|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Cloning MiFare Classic rail and building passes, anywhere, anytime
If you have a question about this talk, please contact Joseph Bonneau.
MiFare Classic is the most popular contactless smart card with some 200 millions copies in circulation world- wide. At Esorics 2008 Dutch researchers showed that the underlying cipher Crypto-1 can be cracked in as little as 0.1 seconds if the attacker can eavesdrop the RF communications with the (genuine) reader. We discovered that a MiFare classic card can be cloned in a much more practical card-only scenario, where the attacker only needs to be in the proximity of the card for a number of minutes, therefore making usurpation of identity through pass cloning feasible at any moment and under any circumstances. For example, anybody sitting next to the victim on a train or on a plane is now be able to clone his/her pass. Other researchers have also (independently from us) discovered this vulnerability (Garcia et al., 2009) however our attack is different and does not require any precomputation. In addition, we discovered that a yet unknown proportion of MiFare Classic cards are even weaker, and we have in our possession a MiFare Classic card from a large Eastern-European city that can be cloned in seconds.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsspeech synthesis seminar series Cambridge Canadian Club Events Pathology Seminars
Other talksThe ubiquitin pathway in host-parasite interactions Mining the Social Web: A series of statistical NLP case studies "Academic track in Medicine" Plenary Lecture 17: tba Being the change: the Aam Aadmi Party and the politics of curative democracy Pompeii and Herculaneum: does the past have a future?