[120949] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

New results against the Mifare cipher

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Fri Apr 18 16:51:33 2008

From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: cryptography@metzdowd.com
Date: Thu, 17 Apr 2008 20:21:28 +1200

  http://eprint.iacr.org/2008/166

  Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster
  Cards

  Nicolas T. Courtois and Karsten Nohl and Sean O'Neil

  MiFare Crypto 1 is a lightweight stream cipher used in London's Oyster card,
  Netherland's OV-Chipcard, US Boston's CharlieCard, and in numerous wireless
  access control and ticketing systems worldwide. Recently, researchers have
  been able to recover this algorithm by reverse engineering.

  We have examined MiFare from the point of view of the so called "algebraic
  attacks". We can recover the full 48-bit key of MiFare algorithm in 200
  seconds on a PC, given 1 known IV (from one single encryption).

  The security of this cipher is therefore close to zero. This is particularly
  shocking, given the fact that, according to the Dutch press, 1 billion of
  MiFare Classic chips are used worldwide, including in many governmental
  security systems.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post