SlideShare una empresa de Scribd logo
1 de 17
Mifare Has 2 type Technology :

• Mifare Sector/Block Card (Classic Mifare)

• Mifare Desfire (File System, More secured, fast & reliable) with Crypto



     • DES (Data Encryption Standard )
     • What is Crypto in Desfire Cards
The DESFire® platform is a memory technology like the Mifare Classic, but with
enhanced file handling and security features.
DESFire ® Platform Differences

                               MF3IC40     MF3IC21–EV1 MF3IC41-EV1 MF3 IC D80
Memory Size                       4k            2k             4k            8k
Internal Use                                                             256 bytes
Free Space                    4096 bytes    2272 bytes    4832 bytes     7936 bytes
Max. Applications                 28            28             28            28
Max. Files per Application        16            32             32            32
Crypto                        DES, TDES      DES, TDES     DES, TDES     DES, TDES
Life                           10 Years       10 years      10 Years      10 years
DESFire® AIDs
DESFire® allows up to 32 applications on a card. Every application has a three byte
Application Identifier (AID) by means of which it can be found and selected.
Cryptographic Security Implementation
• Authenticity
   – implementation using challenge - response
• Confidentiality
   – implementation using data encryption
• Integrity
   – implementation using message signature
• Non-repudiation
   – implementation using message signature
DES - Data Encryption Standard
• symmetrical key algorithm
• manipulate data in 8 bytes block
• only known attack is exhaustive key search,
  2 to the power of 56 computations
• 2 million years for today’s PC @1ms per
  computation or a few hours with special
  designed hardware, parallel processing
• security can be increased using triple DES
Symmetrical Algorithm
• Symmetrical e.g. DES (or triple DES)
   – good for many-to-one and one-to-one security for e.g.
     bank customers , Personal Identification &
     Verification
   – simple key management (Public & Private)
   – Cannot achieve non-repudiation
DES    plain text, P


                               DES
                                               Z=DES(K,P)

know K, P, can find Z easily
know K,Z, can find P easily
know P,Z, impossible to find
                                      key, K
K except exhaustive search


                                                    -1
        ciphered text,Z                        P=DES(K,Z)

                                     -1
                               DES
DES / Triple DES
 Single DES uses single length key (8 bytes), K(8)
 3DES uses double length key (16 bytes), K(16) = KL(8)
  | KR(8) or KA(8) | KB(8)
 If the left and right part are the same, 3DES reduces
  to single DES
 Allows smooth migration from single DES to 3DES
 Least significant bit of each byte not used
Triple DES
   3-DES Encryption              3-DES Decryption

                 Plain   Text                       Cipher   Text


     Left Key         DES              Left Key        DES-1

    Right key       DES-1              Right key        DES

     Left Key         DES              Left Key        DES-1

                 Ciphered Text                        Plain Text


   Z=3DES(K,P)                   P=3DES-1 (K,Z)
MAC - Message Authentication Code Single DES

                    message

  I.V.       xor    xor             xor

         key
             DES   DES             DES
          K


         mac=MAC(Kmac,message)
MAC - Message Authentication Code Triple DES
                      message

  I.V.         xor    xor                xor

         key
               DES   DES               DES
          K
                                               -1
                                       DES
                                       DES
         mac=3MAC(Kmac,message)
Hash
a cryptographic function
takes a variable length message
returns a fixed length hash value
also known as a Message Digest function
examples MD5(128 bits), SHA(160 bits)
analogous to a message finger print
no key is involved
usage - signature on message’s hash is as good as
 signature on the message
Public Key Algorithm

each party gets a public key and a private (secret)
 key which is unique
public key is published (free read access)
private key is secret (known only to the party)
public key is certified by a key certification body -
 key certificate
the public key of the certification body is public
 read access
Encryption   Using Public Key Algorithm
 Check receiver public key certificate with CA public key
 Check public key revocation list
 Generate random 3DES key
 Encrypt message using 3DES
 Encrypt 3DES Key using other party public key
 Append encrypted 3DES key with encrypted message

Decryption   Using Public Key Algorithm
 Decrypt 3DES key using the private key
 Use decrypted 3DES key to decrypt the message
Decryption Using Public Key Algorithm
 Decrypt 3DES key using the private key
 Use decrypted 3DES key to decrypt the message
Application
•   Advanced public transportation
•   High secure access control
•   Event ticketing
•   E-Government
•   Identity Verification without Central connectivity
•   E-Purse ( Canteen, Laundry & any payment)

Available file types
The files within an application can be any of the following types:

• Standard data files
• Backup data files
• Value files with backup
• Linear record files with backup
• Cyclic record files with backup
Q&A


THANKS
 Zahir B. Malik

Más contenido relacionado

La actualidad más candente

Presentation: the domain name system
Presentation: the domain name systemPresentation: the domain name system
Presentation: the domain name systemwebhostingguy
 
ADSL Presentation
ADSL PresentationADSL Presentation
ADSL Presentationsarojsaroza
 
Bastion Host : Amazon Web Services
Bastion Host : Amazon Web ServicesBastion Host : Amazon Web Services
Bastion Host : Amazon Web ServicesAkhilesh Joshi
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market OverviewOkta-Inc
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesMukesh Chinta
 

La actualidad más candente (9)

Azure-AD.pptx
Azure-AD.pptxAzure-AD.pptx
Azure-AD.pptx
 
Presentation: the domain name system
Presentation: the domain name systemPresentation: the domain name system
Presentation: the domain name system
 
Private Branch Exchange
Private Branch ExchangePrivate Branch Exchange
Private Branch Exchange
 
ADSL Presentation
ADSL PresentationADSL Presentation
ADSL Presentation
 
Bastion Host : Amazon Web Services
Bastion Host : Amazon Web ServicesBastion Host : Amazon Web Services
Bastion Host : Amazon Web Services
 
Modem presentation
Modem presentationModem presentation
Modem presentation
 
Wimax
WimaxWimax
Wimax
 
Company and Market Overview
Company and Market OverviewCompany and Market Overview
Company and Market Overview
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 

Destacado

OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)Tech4 Helper
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFIDDevnology
 
ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
Pine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - NovaPine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - Novasingularityin
 
UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-Natsuhiko Suwamura
 
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection SystemsGuessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection SystemsPositive Hack Days
 
Making NFC Boring to Make it Interesting
Making NFC Boring to Make it InterestingMaking NFC Boring to Make it Interesting
Making NFC Boring to Make it InterestingMobileMonday Beijing
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentEd Pimentel
 
동아시아 문자 처리
동아시아 문자 처리동아시아 문자 처리
동아시아 문자 처리DaeHyun Sung
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation ppriteshs
 
Dive into OpenSource
Dive into OpenSourceDive into OpenSource
Dive into OpenSourceHyun-woo Park
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICSkajal
 
Java ME Networking & Connectivity
Java ME Networking & ConnectivityJava ME Networking & Connectivity
Java ME Networking & ConnectivityStefano Sanna
 
Near field communication
Near field communicationNear field communication
Near field communicationdevilgrude
 

Destacado (20)

OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)
 
Mifare classic-slides
Mifare classic-slidesMifare classic-slides
Mifare classic-slides
 
Mifare cards
Mifare cardsMifare cards
Mifare cards
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.
 
Pine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - NovaPine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - Nova
 
NFC attacks
NFC attacksNFC attacks
NFC attacks
 
UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-
 
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection SystemsGuessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
 
Making NFC Boring to Make it Interesting
Making NFC Boring to Make it InterestingMaking NFC Boring to Make it Interesting
Making NFC Boring to Make it Interesting
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode Payment
 
Mobilemondaybeijing 35
Mobilemondaybeijing 35Mobilemondaybeijing 35
Mobilemondaybeijing 35
 
동아시아 문자 처리
동아시아 문자 처리동아시아 문자 처리
동아시아 문자 처리
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Dive into OpenSource
Dive into OpenSourceDive into OpenSource
Dive into OpenSource
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Java ME Networking & Connectivity
Java ME Networking & ConnectivityJava ME Networking & Connectivity
Java ME Networking & Connectivity
 
Near field communication
Near field communicationNear field communication
Near field communication
 

Similar a Mifare Desfire Technology

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityNagendra Um
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfDhamuKing1
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoHarry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoJames Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoYoung Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoDavid Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoTony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoLuis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_cryptoFraboni Ec
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptxKannanN45
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Intro computeRRR
Intro computeRRRIntro computeRRR
Intro computeRRRGHOTRAANGEL
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
 

Similar a Mifare Desfire Technology (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
3 des
3 des3 des
3 des
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Intro compute
Intro computeIntro compute
Intro compute
 
Intro computeRRR
Intro computeRRRIntro computeRRR
Intro computeRRR
 
Intro compute
Intro computeIntro compute
Intro compute
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 

Mifare Desfire Technology

  • 1.
  • 2. Mifare Has 2 type Technology : • Mifare Sector/Block Card (Classic Mifare) • Mifare Desfire (File System, More secured, fast & reliable) with Crypto • DES (Data Encryption Standard ) • What is Crypto in Desfire Cards
  • 3. The DESFire® platform is a memory technology like the Mifare Classic, but with enhanced file handling and security features. DESFire ® Platform Differences MF3IC40 MF3IC21–EV1 MF3IC41-EV1 MF3 IC D80 Memory Size 4k 2k 4k 8k Internal Use 256 bytes Free Space 4096 bytes 2272 bytes 4832 bytes 7936 bytes Max. Applications 28 28 28 28 Max. Files per Application 16 32 32 32 Crypto DES, TDES DES, TDES DES, TDES DES, TDES Life 10 Years 10 years 10 Years 10 years DESFire® AIDs DESFire® allows up to 32 applications on a card. Every application has a three byte Application Identifier (AID) by means of which it can be found and selected.
  • 4. Cryptographic Security Implementation • Authenticity – implementation using challenge - response • Confidentiality – implementation using data encryption • Integrity – implementation using message signature • Non-repudiation – implementation using message signature
  • 5. DES - Data Encryption Standard • symmetrical key algorithm • manipulate data in 8 bytes block • only known attack is exhaustive key search, 2 to the power of 56 computations • 2 million years for today’s PC @1ms per computation or a few hours with special designed hardware, parallel processing • security can be increased using triple DES
  • 6. Symmetrical Algorithm • Symmetrical e.g. DES (or triple DES) – good for many-to-one and one-to-one security for e.g. bank customers , Personal Identification & Verification – simple key management (Public & Private) – Cannot achieve non-repudiation
  • 7. DES plain text, P DES Z=DES(K,P) know K, P, can find Z easily know K,Z, can find P easily know P,Z, impossible to find key, K K except exhaustive search -1 ciphered text,Z P=DES(K,Z) -1 DES
  • 8. DES / Triple DES  Single DES uses single length key (8 bytes), K(8)  3DES uses double length key (16 bytes), K(16) = KL(8) | KR(8) or KA(8) | KB(8)  If the left and right part are the same, 3DES reduces to single DES  Allows smooth migration from single DES to 3DES  Least significant bit of each byte not used
  • 9. Triple DES 3-DES Encryption 3-DES Decryption Plain Text Cipher Text Left Key DES Left Key DES-1 Right key DES-1 Right key DES Left Key DES Left Key DES-1 Ciphered Text Plain Text Z=3DES(K,P) P=3DES-1 (K,Z)
  • 10. MAC - Message Authentication Code Single DES message I.V. xor xor xor key DES DES DES K mac=MAC(Kmac,message)
  • 11. MAC - Message Authentication Code Triple DES message I.V. xor xor xor key DES DES DES K -1 DES DES mac=3MAC(Kmac,message)
  • 12. Hash a cryptographic function takes a variable length message returns a fixed length hash value also known as a Message Digest function examples MD5(128 bits), SHA(160 bits) analogous to a message finger print no key is involved usage - signature on message’s hash is as good as signature on the message
  • 13. Public Key Algorithm each party gets a public key and a private (secret) key which is unique public key is published (free read access) private key is secret (known only to the party) public key is certified by a key certification body - key certificate the public key of the certification body is public read access
  • 14. Encryption Using Public Key Algorithm  Check receiver public key certificate with CA public key  Check public key revocation list  Generate random 3DES key  Encrypt message using 3DES  Encrypt 3DES Key using other party public key  Append encrypted 3DES key with encrypted message Decryption Using Public Key Algorithm  Decrypt 3DES key using the private key  Use decrypted 3DES key to decrypt the message
  • 15. Decryption Using Public Key Algorithm  Decrypt 3DES key using the private key  Use decrypted 3DES key to decrypt the message
  • 16. Application • Advanced public transportation • High secure access control • Event ticketing • E-Government • Identity Verification without Central connectivity • E-Purse ( Canteen, Laundry & any payment) Available file types The files within an application can be any of the following types: • Standard data files • Backup data files • Value files with backup • Linear record files with backup • Cyclic record files with backup