security department of the Radboud University Nijmegen (RUN) in the
Netherlands have discovered what they term a “serious flaw” in the
Mifare Classic contactless smartcard.
Mifare Classic’s developer, Nether-lands-based NXP Semiconductors,
which sought but failed to obtain court intervention to prevent the
researchers from making a full public disclosure of their
findings.
March this year and followed a similar claim made by German
researchers Karsten Nohl en Henryk Plötz in December 2007.
well-founded, security of the world’s most popular radio frequency
identification smartcard would be called into serious
question.
Classic contactless smartcard commands a 70 percent global market
share, according to NXP.
has been particularly successful in public transport where it
accounts for 80 percent of all electronic tickets. Major
contactless payments transport projects that have deployed the card
include those in London (Oyster), Netherlands (OV-chipkaart),
Boston (Charlie Card) and Beijing (One Card).
department, researchers they found weaknesses in the authentication
mechanism of the Mifare Classic.
reconstruct the card’s CRYPTO1 encryption algorithm “in detail” and
discovered “a relatively easy method to retrieve cryptographic
keys, which does not rely on expensive equipment”.
succeeded on mounting an actual attack, in which a Mifare Classic
access control card was successfully cloned,” they added.
level there are currently no known countermeasures. Though
shielding cards when they are not in use in, for example, reduces
risk of an attacker secretly reading from a card, when the card is
being used it is still possible to eavesdrop on the communication
with a hidden antenna near the access point, the researchers
stressed.