Vulnerability assessment on UiTM student ID card / Muhamad Hazha Hashim
The Mifare Classic is the most widely used contactless smart card in the world. Its communication protocol is based on the open ISO-14443-A standard, but the authentication and encryption protocols are proprietary. Several researchers have cracked its encryption and proposed attacks to recover the a...
Saved in:
| Main Author: | |
|---|---|
| Format: | Thesis |
| Language: | en |
| Published: |
2014
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/107805/1/107805.pdf https://ir.uitm.edu.my/id/eprint/107805/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The Mifare Classic is the most widely used contactless smart card in the world. Its communication protocol is based on the open ISO-14443-A standard, but the authentication and encryption protocols are proprietary. Several researchers have cracked its encryption and proposed attacks to recover the access keys. This paper will examine the MIFARE Classic 1K contactless card that being used as the student ID card in University Technology MARA (UiTM). In doing so, we have identified its major weakness and have recommended ways to mitigate it. |
|---|
