1. Reverse Engineering of Authentication Protocol in DesFire.
- Author
-
Labafniya, Mansoureh, Yusefi, Hamed, and Khalesi, Akram
- Subjects
REVERSE engineering ,SOFTWARE architecture ,KEY agreement protocols (Computer network protocols) ,DESIGN software ,SMART cards ,MANUFACTURING industries - Abstract
Nowadays, contactless intelligent cards are extensively used in applications that need strong authentication and security feature protection. Among different cards from different companies, MIFARE DESFire cards are one of the most used cases. The hardware and software design and implementation details of MIFARE DESFire cards are kept secret by their manufacturer. One of the essential functions is authentication which usually its procedure is secret in cards. MIFARE DESFire EV3 is the fourth generation of MIFARE DESFire products which supports integrity and confidential, protected communication. DESFire EV3 is the latest addition to the MIFARE DESFire family of intelligent card chipsets from NXP. This type of card is compatible with MIFARE DESFire D40, EV1, and EV2. The details of the authentication protocols in the MIFARE DESFire EV3 cards with three different secure messaging protocols are introduced in this paper. We use ProxMarak4 to obtain the details of the authentication protocol of the DESFire cards as readers and a custom special-purpose board as a card. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF