examples for application selection sequences: VISA: 00 A4 04 0C 07 A MasterCard: 00 A4 04 0C 07 A

82 Implementation Details AIDs depend on card, they are printed on receipts and available from public sources, e.g. knowledge-base/211-emv-aid-rid-pix AIDs differ even between countries Examples for application selection sequences: VISA: 00 A4 04 0C 07 A MasterCard: 00 A4 04 0C 07 A The interesting file is requested with: 00 B2 01 0C 00 ASCII encoding

83 Implementation Details AIDs depend on card, they are printed on receipts and available from public sources, e.g. knowledge-base/211-emv-aid-rid-pix AIDs differ even between countries Examples for application selection sequences: VISA: 00 A4 04 0C 07 A MasterCard: 00 A4 04 0C 07 A The interesting file is requested with: 00 B2 01 0C 00 ASCII encoding Implementation (girogo + MasterCard/VISA): github.com/thomaspatzke/android-nfc-paycardreader

84 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data.

85 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air.

86 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air. The insecure magstripe mode shown here is implemented for compatibility reasons. There is a secure EMV mode (aka Chip&PIN)

87 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air. The insecure magstripe mode shown here is implemented for compatibility reasons. There is a secure EMV mode (aka Chip&PIN) Payment process:

88 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air. The insecure magstripe mode shown here is implemented for compatibility reasons. There is a secure EMV mode (aka Chip&PIN) Payment process: 1. Salesperson enters amount 2. Customer puts card on payment terminal 3. After a short time the payment is done

89 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air. The insecure magstripe mode shown here is implemented for compatibility reasons. There is a secure EMV mode (aka Chip&PIN) Payment process: 1. Salesperson enters amount 2. Customer puts card on payment terminal 3. After a short time the payment is done Where is the authorization (PIN entry) gone?

90 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air. The insecure magstripe mode shown here is implemented for compatibility reasons. There is a secure EMV mode (aka Chip&PIN) Payment process: 1. Salesperson enters amount 2. Customer puts card on payment terminal 3. After a short time the payment is done Where is the authorization (PIN entry) gone? The card companies say: putting the card on the terminal is a consent of the card owner!

91 Summary of Credit Card Vulnerabilities No authentication and authorization before access to sensible data. No transport encryption - data can be sniffed over the air. The insecure magstripe mode shown here is implemented for compatibility reasons. There is a secure EMV mode (aka Chip&PIN) Payment process: 1. Salesperson enters amount 2. Customer puts card on payment terminal 3. After a short time the payment is done Where is the authorization (PIN entry) gone? The card companies say: putting the card on the terminal is a consent of the card owner! This is secure the say!

92 Secure? Is the card moved to the payment terminal?

93 Secure? Is the card moved to the payment terminal?... or is the terminal moved to the card?

94 Secure? Is the card moved to the payment terminal?... or is the terminal moved to the card? And then there are relaying attacks

95 Access Control Access control systems are often based on dumb 125kHz tags

96 Access Control Access control systems are often based on dumb 125kHz tags Dumb? Yes, because of this:

97 Access Control Access control systems are often based on dumb 125kHz tags Dumb? Yes, because of this:

98 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna

99 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product?

100 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated

101 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated Encrypt the communication, ensure integrity Consider side channels

102 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated Encrypt the communication, ensure integrity Consider side channels Consider replay and relay attacks

103 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated Encrypt the communication, ensure integrity Consider side channels Consider replay and relay attacks Identify sensible data and require authentication/authorization for access, write protection

104 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated Encrypt the communication, ensure integrity Consider side channels Consider replay and relay attacks Identify sensible data and require authentication/authorization for access, write protection Don t rely on availability: tags can be destroyed or replaced Tags can be moved: don t believe that someone scans the tag where you placed it.

105 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated Encrypt the communication, ensure integrity Consider side channels Consider replay and relay attacks Identify sensible data and require authentication/authorization for access, write protection Don t rely on availability: tags can be destroyed or replaced Tags can be moved: don t believe that someone scans the tag where you placed it. Transmissions can be sniffed up to 10m away Communication can possibly be initiated at bigger ranges, than just some cm - consider at least 1,5m

106 Securing NFC Systems Personal protection Put your card in sleeves Cut the antenna Building a product? Don t use known insecure systems If you re nailed on an insecure system: under certain conditions, vulnerabilities can be mitigated Encrypt the communication, ensure integrity Consider side channels Consider replay and relay attacks Identify sensible data and require authentication/authorization for access, write protection Don t rely on availability: tags can be destroyed or replaced Tags can be moved: don t believe that someone scans the tag where you placed it. Transmissions can be sniffed up to 10m away Communication can possibly be initiated at bigger ranges, than just some cm - consider at least 1,5m Monitor the usage, e.g. one tag used at the same time in different locations.

107 NFC Hacking - Android Android Devices Android Framework: the android.nfc.* API offers interesting possibilities. NfcAdapter, NfcManager, NdefMessage, NdefRecord. connectivity/nfc/index.html Supports SO A, B, , NDEF, Mifare Classic+Ultralight and few other systems. Communication with smartcards, reading/writing NDEF tags etc.

108 NFC Hacking - Android Android Devices Android Framework: the android.nfc.* API offers interesting possibilities. NfcAdapter, NfcManager, NdefMessage, NdefRecord. connectivity/nfc/index.html Supports SO A, B, , NDEF, Mifare Classic+Ultralight and few other systems. Communication with smartcards, reading/writing NDEF tags etc. But: no proprietary systems, no low-level access, restricted card simulation, restricted timing control Several 100EUR. Possibly a bit expensive, if you don t need a new phone/tablet.

109 NFC Hacking - Android Apps NXP NFC TagInfo: apps/details?id=com.nxp.taginfolite NXP TagWriter: details?id=com.nxp.nfc.tagwriter NFC TagInfo: details?id=at.mroland.android.apps.nfctaginfo Banking Card Reader NFC (EMV): com.github.devnied.emvnfccard... and its API: https: //github.com/devnied/emv-nfc-paycard-enrollment CardTest: details?id=com.samj.cardtest

110 NFC Hacking - NFC Readers NFC Readers Tikitag, OpenPCD libnfc: Live RFID Hacking System: Price: <50EUR Same drawbacks as above

111 NFC Hacking - NFC Readers NFC Readers Tikitag, OpenPCD libnfc: Live RFID Hacking System: Price: <50EUR Same drawbacks as above Proxmark3 SDR-based, can principally support very much in 13,56MHz and kHz. FPGA: precise timing, for attacks like MIFARE breaking. Expensive: EUR a bit hacky

112 Questions? Web: Mail:

Hacking new NFC cards

Hacking new NFC cards Hacking new NFC cards NTAG2x, Ultralight EV1/C, Desfire EV2, ISO-15693, meal EMV cards abyssal see #brmlab IRC for contact 6.12.2018 New cards Mifare Ultralight C, Ultralight EV1 descendant of simple Ultralight

More information

AN MIFARE Type Identification Procedure. Application note COMPANY PUBLIC. Rev August Document information

AN MIFARE Type Identification Procedure. Application note COMPANY PUBLIC. Rev August Document information Document information Info Content Keywords, 14443 Abstract This document describes how to differentiate between the members of the card IC family. 14443-3 describes the initialization and anti-collision

More information

RFID tags. Inductive coupling is used for. energy transfer to card transmission of clock signal data transfer

RFID tags. Inductive coupling is used for. energy transfer to card transmission of clock signal data transfer RFID 1 RFID tags RFID = Radio-Frequency IDentification RFID devices are called tags or transponders More powerful RFID tags can be called (contactless) smartcards Inductive coupling is used for energy

More information

mifare DESFire Contactless Multi-Application IC with DES and 3DES Security MF3 IC D40 INTEGRATED CIRCUITS Objective Short Form Specification

mifare DESFire Contactless Multi-Application IC with DES and 3DES Security MF3 IC D40 INTEGRATED CIRCUITS Objective Short Form Specification INTEGRATED CIRCUITS mifare DESFire Contactless Multi-Application IC with DES and 3DES Security MF3 IC D4 Objective January 23 Revision 1.1 PUBLIC Philips Semiconductors CONTENTS 1 FEATURES...3 1.1 RF Interface:

More information

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated

Ch 9: Mobile Payments. CNIT 128: Hacking Mobile Devices. Updated Ch 9: Mobile Payments CNIT 128: Hacking Mobile Devices Updated 4-24-17 Current Generation Scenarios Mobile banking apps NFC-based or barcode-based payment apps used by consumers to purchase goods Premium-rated

More information

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie DEFCON 26 - Playing with RFID by Vanhoecke Vinnie 1. Contents 2. Introduction... 3 3. RFID Frequencies... 3 Low frequency... 3 High frequency... 3 Ultra-high frequency... 3 4. MIFARE... 4 MIFARE Classic...

More information

Near Field Communication: IoT with NFC. Dominik Gruntz Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme

Near Field Communication: IoT with NFC. Dominik Gruntz Fachhochschule Nordwestschweiz Institut für Mobile und Verteilte Systeme Near Field Communication: IoT with NFC Dominik Gruntz Institut für Mobile und Verteilte Systeme NFC Experience at FHNW 2005/06 First NFC demonstrator (with Siemens CX70 Emoty) NFC was included in a removable

More information

mifare DESFire & ISO14443

mifare DESFire & ISO14443 mifare DESFire & ISO14443 CAS - 26 mifare DESFire & ISO14443 Agenda mifare DESFire Type ID mifare DESFire ATQA mifare DESFire SAK mifare DESFire UID ISO14443A RATS & PPS mifare DESFire (R)ATS mifare DESFire

More information

NFC Payments: The Art of Relay & Replay Attacks

NFC Payments: The Art of Relay & Replay Attacks NFC Payments: The Art of Relay & Replay Attacks Who am I? Security Researcher @Netxing Co-founder of Women in Tech Fund (WomenInTechFund.org) NFC Technology RFID Spectrum (Radio Frequency Identification)

More information

10/02/2015. Introduction PROTOCOL EXAMPLES. e-passport. e-passports contain an RFID tag.

10/02/2015. Introduction PROTOCOL EXAMPLES. e-passport. e-passports contain an RFID tag. Introduction PROTOCOL EXAMPLES Tom Chothia Intro. To Comp. Sec. This talk gives some example of protocol attacks from my research, and a research group in Cambridge. E-passports (me & Smirnov) Contactless

More information

Chapter 2 Basics. 2.1 Smartcards. This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards.

Chapter 2 Basics. 2.1 Smartcards. This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards. Chapter 2 Basics This chapter summarizes basic concepts of smartcards, Near Field Communication (NFC) and payment cards. 2.1 Smartcards Smartcards are identification cards equipped with a microchip (integrated

More information

Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors

Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Fundamentals of Near Field Communication (NFC) Tvrtko Barbarić NXP Semiconductors Automotive Identification Wireless Infrastructure Lighting Industrial Mobile Consumer Computing Global player with local

More information

ISO / NFC Standards and Specifications Overview. NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team

ISO / NFC Standards and Specifications Overview. NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team ISO / NFC Standards and Specifications Overview NFC/RFID Training Module #1 (2014) S2 MCU NFC/RFID Applications Team HF RFID ISO STANDARDS HF RFID ISO Standards Overview The main worldwide accepted High

More information

RFID DEFCON 26 Vinnie Vanhoecke Lorenzo Bernardi

RFID DEFCON 26 Vinnie Vanhoecke Lorenzo Bernardi RFID Workshop @ DEFCON 26 Vinnie Vanhoecke Lorenzo Bernardi Page 1 Content Introduction RFID theory Basics Tools Protocols Mifare Challenges Page 2 RFID basics RFID theory: RFID basics RFID = Radio Frequency

More information

Overview RFID-Systems

Overview RFID-Systems Overview RFID-Systems MSE, Rumc, RFID, 1 References [1] Klaus Finkenzeller, RFID-Handbuch, 5. Auflage, Hanser, 2008. [2] R. Küng, M. Rupf, RFID-Blockkurs, ergänzende MSE-Veranstaltung, ZHAW, 2009. [3]

More information

JMY600 Series IC Card Module

JMY600 Series IC Card Module MIFARE & ISO14443A & ISO14443B & ISO7816 & ISO15693 IC CARD MODULE JMY600 Series IC Card Module MIFARE 1K Card Operation Guide (Revision 1.02) Jinmuyu Electronics Co., LTD March 31, 2015 Please read this

More information

Near Field Comunications

Near Field Comunications Near Field Comunications Bridging the Physical and Virtual Worlds This is going to get interesting! Ash@YLabz.com Siamak Ashrafi NFC Definition Near field communication, or NFC, is a set of short-range

More information

Mobile Security Fall 2014

Mobile Security Fall 2014 Mobile Security Fall 2014 Patrick Tague Class #8 NFC & Mobile Payment 1 Announcements Reminder: first group of SoW presentations will be today, starting ~1/2 way through class Written SoW is a separate

More information

AN Over-the-Air top-up with MIFARE DESFire EV2 and MIFARE Plus EV1. Document information

AN Over-the-Air top-up with MIFARE DESFire EV2 and MIFARE Plus EV1. Document information Over-the-Air top-up with MIFARE DESFire EV2 and MIFARE Plus EV1 Document information Information Content Keywords Over-the-Air, OTA, Top-up, MIFARE DESFire EV2, MIFARE Plus EV1, Stored Value, Transport

More information

JMY600 Series IC Card Module

JMY600 Series IC Card Module MIFARE & ISO14443A & ISO14443B & ISO7816 & ISO15693 IC CARD MODULE JMY600 Series IC Card Module MIFARE DESfire Card Operation Guide (Revision 1.00) Jinmuyu Electronics Co., LTD April 7, 2015 Please read

More information

RFID & NFC. Erik Poll. Digital Security Radboud University Nijmegen

RFID & NFC. Erik Poll. Digital Security Radboud University Nijmegen RFID & NFC Erik Poll Digital Security Radboud University Nijmegen 1 RFID tags RFID = Radio-Frequency IDentification RFID devices are called tags or transponders More powerful RFID tags also called contactless

More information

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit

NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit NFC embedded microsd smart Card - Mobile ticketing opportunities in Transit July 2017 By: www.smk-logomotion.com Introduction Presentation is describing NFC enabled microsd smart card (LGM Card) Technical

More information

Security of NFC payments

Security of NFC payments Security of NFC payments Olga Korobova Department of Computer Science University of Massachusetts Amherst Abstract Our research objective was to examine the security features implemented by the bank cards

More information

Let s Hack NFC. How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications?

Let s Hack NFC. How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications? Geoffrey Vaughan Let s Hack NFC How does NFC work? How could we hack it? Where are the weaknesses? What are the security implications? Security Compass and NFC Currently we are devoting a lot of energy

More information

HCE security implications. Analyzing the security aspects of HCE

HCE security implications. Analyzing the security aspects of HCE HCE security implications Analyzing the security aspects of HCE January 8th, 2014 White paper - HCE security implications, analyzing the security aspects of HCE HCE security implications About the authors:

More information

Credential Programmer How to Order Guide

Credential Programmer How to Order Guide Credential Programmer How to Order Guide D0054, B.2 December 203 The most current version of this document is available for download at: http://www.hidglobal.com/documents/credential_programmer_htog_en.pdf

More information

NFC Lab Michel Simatic

NFC Lab Michel Simatic Michel Simatic 15/01/2015 Table of contents RFID versus NFC High level interactions with tags Touchatag (Tikitag) / Mir:ror Smart posters Low level interactions with tags Card readers Tags Medium level

More information

Relay Attacks on Secure Elementenabled

Relay Attacks on Secure Elementenabled Relay Attacks on Secure Elementenabled Mobile Devices Virtual Pickpocketing Revisited Michael Roland University of Applied Sciences Upper Austria,, Austria SEC2012 IFIP International Information Security

More information

NFC is the double click in the internet of the things

NFC is the double click in the internet of the things NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology

More information

NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee

NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee NFC Technology Overview Jonathan Main MasterCard Worldwide Chairman, Technical Committee September 2009 Agenda Review of Use Cases Architecture Overview Relationship to Other Standards Status of NFC Forum

More information

Attacks on NFC enabled phones and their countermeasures

Attacks on NFC enabled phones and their countermeasures Attacks on NFC enabled phones and their countermeasures Arpit Jain: 113050028 September 3, 2012 Philosophy This survey explains NFC, its utility in real world, various attacks possible in NFC enabled phones

More information

Connecting to the future ELATEC RFID SYSTEMS

Connecting to the future ELATEC RFID SYSTEMS Connecting to the future ELATEC RFID SYSTEMS ELATEC GmbH Enabling success RFID SYSTEMS Focus on the goal Adaptable to our customer s requirements, Elatec products and technologies are the core that has

More information

Corey Benninger Max Sobell

Corey Benninger Max Sobell Corey Benninger Max Sobell NFC Overview What is NFC? Hardware basics behind NFC Antennas and waveforms Tags and access control NFC Data Exchange Format (NDEF) NFC Application Attacks Privacy Mobile Wallets

More information

NFC Payments: The Art of Relay & Replay Attacks. Salvador Mendoza August 14, 2018

NFC Payments: The Art of Relay & Replay Attacks. Salvador Mendoza August 14, 2018 1 NFC Payments: The Art of Relay & Replay Attacks Salvador Mendoza August 14, 2018 2 Disclaimer This white paper is a shortened version of the actual research. Unfortunately, some techniques and exploitation

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service. You can add your SBI Debit Card issued on Visa and MasterCard platform on your Samsung

More information

JMY600 Series IC Card Module

JMY600 Series IC Card Module MIFARE & ISO14443A & ISO14443B & ISO7816 & ISO15693 IC CARD MODULE JMY600 Series IC Card Module MIFARE Plus Card Operation Guide (Revision 1.00) Jinmuyu Electronics Co., LTD April 7, 2015 Please read this

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

GOOGLE WALLET. Hardik Mangukiya ABSTRACT INDIA

GOOGLE WALLET. Hardik Mangukiya ABSTRACT INDIA GOOGLE WALLET Hardik Mangukiya INDIA ABSTRACT Over the past few thousand years of evolution, the way we pay has changed shapes and materials. It has gone from gold to coins, paper money to plastic cards

More information

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen

Smartcards. ISO 7816 & smartcard operating systems. Erik Poll Digital Security Radboud University Nijmegen Smartcards ISO 7816 & smartcard operating systems Erik Poll Digital Security Radboud University Nijmegen 1 Standard for contact smartcards ISO7816 7816-1 Physical characteristics 7816-2 Dimension & size

More information

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact

Improving the Student Experience with a Unified Credential. Jeff Staples VP Market Development Blackboard Transact Improving the Student Experience with a Unified Credential Jeff Staples VP Market Development Blackboard Transact 93% High school students who say campus technology is a key factor in their college selection

More information

A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things

A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things Pascal Urien Telecom ParisTech 23 avenue d Italie, 75013 Paris, France Pascal.Urien@telecom-paristech.fr

More information

Advanced. Card. Systems. Ltd. by Eric Lee. June, Advanced Card Systems Ltd. Room 2910, The Center, 99 Queen's Road Central, Hong Kong.

Advanced. Card. Systems. Ltd. by Eric Lee. June, Advanced Card Systems Ltd. Room 2910, The Center, 99 Queen's Road Central, Hong Kong. Advanced Card Systems Ltd. by Eric Lee June, 2004 1 2 What is a Contactless Smart Card? A kind of Smart Card which can be accessed without electrical contact A type of RFID tag What is RFID (Radio Frequency

More information

BL75R06SM 8K-bit EEPROM Contactless smart card chip

BL75R06SM 8K-bit EEPROM Contactless smart card chip Description BL75R06SM consists of the RF-Interface, the Digital Control Unit and the 8 Kbit EEPROM. Operating distance is up to 10cm(depending on antenna geometry). The communication layer complies to

More information

FM11RF005U 512Bits EEPROM Contactless Smart Card IC

FM11RF005U 512Bits EEPROM Contactless Smart Card IC FM11RF005U 512Bits EEPROM Contactless Smart Card IC May. 2008 FM11RF005U 512Bits Contactless Smart Card IC Ver. 1.1 1 INFORMATION IN THIS DOCUMENT IS INTENDED AS A REFERENCE TO ASSIST OUR CUSTOMERS IN

More information

CRASH AND PAY. Cloning and Fuzzing the NFC world. PAYMENT SECURITY CONSULTING

CRASH AND PAY. Cloning and Fuzzing the NFC world. PAYMENT SECURITY CONSULTING CRASH AND PAY Cloning and Fuzzing the NFC world. PAYMENT SECURITY CONSULTING WWW.PSCCO.COM.AU 15/09/2014 1 ABOUT ME Principle Consultant at Payment Security Consulting Banking, Payments, Certifications,

More information

COMPGA12 1 TURN OVER

COMPGA12 1 TURN OVER Applied Cryptography, COMPGA12, 2009-10 Answer ALL questions. 2 hours. Marks for each part of each question are indicated in square brackets Calculators are NOT permitted 1. Multiple Choice Questions.

More information

IS23SC4439 Preliminary. 1K bytes EEPROM Contactless Smart Card Conform to ISO/IEC 14443A Standard. Table of contents

IS23SC4439 Preliminary. 1K bytes EEPROM Contactless Smart Card Conform to ISO/IEC 14443A Standard. Table of contents 1K bytes EEPROM Contactless Smart Card Conform to ISO/IEC 14443A Standard Table of contents 1 Features 2 2 General Description 2 3 Typical Transaction Time 2 4 Functional Description 2 41 Block Description

More information

Inv.# 557 ONE CHIP MICROCONTROLLER FOR ELECTRONIC PLASTIC CARDS Preliminary datasheet September 2010 revised January 2012

Inv.# 557 ONE CHIP MICROCONTROLLER FOR ELECTRONIC PLASTIC CARDS Preliminary datasheet September 2010 revised January 2012 BASIC CHARACTERISTICS RF INTERFACE IN COMPLIANCE WITH ISO/IEC 14443A Contactless energy supply and data transmission Operating distance between the card and the read-write device antenna: up to 100mm (depending

More information

SPRINGCARD PC/SC READERS - H663 GROUP

SPRINGCARD PC/SC READERS - H663 GROUP DRAFT - PUBLIC SPRINGCARD PC/SC READERS - H663 GROUP Developer's reference manual www.springcard.com page 2 of 108 DOCUMENT IDENTIFICATION Category Developer's manual Family/Customer PC/SC readers Reference

More information

ACR1255U-J1 Secure Bluetooth NFC Reader

ACR1255U-J1 Secure Bluetooth NFC Reader ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...

More information

Evaluation of the feasible attacks against RFID tags for access control systems

Evaluation of the feasible attacks against RFID tags for access control systems Evaluation of the feasible attacks against RFID tags for access control systems Hristo Dimitrov & Kim van Erkelens University of Amsterdam February 4, 2014 1 / 20 Contents 1 Introduction 2 Background 3

More information

MF1ICS General description. Functional specification. 1.1 Key applications. 1.2 Anticollision. Energy. MIFARE card contacts La, Lb.

MF1ICS General description. Functional specification. 1.1 Key applications. 1.2 Anticollision. Energy. MIFARE card contacts La, Lb. Rev. 1.1 29 January 2008 Product data sheet 132211 PUBLIC 1. General description NXP has developed the MIFARE to be used in a contactless smart card according to ISO/IEC 14443 Type A. The MIFARE IC is

More information

3RD INTERNATIONAL UNIVERSITYSMART CARD CONGRESS NEW TUI R7: ENHANCEMENTS AND NEW POSSIBILITIES. April 23 th, 2015

3RD INTERNATIONAL UNIVERSITYSMART CARD CONGRESS NEW TUI R7: ENHANCEMENTS AND NEW POSSIBILITIES. April 23 th, 2015 3RD INTERNATIONAL UNIVERSITYSMART CARD CONGRESS NEW TUI R7: ENHANCEMENTS AND April 23 th, 2015 NEW POSSIBILITIES TUI Evolution TUI R7 Migration plan University Smart Card that belongs to The university

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Alpha Scanner Pro User manual

Alpha Scanner Pro User manual WWW.MYALPHALABS.COM Alpha Scanner Pro User manual myalphalabs, #105, 1 st Floor, Meenaakshi Paradise Apartment, 2 nd Main, 3 rd Block, Hosapalya Main Road, Yellukunte. Bangalore, INDIA. Pin Code 560068.

More information

PayPass M/Chip 4. Card Technical Specification

PayPass M/Chip 4. Card Technical Specification PayPass M/Chip 4 Card Technical Specification Version 1.3.1 - September 2008 Proprietary Rights The information contained in this document is proprietary and confidential to MasterCard International Incorporated,

More information

Secure Elements 101. Sree Swaminathan Director Product Development, First Data

Secure Elements 101. Sree Swaminathan Director Product Development, First Data Secure Elements 101 Sree Swaminathan Director Product Development, First Data Secure Elements Secure Element is a tamper resistant Smart Card chip that facilitates the secure storage and transaction of

More information

Smart Cards. Tim Hogan, Practice Director, Unisys

Smart Cards. Tim Hogan, Practice Director, Unisys Smart Cards Tim Hogan, Practice Director, Unisys Unisys Technology Forum 2007 18/05/2007 Page 1 Agenda What Defines a Smart Card Types of Smart Cards What benefit do they give A trip to the Tip Privacy

More information

RFID and Wiegand. Short manual. Version 0.1. Date Log v0.1. Adatis GmbH & Co.KG Seite 1 von 8

RFID and Wiegand. Short manual. Version 0.1. Date Log v0.1. Adatis GmbH & Co.KG Seite 1 von 8 RFID and Wiegand Short manual Version 0.1 Author Sandra Gilge Date 02.05.2018 Log v0.1 Adatis GmbH & Co.KG Seite 1 von 8 Inhalt 1 RFID 3 1.1 Introduction 3 1.2 Overview 3 1.3 Card types 3 1.4 Access Controll

More information

BML MobilePay FAQ. Page 1

BML MobilePay FAQ. Page 1 1. What is BML MobilePay App? BML MobilePay is a safe, easy and quick way to make purchases at merchant outlets and send money to individuals via your smartphone. It is a safe and secure method which does

More information

UNC20C01R 1Kbyte EEPROM Contactless Card IC

UNC20C01R 1Kbyte EEPROM Contactless Card IC UNC20C01R 1Kbyte EEPROM Contactless Card IC Application The UNC20C01R is intended for use in contactless payment cards for ticketing, communications, etc. systems. A single IC card may support multiple

More information

FEATURES Contactless transmission of data and supply energy, no battery is needed up to 100mm (depending on the inlay antenna and reader)

FEATURES Contactless transmission of data and supply energy, no battery is needed up to 100mm (depending on the inlay antenna and reader) FEATURES Contactless transmission of data and supply energy, no battery is needed Operating distance - up to 100mm (depending on the inlay antenna and reader) RF Interface - ISO/IEC 14443A compliant Operating

More information

NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC

NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC NFC ESSENTIALS JORDI JOFRE NFC EVERYWHERE MARCH 2018 PUBLIC Learn all about NFC Session I, 15th March NFC applications and use cases https://attendee.gotowebinar.com/rt/1059402932312036099 Session II,

More information

Mifare Classic Operations with TRF79xxA NFC/RFID Transceivers. S2 Microcontroller Division NFC/RFID Applications Team 02/2014

Mifare Classic Operations with TRF79xxA NFC/RFID Transceivers. S2 Microcontroller Division NFC/RFID Applications Team 02/2014 Mifare Classic Operations with TRF79xxA NFC/RFID Transceivers S2 Microcontroller Division NFC/RFID Applications Team 02/2014 1 Agenda Mifare Classic Operations Overview & Standards based timings Technical

More information

HAKI-NFC BASED ANDROID APPLICATION

HAKI-NFC BASED ANDROID APPLICATION HAKI-NFC BASED ANDROID APPLICATION JAIKISHAN KHATWANI 1, ABHISHEK SINGH 2, HRISHIKESH RANGDALE 3, KAMLESH JUWARE 4 & ISHAN ALONE 5 1,2,3,4&5 Department of Information Technology, Mumbai University, FR.

More information

Application Programming Interface

Application Programming Interface Application Programming Interface ACR122 NFC Reader Advanced Card Systems Ltd. Website: www.acs.com.hk Email: info@acs.com.hk Table of Contents 1.0 Introduction...3 1.1 Features...3 1.2 USB Interface...3

More information

MF3ICDx21_41_ General description. MIFARE DESFire EV1 contactless multi-application IC. Product short data sheet PUBLIC

MF3ICDx21_41_ General description. MIFARE DESFire EV1 contactless multi-application IC. Product short data sheet PUBLIC 145631 1. General description MIFARE DESFire EV1 (MF3ICD(H) 21/41/81), a Common Criteria (EAL4+) certified product, is ideal for service providers wanting to use secure multi-application smart cards in

More information

Power on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd.

Power on/off Button. Secure PIN Pad. Mswipe Technologies Pvt. Ltd. WisePOS is an innovative Android Mobile MPOS device accepting different forms of payment including EMV Chip & Pin, MSR and NFC contactless. Integrated with BT, Wi, GPRS and optional barcode scanner, WisePOS

More information

ACR122U SAM NFC Reader. Application Programming Interface

ACR122U SAM NFC Reader. Application Programming Interface Application Programming Interface ACR122U SAM NFC Reader Table of Contents ACR122T Application Programming 1.0 Introduction 3 1.1 Features 3 1.2 USB Interface 3 2.0 Communication between the Driver, Contactless

More information

PayPass Mag Stripe. Security Architecture

PayPass Mag Stripe. Security Architecture PayPass Mag Stripe Security Architecture Version 1.3 November 2007 Copyright The information contained in this manual is proprietary and confidential to MasterCard International Incorporated or one of

More information

How to NFC. Nick Pelly & Jeff Hamilton May 10 th, feedback: hashtags: #io2011 #Android questions:

How to NFC. Nick Pelly & Jeff Hamilton May 10 th, feedback:  hashtags: #io2011 #Android questions: How to NFC Nick Pelly & Jeff Hamilton May 10 th, 2011 feedback: http://goo.gl/syzqy hashtags: #io2011 #Android questions: http://goo.gl/mod/ekbn Agenda What is NFC Why use NFC How to NFC 101 How to NFC

More information

ACR1255 NFC Bluetooth Smart Card Reader

ACR1255 NFC Bluetooth Smart Card Reader ACR1255 NFC Bluetooth Smart Card Reader User Manual V1.00 Name Signature Date Prepared by: Tommy Wong 2015-05-28 Reviewed by: Approved by: Subject to change without prior notice Table of Contents 1.0.

More information

TRF79xx/MSP430/Stellaris Mifare Direct Mode 0 Training. Texas Instruments ERF Systems/Apps Team 12/2011

TRF79xx/MSP430/Stellaris Mifare Direct Mode 0 Training. Texas Instruments ERF Systems/Apps Team 12/2011 TRF79xx/MSP430/Stellaris Mifare Direct Mode 0 Training Texas Instruments ERF Systems/Apps Team 12/2011 Mifare Background Mifare uses ISO14443A air interface protocol, so TRF79xx is setup for ISO14443A,

More information

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice.

ACR1281U-C2. Card UID Reader. Reference Manual Subject to change without prior notice. ACR1281U-C2 Card UID Reader Reference Manual 1.01 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Reference Documents...

More information

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD

NEAR FIELD COMMUNICATION - THE FUTURE TECHNOLOGY FOR AN INTERACTIVE WORLD Int. J. Engg. Res. & Sci. & Tech. 2013 Jignesh Patel and Badal Kothari, 2013 Research Paper ISSN 2319-5991 www.ijerst.com Vol. 2, No. 2, May 2013 2013 IJERST. All Rights Reserved NEAR FIELD COMMUNICATION

More information

VendaCard MF1ICS50. major cities have adopted MIFARE as their e-ticketing solution of choice.

VendaCard MF1ICS50. major cities have adopted MIFARE as their e-ticketing solution of choice. 1. General description VendaCard MF1ICS50 Rev.. 5.3?29 January 2008 Product data sheet 001053 PUBLIC NXP has developed for VENDAPIN LLC the MIFARE MF1ICS50 to be used in a contactless smart card applications

More information

BEST PRACTICES FOR IMPLEMENTING ACCESS CONTROL SYSTEMS

BEST PRACTICES FOR IMPLEMENTING ACCESS CONTROL SYSTEMS BEST PRACTICES FOR IMPLEMENTING ACCESS CONTROL SYSTEMS By Isaac McGuire East Carolina University ICTN 4040 Best Practices for Implementing Access Control Systems As a network administrator or information

More information

advant power Fully scalable fully flexible advanced contactless smart card system Key applications & standards

advant power Fully scalable fully flexible advanced contactless smart card system Key applications & standards advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant line has been developed to ideally support the design and realisation

More information

Who we are. Eagle1753 (aka Matteo Beccaro) bughardy. (aka Matteo Collura)

Who we are. Eagle1753 (aka Matteo Beccaro) bughardy. (aka Matteo Collura) Who we are bughardy Eagle1753 (aka Matteo Beccaro) (aka Matteo Collura) bughardy@cryptolab.net eagle1753@onenetbeyond.org Italian student with passion of IT, networking and pentesting. In 2013 ended his

More information

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice.

ACR1252U. NFC Forum Certified Reader. Technical Specifications V1.03. Subject to change without prior notice. ACR1252U NFC Forum Certified Reader Technical Specifications V1.03 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0.

More information

NEAR FIELD COMMUNICATION

NEAR FIELD COMMUNICATION NEAR FIELD COMMUNICATION (GUIDED BY:MISS ANUJA V NAIR) BY: REJOY MENDEZ ROLL NO:24 S7 ECE OVERVIEW INTRODUCTION FEATURES OF NFC TECHNOLOGICAL OVERVIEW COMPARISON WITH OTHER TECHNOLOGY SECURITY ASPECTS

More information

Web Tap Payment Authentication and Encryption With Zero Customer Effort

Web Tap Payment Authentication and Encryption With Zero Customer Effort Web Tap Payment Authentication and Encryption With Zero Customer Effort Henry Ng Tap-Card-Pay Systems Corporation, Vancouver BC V5X3Y3, Canada henryng@tapcardpay.com Abstract. We propose a public-key authentication

More information

Beyond Payment: Secure NFC applications and their relation to RFID

Beyond Payment: Secure NFC applications and their relation to RFID Powering the trusted identities of the world s people, places & things Beyond Payment: Secure NFC applications and their relation to RFID Richard Aufreiter, Director Product Management - IDT June 27, 2017

More information

SMART CARDS. Miguel Monteiro FEUP / DEI

SMART CARDS. Miguel Monteiro FEUP / DEI SMART CARDS Miguel Monteiro apm@fe.up.pt FEUP / DEI WHAT IS A SMART CARD Distinguishable characteristics Can participate in automated electronic transactions Used primarily to add security Not easily forged

More information

ACR1251U-A1 USB NFC Reader with SAM Slot

ACR1251U-A1 USB NFC Reader with SAM Slot ACR1251U-A1 USB NFC Reader with SAM Slot Technical Specifications V1.05 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5

More information

Samsung Pay Frequently Asked Questions

Samsung Pay Frequently Asked Questions 1 Samsung Pay Frequently Asked Questions Contents 1. About Samsung Pay..2 2. Getting Started..2 3. Using Samsung Pay to make payments..3 4. Samsung Pay Security..5 5. Miscellaneous 6 1 2 About Samsung

More information

3. Why should I use Samsung Pay instead of my physical cards?

3. Why should I use Samsung Pay instead of my physical cards? Overview 1. What is Samsung Pay? Samsung Pay is a secure and easy-to-use mobile payment service which can be used to make purchases almost anywhere. Leveraging a new proprietary technology called Magnetic

More information

Mobile Contactless Technology Backgrounder

Mobile Contactless Technology Backgrounder Mobile Contactless Technology Backgrounder June 2011 1. In2Pay TM microsd architecture... 3 2. In2Pay microsd basic features... 4 3. Differences between In2Pay v2.0 and v2.6... 5 4. Support for full NFC

More information

Multifunctional Identifiers ESMART Access

Multifunctional Identifiers ESMART Access AIR TAG Multifunctional Identifiers ESMART Access Contents ESMART Access technology 4 Key advantages of ESMART Access 6 Multifunctional identifiers ESMART Access 8 AIRTAG RFID keyfobs 9 Silicone RFID

More information

- Lessons Learnt in Asia. Dr. Jack C. Pan Watchdata Technologies

- Lessons Learnt in Asia. Dr. Jack C. Pan Watchdata Technologies Mobile Proximity Payment - Lessons Learnt in Asia 1 Dr. Jack C. Pan Watchdata Technologies About Watchdata Established in 1994 Top 5 smart card vendor worldwide TimeCOS - First COS developed in China Headquarter

More information

Linux NFC Subsystem. Lauro Ramos Venancio Samuel Ortiz 2011, September 9th

Linux NFC Subsystem. Lauro Ramos Venancio Samuel Ortiz 2011, September 9th Lauro Ramos Venancio Samuel Ortiz 2011, September 9th What is NFC? NFC means Near Field Communication It is a short-range wireless communication It operates at 13.56 MHz Data rates from 106 kbits/s to

More information

ID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions

ID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions ID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions The ID 1xx series devices are ideal for mobile and desktop computing platforms requiring registration and identity

More information

ACM120S-SM Contactless Small Module

ACM120S-SM Contactless Small Module ACM120S-SM Contactless Small Module Technical Specifications Subject to change without prior notice Table of Contents 1.0. Introduction... 3 2.0. Features... 4 3.0. Typical Applications... 5 4.0. Technical

More information

USA Debit EMV Test Plan. Version 1.30

USA Debit EMV Test Plan. Version 1.30 USA Debit EMV Test Plan.30 June 2018 Disclaimer Information provided in this document describes capabilities available at the time of developing and delivering this document and the associated test cards

More information

MF0ICU2. 1. General description. MIFARE Ultralight C. 1.1 Contactless energy and data transfer. 1.2 Anticollision. Rev May

MF0ICU2. 1. General description. MIFARE Ultralight C. 1.1 Contactless energy and data transfer. 1.2 Anticollision. Rev May Rev. 3.2 19 May 2009 171432 1. General description NXP Semiconductors has developed MIFARE - - to be used with Proximity Coupling Devices (PCD) according to ISO/IEC 14443A (see Ref. 1 ISO/IEC ). The communication

More information

Mobile Identity Management

Mobile Identity Management Mobile Identity Management Outline Ideas Motivation Architecture Implementation notes Discussion Motivation 1 The mobile phone has become a highly personal device: Phonebook E-mail Music, videos Landmarks

More information

Introduction to NFC.

Introduction to NFC. Introduction to NFC robertportvliet@foundstonecom Twitter: @rportvliet Overview Introduction Hardware Software Attacks NFC Introduction What is NFC? Near Field Communication Set of standards for mobile

More information

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Fare Media: Past, Present and Future Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Evolution of Transit Fare Media Other Form Factors (contactless tokens and tags,

More information

A Multi-Application Smart-Card ID System for George Mason University. - Suraj Ravichandran.

A Multi-Application Smart-Card ID System for George Mason University. - Suraj Ravichandran. A Multi-Application Smart-Card ID System for George Mason University - Suraj Ravichandran. Current System Magnetic Swipe Card based ID The card has three tracks They each store the following: Name, G#

More information

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices

Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Secure Element APIs and Practical Attacks on Secure Element-enabled Mobile Devices Michael Roland University it of Applied Sciences Upper Austria,, Austria WIMA 2012 NFC Research Track 11 April 2012, Monaco

More information