February 2008 the Dutch government issued a warning that the widely used Mifare RFID products, which ensure the existence of a high security key risks. This warning is declared an expert in two martial arts break the encryption of the Mifare Classic algorithm immediately after release. The two scholars, one is German Henryk Plotz, the other is in the University of Virginia PhD Karsten Nohl, they showed crack MifareClassic means. Nohl Crypto-1 in an encryption algorithm for the analysis of the article claimed that use of ordinary computer within minutes to be able to crack the Mifare Classic's key. Hackers Huashan Mountain in the 24th Chaos Communications Congress on the General Assembly, which two brothers introduced Mifare Classic's encryption mechanism,
devils wear prada, and for the first time publicly announced the break for the Crypto-1 analysis, but also said it would remain committed to intensive research in this area ,
christian louboutin pumps, during which won the praise of many hackers, the participants, cheering applause continued.
in the process of crack MifareClassic Nohl and Plotz reverse engineering method is selected, this method is very popular in our country. Designed the so-called domestic MifareClassic compatible products, most of them made out in this way (not quite sure the original copy internally when these companies do is pay attention Nolh and Plotz discovered security risks.)
They use microscopes to MifareClassic chips were careful look like a drill, and then attached to RFID readers, each chip has been MifareClassic wiring diagram. Ten thousand to analyze the chip logic elements, namely logic and doors, or doors and triggers. Course of the 1 million to a logic gate is not a simple matter, but fortunately (for MifareClassic manufacturers in terms of course it is unfortunate), even from those who found the laws of logic gates, which greatly simplifies the analysis process.
next step is to find the key to the encryption processing section which, it is certainly a great contribution trouble. But hard work pays off eventually get their own information to reconstruct the data, they are in the process a detailed analysis of the function of each unit module, after some hard labor, they found a number of security risks MifareClassic chip. One of them is they have mastered a 16-bit random number generator principle, always possible to correctly predict the value of the next random number.
attackers in general do not have to do as they carried out two detailed studies, recently published in the Nohl Crypto-1 encryption algorithm on the paper, open the MifareClassic encryption algorithm is the core of a 48-bit linear feedback shift register, the use of ordinary computers through the card reader to send dozens of random numbers, we can guess what the key cards.
This is true for the master of the domestic in some areas,
dr dre monster beats studio, causing traffic card was also used to crack, was privately recharge issues. In fact, for those who break the system is more than the card itself, so it will not result in other regions and the threats and damage to other systems, but Nohl and Plotz made these two very different masters, they can almost make MifareClassic in the overnight Inter was eliminated from this earth.
course, NXP has in efforts to promote a new generation of RFID products Mifare Desfire, allegedly Classic this Desfire products than products using the more secure the encryption mechanism.
algorithm for non-contact IC card has been cracked.
your ID card,
access cards,
jimmy choo wedding shoes,
parking card,
around as long as you have from others,
people to to get your card information and a copy out to.