Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/58959
Title: Security analysis of contactless cards
Authors: Loh, Sheng Long
Keywords: DRNTU::Engineering::Computer science and engineering::Hardware::Input/output and data communications
Issue Date: 2014
Abstract: The MIFARE Classic is the most widely used contactless smart card chip in the world. Its design and implementation details are kept secret by its manufacturer but several academic researchers have already cracked the encryption. Arduino is a programmable single-board microcontroller. It has gained popularity among the DIY community in the recent years. Any hobbyist is able to purchase one because it is readily available, relatively inexpensive, easy to develop and simple to setup. This project aims to study the architecture of MIFARE Classis, understand the weaknesses in its security and investigate the feasibility of exploiting those vulnerabilities using a DIY Arduino project setup. I will illustrate how the MIFARE Classic operates as a contactless smart card as well as the cryptosystem employs by MIFARE Classic. I will also break down the architecture of MIFARE Classic to explain its weaknesses. Last but not least, I will justify why it is not feasible to mount a cryptographic attack with just a simple DIY Arduino setup.
URI: http://hdl.handle.net/10356/58959
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
Final Report.docx
  Restricted Access
2.95 MBMicrosoft WordView/Open

Page view(s) 50

241
checked on Oct 26, 2020

Download(s) 50

59
checked on Oct 26, 2020

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.