Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Mifare Classic widely used as a public transport card based on the weak cipher Crypto-1 broken three years ago with a number of serious attacks published by researchers from the Dutch University of Nijmegen and still another was developed at University College of London. The report entitled Cloning Reactivation published in the Polish Computerworld magazine presented the security of Warsaw City Card at that time. It also announced that starting from 2010 the security of the Warsaw system would undergo an upgrade with the usage of 3DES algorithm. While in London all new Oyster cards emitted since 2010 are more secureDesFire cards, the security of the Warsaw card stays nearly the same.
Słowa kluczowe
Wydawca
Rocznik
Tom
Strony
129--139
Opis fizyczny
Bibliogr. 7 poz., rys., tab.
Twórcy
Bibliografia
- [1] MF1ICS50 functional specification, January 2008.
- [2] ISO/IEC 14443. Identification cards - Contactless integrated circuit(s).
- [3] http://www.computerworld.pl/artykuly/346011/Klonowanie.reaktywacja.html.
- [4] Curtois N., The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime, In SECRYPT 2009 proceedings, International Conference on Security and Cryptography, Milan, Italy, 7-10 July 2009.
- [5] Garcia F. D., van Rossum P., Verdult R., Wichers Schreur R. (2009). Wirelessly Pickpocketing a Mifare Classic Card. In Oakland IEEE Symposium on Security and Privacy.
- [6] Wee Hon Tan, Practical Attacks on the MIFARE Classic, Imperial College London, September 2009
- [7] MFCUK MiFare Classic Universal toolKit - Dark Side attack implementation. http://code.google.com/p/mfcuk/source/checkout.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-463f0ba7-6812-480f-924c-7771a7b773cf