MIFARE
From Wikipedia, the free encyclopedia
MIFARE is the NXP Semiconductors-owned trademark (a spin-off company formed out of Philips Semiconductors) of the reputedly most widely installed contactless smartcard, or proximity card, technology in the world with 500 million smart card chips and 5 million reader modules sold. The patented technology is owned by NXP Semiconductors, with its Headquarters in Eindhoven, the Netherlands and main business sites in Nijmegen, the Netherlands and Hamburg, Germany.
The MIFARE proprietary technology is based upon the ISO 14443 (RFID) Type A 13.56 MHz contactless smart card standard.
The technology is embodied in both cards and readers (also referred to as a Proximity Coupling Device).
The MIFARE name covers 4 really different kind of contactless cards :
- MIFARE Standard (or Classic) cards employ a proprietary high-level protocol instead of ISO 14443-4, with an NXP proprietary security protocol for authentication and ciphering.
- MIFARE UltraLight cards employ the same protocol as MIFARE Classic, but without the security part and slightly different commands
- MIFARE DESfire cards are fact smartcards that comply to ISO 14443-4 (T=CL) with a mask-ROM operating system from NXP.
- MIFARE ProX, and SmartMX, are NXP Semiconductors brand names for smartcards that comply to ISO 14443-4 (T=CL).
Contents |
[edit] MIFARE Standard
The MIFARE Classic and MIFARE UltraLight cards are fundamentally just memory storage devices, where the memory is divided into segments and blocks with simple security mechanisms for access control. They are ASIC based and have limited computational power. Thanks to their reliability and low cost, those cards are widely used for electronic wallet, access control, corporate ID cards, transportation or stadium ticketing.
The MIFARE Standard 1k offers about 768 bytes of data storage, split into 16 sectors; each sector is protected by two different keys, called A and B. They can be programmed for operations like reading, writing, increasing value blocks, etc.). MIFARE Standard 4k offers 3 kB split into 40 sectors of which 32 are same size as in the 1K with 8 more that are double size sectors. MIFARE Standard mini offers 320bytes split into 5 sectors.
The simplicity of the basic cards means that they are inexpensive, which is largely the reason for their success in large-scale deployments, such as Oyster card.
The MIFARE UltraLight has only 512 bits of memory (i.e. 64 bytes), without security. This card is so inexpensive it is often used for disposable tickets such as the Soccer World Cup 2006.
The MIFARE Classic encryption can be broken in about 12 seconds on a laptop, so it is not recommended for new designs.
[edit] MIFARE T=CL cards
MIFARE ProX and SmartMX are microprocessor based cards. The hardware does nothing on its own, it has to be programmed with dedicated software - an operating system. Most of the time, the microprocessor is coupled to a co-processor dedicated to fast cryptographic computations (e.g., Triple DES, AES, RSA, etc.). These cards are capable of executing complex operations that are as secure and fast as operations on contact based cards. The SmartMX is, in fact, also available as a contact based card, or with multiple interfaces, and offers a high degree of flexibility. These cards are capable of supporting a range of both proprietary and open operating systems, including the Java CardTM operating system (JCOP).
Depending on the installed software, the card can be used for almost any kind of application. This kind of card is mostly used where a high level of security is required (e.g., secure travel documents, electronic passports, payment cards, etc.), and is certified by independent parties such as Common Criteria. The hardware of the SmartMX is Common Criteria certified at EAL5+ by the Bundesamt für Sicherheit in der Informationstechnik, BSI, which means that it is highly resistant to tampering such as, for instance, reverse engineering attacks, fault/glitch attacks, or power analysis attacks. Each operating system on top of the hardware requires its own certification in order for the entire product to be certified.
[edit] MIFARE DESFire
The MIFARE DESFire is another NXP microprocessor platform with more hardware security features than the standard MIFARE Standard chips. It is sold already programmed with a general purpose software (the DESFire operating system) that offers a simple directory structure with files, similar to whats is typically found on smart cards. DESFire cards are sold on 4 variants. 1 with TripleDes only and 4Kbyte of storage and 3 with AES having storage capacity of 2, 4 and 8Kbyte (see DESFire EV1) The AES variants also have additional security features i.e. CMAC. It is using standards compliant T=CL communication, but has some compatibility issues.(Meaning that some T=CL compatible reader are not able to read/write this card). The card is based on a 8051 processor with 3DES and AES crypto accelerator, making really fast transaction possible.
The maximal read/write distance between card and reader is 10 cm (4 inches), but actual distance depends on the field power generated by the reader and its antenna size.
[edit] MIFARE DESFire EV1
(previously called DESFire8)
New evolution of DESFire card, broadly backwards compatible. Available with 2KB, 4 KB and 8KB NV-Memory. Other features include
- Support for random ID
- Support for the AES128 cipher
- Common Criteria certified at level EAL 4+
DESFire EV1 has been publicly announced in November 2006.
[edit] MIFARE Plus
MIFARE Plus is a drop-in replacement card for MIFARE Classic to allow for easy upgrade of existing infrastructures to higher levels of open-standard security. Other features include
- Support for random UID (7 bytes)
- Support for the AES128 cipher
- Common Criteria certified at level EAL 4+
It differs from DESfire8 in not being as flexible as the latter.
MIFARE Plus has been publicly announced in March 2008 ([1]) with availability of first samples in Q4 2008.
[edit] History
- 1994 — MIFARE Standard 1k contactless technology introduced.
- 1996 — First transport scheme in Seoul using MIFARE Standard 1k.
- 1997 — MIFARE PRO with Triple DES coprocessor introduced.
- 1999 — MIFARE PROX with PKI coprocessor introduced.
- 2001 — MIFARE UltraLight introduced.
- 2002 — MIFARE DESFire introduced, microprocessor based product.
- 2004 — MIFARE DESFire SAM introduced, secure infrastructure counterpart of MIFARE DESFire.
- 2006 — MIFARE DESFire EV1 is announced as the first product to support AES128
- 2008 — MIFARE Plus is announced as a drop-in replacement for MIFARE Classic based on AES128
Mifare was developed by Mikron; the name stands for MIkron FARE-collection System. It was acquired by Philips in 1998. Mikron licensed the Mifare technology to Atmel in the US, Philips in the Netherlands, and Siemens in Germany.
After the Philips acquisition, Hitachi contracted Mifare license with Philips which was introduced for the development of the contactless smartcard solution for NTT IC telephone card which started in 1999 and finished in 2006. In the NTT contactless IC telephone card project, 3 parties joined. They are Tokin-Tamura-Siemens, Hitachi-(Philips-contract for technical support), Denso-(Motorola-only production). NTT asked for 2 versions of chip, i.e. wired-logic chip (like Mifare classic) with small memory and big memory capacitance. Hitachi developed only big memory version and cut part of the memory to fit for the small memory version. Siemens developed only wired-logic chip based on their Mifare technology with some modification. Motorola tried to develop Mifare-like chip for wired-logic version but finally gave up. The project expected 1 million cards per month for start, but fell to 0.1 million per month just before they gave up the project.
[edit] Security
A presentation by Henryk Plötz and Karsten Nohl at the Chaos Communication Congress in December 2007 described a partial reverse-engineering of the algorithm used in the Mifare Classic chip, and potentially revealed some insecurities in the Mifare Classic security model, with a full paper detailing the cipher used and its weaknesses being promised during 2008. Abstract and slides here, video here. See also the external links, below. Cards other than Mifare Classic are NOT affected.
In March 2008 the Digital Security research group of the Radboud University Nijmegen made public that it was able to clone and manipulate the contents of a Mifare Classic card. Description and video of the attack here. In response it was stated by the Dutch Minister of Home Affairs and Kingdom Relations that they will investigate whether the introduction of the Dutch Rijkspas can be brought forward from Q4 of 2008. link (Dutch).
[edit] Considerations for System Integration
The security of, e.g., public transport systems against fraud relies on many components, of which the MIFARE card is just one. Typically, to minimize costs, system integrators will chose a relatively cheap card such as MIFARE Standard and concentrate the security efforts in the back office. Additional encryption on the card, transaction counters, and other methods known in cryptography are then required to make cloned cards useless, or at least to enable the back office to detect fraud should a card be compromised, and put it on a blacklist. Systems that work with online readers only (i.e., readers with a permanent link to the back office) are easier to protect than systems that have offline readers as well, for which real-time checks are not possible and blacklists cannot be updated as frequently.
[edit] See also
- RFID
- Touch 'n Go - uses MIFARE technology.
- Upass, T-money - first Mifare-based system.
- Mybi also uses Mifare technology.
- Oyster card - uses MIFARE technology.
- Smartrider (Australia) - uses MIFARE technology
- Mifare4mobile- MIFARE in the NFC mobile services context
- OV-Chipkaart (Dutch) - uses MIFARE technology.
[edit] External links
- MIFARE official website.
- Philips MIFARE page including success stories and articles.
- 24C3 Talk about Mifare Classic Video of the 24C3 Talk presenting the results of reverse engineering the Mifare Classic family, raising serious security concerns
- Presentation of 24th Chaos Computer Congress in Berlin Claiming that the mifare classic chip is possibly not safe
- Demonstration of an actual attack on MIFARE Classic (a building access control system) by the Radboud University Nijmegen.