Title |
Optimal MIFARE Classic Attack Flow on Actual Environment |
Authors |
안현진(Ahn, Hyunjin) ; 이예림(Lee, Yerim) ; 이수진(Lee, Su-Jin) ; 한동국(Han, Dong-Guk) |
DOI |
https://doi.org/10.5370/KIEE.2016.65.12.2240 |
Keywords |
RFID security ; Mifare classic attack |
Abstract |
MIFARE Classic is the most popular contactless smart card, which is primarily used in the management of access control and public transport payment systems. It has several security features such as the proprietary stream cipher Crypto 1, a challenge-response mutual authentication protocol, and a random number generator. Unfortunately, multiple studies have reported structural flaws in its security features. Furthermore, various attack methods that target genuine MIFARE Classic cards or readers have been proposed to crack the card. From a practical perspective, these attacks can be partitioned according to the attacker's ability. However, this measure is insufficient to determine the optimal attack flow due to the refined random number generator. Most card-only attack methods assume a predicted or fixed random number, whereas several commercial cards use unpredictable and unfixable random numbers. In this paper, we propose optimal MIFARE Classic attack procedures with regards to the type of random number generator, as well as an adversary's ability. In addition, we show actual attack results from our portable experimental setup, which is comprised of a commercially developed attack device, a smartphone, and our own application retrieving secret data and sector key. |