[MLUG] Practical Attack on the MIFARE Classic.
Jeremy
me at jeremychapman.info
Tue Dec 2 19:47:30 EST 2008
Andy Pintar wrote:
> I thought the cards used to ride the london tube for free were the
> unecrypted single use mifare light or some such cards (no encryption)? And
> that since then they have fixed that problem?
>
> I'm not too sure about building access, but I'm specifically interested in
> cloning of the MIFARE Classic cards, is this currently feasible? Are
> people doing it?
> So far I can just find tech-news wishy-washy articles that don't hold any
> value for me. There was some talk earlier about cloning the STM cards and
> I was just curious if this has been accomplished. As far as I can see
> this is not possible, but does anyone else know for sure otherwise?
>
> On Tue, 2 Dec 2008, Jeremy wrote:
>
>> Lots more stuff just by googling mifare clone or similar keywords.
>> Apparently, according to first link, Dutch hackers already demo'd the hack.
>>
>> Jeremy
Have you seen http://www.youtube.com/watch?v=NW3RGbQTLhE and
http://www.ru.nl/ds/research/rfid/. Looks do-able to me. The unencrypted
cards were the single use cards, not the passes as far as I know, and
the dutch guys did it on another system, but definitely with mifare
classic cards.
"On March 7, 2008, research by the Digital Security group has revealed a
security vulnerability in Mifare Classic RFID chips, the most commonly
used type of RFID chip worldwide, that affects many applications using
Mifare Classic. We have demonstrated that the proprietary CRYPTO1
encryption algorithm used on these cards allows the (48 bit)
cryptographic keys to be relatively easily retrieved."
Jeremy
PS: this is offlisted...
More information about the mlug
mailing list