SlideShare a Scribd company logo
Mifare Has 2 type Technology :

• Mifare Sector/Block Card (Classic Mifare)

• Mifare Desfire (File System, More secured, fast & reliable) with Crypto



     • DES (Data Encryption Standard )
     • What is Crypto in Desfire Cards
The DESFire® platform is a memory technology like the Mifare Classic, but with
enhanced file handling and security features.
DESFire ® Platform Differences

                               MF3IC40     MF3IC21–EV1 MF3IC41-EV1 MF3 IC D80
Memory Size                       4k            2k             4k            8k
Internal Use                                                             256 bytes
Free Space                    4096 bytes    2272 bytes    4832 bytes     7936 bytes
Max. Applications                 28            28             28            28
Max. Files per Application        16            32             32            32
Crypto                        DES, TDES      DES, TDES     DES, TDES     DES, TDES
Life                           10 Years       10 years      10 Years      10 years
DESFire® AIDs
DESFire® allows up to 32 applications on a card. Every application has a three byte
Application Identifier (AID) by means of which it can be found and selected.
Cryptographic Security Implementation
• Authenticity
   – implementation using challenge - response
• Confidentiality
   – implementation using data encryption
• Integrity
   – implementation using message signature
• Non-repudiation
   – implementation using message signature
DES - Data Encryption Standard
• symmetrical key algorithm
• manipulate data in 8 bytes block
• only known attack is exhaustive key search,
  2 to the power of 56 computations
• 2 million years for today’s PC @1ms per
  computation or a few hours with special
  designed hardware, parallel processing
• security can be increased using triple DES
Symmetrical Algorithm
• Symmetrical e.g. DES (or triple DES)
   – good for many-to-one and one-to-one security for e.g.
     bank customers , Personal Identification &
     Verification
   – simple key management (Public & Private)
   – Cannot achieve non-repudiation
DES    plain text, P


                               DES
                                               Z=DES(K,P)

know K, P, can find Z easily
know K,Z, can find P easily
know P,Z, impossible to find
                                      key, K
K except exhaustive search


                                                    -1
        ciphered text,Z                        P=DES(K,Z)

                                     -1
                               DES
DES / Triple DES
 Single DES uses single length key (8 bytes), K(8)
 3DES uses double length key (16 bytes), K(16) = KL(8)
  | KR(8) or KA(8) | KB(8)
 If the left and right part are the same, 3DES reduces
  to single DES
 Allows smooth migration from single DES to 3DES
 Least significant bit of each byte not used
Triple DES
   3-DES Encryption              3-DES Decryption

                 Plain   Text                       Cipher   Text


     Left Key         DES              Left Key        DES-1

    Right key       DES-1              Right key        DES

     Left Key         DES              Left Key        DES-1

                 Ciphered Text                        Plain Text


   Z=3DES(K,P)                   P=3DES-1 (K,Z)
MAC - Message Authentication Code Single DES

                    message

  I.V.       xor    xor             xor

         key
             DES   DES             DES
          K


         mac=MAC(Kmac,message)
MAC - Message Authentication Code Triple DES
                      message

  I.V.         xor    xor                xor

         key
               DES   DES               DES
          K
                                               -1
                                       DES
                                       DES
         mac=3MAC(Kmac,message)
Hash
a cryptographic function
takes a variable length message
returns a fixed length hash value
also known as a Message Digest function
examples MD5(128 bits), SHA(160 bits)
analogous to a message finger print
no key is involved
usage - signature on message’s hash is as good as
 signature on the message
Public Key Algorithm

each party gets a public key and a private (secret)
 key which is unique
public key is published (free read access)
private key is secret (known only to the party)
public key is certified by a key certification body -
 key certificate
the public key of the certification body is public
 read access
Encryption   Using Public Key Algorithm
 Check receiver public key certificate with CA public key
 Check public key revocation list
 Generate random 3DES key
 Encrypt message using 3DES
 Encrypt 3DES Key using other party public key
 Append encrypted 3DES key with encrypted message

Decryption   Using Public Key Algorithm
 Decrypt 3DES key using the private key
 Use decrypted 3DES key to decrypt the message
Decryption Using Public Key Algorithm
 Decrypt 3DES key using the private key
 Use decrypted 3DES key to decrypt the message
Application
•   Advanced public transportation
•   High secure access control
•   Event ticketing
•   E-Government
•   Identity Verification without Central connectivity
•   E-Purse ( Canteen, Laundry & any payment)

Available file types
The files within an application can be any of the following types:

• Standard data files
• Backup data files
• Value files with backup
• Linear record files with backup
• Cyclic record files with backup
Q&A


THANKS
 Zahir B. Malik

More Related Content

What's hot

Building finishes
Building finishesBuilding finishes
Building finishes
kuntansourav
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
Aalap Tripathy
 
Prefabrication system
Prefabrication systemPrefabrication system
Prefabrication system
Arun Arun
 
Damp proofing ppt
Damp proofing pptDamp proofing ppt
Damp proofing ppt
Ghulam Mehdi Sahito
 
Construction of PCC Parapet
Construction of PCC Parapet Construction of PCC Parapet
Construction of PCC Parapet
Himanshu Chakravarti
 
Space Frame
Space FrameSpace Frame
Space Frame
winner
 
fibre cement cladding
fibre cement claddingfibre cement cladding
fibre cement cladding
Rajesh Kolli
 
Routing basics/CEF
Routing basics/CEFRouting basics/CEF
Routing basics/CEF
Dmitry Figol
 
Vertical Circulation and Services of Highrise
Vertical Circulation and Services of HighriseVertical Circulation and Services of Highrise
Vertical Circulation and Services of Highrise
Hajee Mohammad Danesh Science & Technology University, Dinajpur
 
Pile foundations
Pile foundationsPile foundations
Pile foundations
Sameer Thaiyam
 
Slabs and types
Slabs and typesSlabs and types
Slabs and types
Surhan Fatima
 
High rise building construction
High rise building constructionHigh rise building construction
High rise building construction
Construction Tech. and Mgmt., VNIT Nagpur
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networking
Sreenatha Reddy K R
 
BASIC CIVIL ENGINEERING
BASIC CIVIL ENGINEERINGBASIC CIVIL ENGINEERING
BASIC CIVIL ENGINEERING
Er. SANTOSH PATASKAR (PATWA JI)
 
Precast concrete - drywall
Precast  concrete - drywallPrecast  concrete - drywall
Precast concrete - drywall
Denis Patel
 
Building Acoustics
Building AcousticsBuilding Acoustics
Building Acoustics
Aroh Thombre
 
Timber
TimberTimber
TALL BUILDINGS
TALL BUILDINGSTALL BUILDINGS
TALL BUILDINGS
Abhijit Pal
 

What's hot (20)

Building finishes
Building finishesBuilding finishes
Building finishes
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
Prefabrication system
Prefabrication systemPrefabrication system
Prefabrication system
 
Damp proofing ppt
Damp proofing pptDamp proofing ppt
Damp proofing ppt
 
Construction of PCC Parapet
Construction of PCC Parapet Construction of PCC Parapet
Construction of PCC Parapet
 
Space Frame
Space FrameSpace Frame
Space Frame
 
fibre cement cladding
fibre cement claddingfibre cement cladding
fibre cement cladding
 
Shells
ShellsShells
Shells
 
OSI layer by cisco
OSI layer by ciscoOSI layer by cisco
OSI layer by cisco
 
Routing basics/CEF
Routing basics/CEFRouting basics/CEF
Routing basics/CEF
 
Vertical Circulation and Services of Highrise
Vertical Circulation and Services of HighriseVertical Circulation and Services of Highrise
Vertical Circulation and Services of Highrise
 
Pile foundations
Pile foundationsPile foundations
Pile foundations
 
Slabs and types
Slabs and typesSlabs and types
Slabs and types
 
High rise building construction
High rise building constructionHigh rise building construction
High rise building construction
 
Introduction to tcp ip linux networking
Introduction to tcp ip   linux networkingIntroduction to tcp ip   linux networking
Introduction to tcp ip linux networking
 
BASIC CIVIL ENGINEERING
BASIC CIVIL ENGINEERINGBASIC CIVIL ENGINEERING
BASIC CIVIL ENGINEERING
 
Precast concrete - drywall
Precast  concrete - drywallPrecast  concrete - drywall
Precast concrete - drywall
 
Building Acoustics
Building AcousticsBuilding Acoustics
Building Acoustics
 
Timber
TimberTimber
Timber
 
TALL BUILDINGS
TALL BUILDINGSTALL BUILDINGS
TALL BUILDINGS
 

Viewers also liked

OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)
Tech4 Helper
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
Devnology
 
ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.
Advanced Card Systems Ltd.
 
Pine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - NovaPine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - Nova
singularityin
 
UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-
Natsuhiko Suwamura
 
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection SystemsGuessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection SystemsPositive Hack Days
 
Making NFC Boring to Make it Interesting
Making NFC Boring to Make it InterestingMaking NFC Boring to Make it Interesting
Making NFC Boring to Make it Interesting
MobileMonday Beijing
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode Payment
Ed Pimentel
 
Mobilemondaybeijing 35
Mobilemondaybeijing 35Mobilemondaybeijing 35
Mobilemondaybeijing 35
MobileMonday Beijing
 
동아시아 문자 처리
동아시아 문자 처리동아시아 문자 처리
동아시아 문자 처리
DaeHyun Sung
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
ppriteshs
 
Dive into OpenSource
Dive into OpenSourceDive into OpenSource
Dive into OpenSource
Hyun-woo Park
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICSkajal
 
NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
Infineon Technologies AG
 
Java ME Networking & Connectivity
Java ME Networking & ConnectivityJava ME Networking & Connectivity
Java ME Networking & Connectivity
Stefano Sanna
 
Near field communication
Near field communicationNear field communication
Near field communicationdevilgrude
 

Viewers also liked (20)

OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)
 
Mifare classic-slides
Mifare classic-slidesMifare classic-slides
Mifare classic-slides
 
Mifare cards
Mifare cardsMifare cards
Mifare cards
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.ACR128 product presentation by Advanced Card Systems Ltd.
ACR128 product presentation by Advanced Card Systems Ltd.
 
Pine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - NovaPine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - Nova
 
NFC attacks
NFC attacksNFC attacks
NFC attacks
 
UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-UIDのことわかってますか? -フォーマット編-
UIDのことわかってますか? -フォーマット編-
 
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection SystemsGuessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems
 
Making NFC Boring to Make it Interesting
Making NFC Boring to Make it InterestingMaking NFC Boring to Make it Interesting
Making NFC Boring to Make it Interesting
 
mCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode PaymentmCommerce NFC Payments - QrCode Payment
mCommerce NFC Payments - QrCode Payment
 
Mobilemondaybeijing 35
Mobilemondaybeijing 35Mobilemondaybeijing 35
Mobilemondaybeijing 35
 
동아시아 문자 처리
동아시아 문자 처리동아시아 문자 처리
동아시아 문자 처리
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Dive into OpenSource
Dive into OpenSourceDive into OpenSource
Dive into OpenSource
 
SMART CARD BASICS
SMART CARD BASICSSMART CARD BASICS
SMART CARD BASICS
 
NFC Technology for Smart Wearables
NFC Technology for Smart WearablesNFC Technology for Smart Wearables
NFC Technology for Smart Wearables
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Java ME Networking & Connectivity
Java ME Networking & ConnectivityJava ME Networking & Connectivity
Java ME Networking & Connectivity
 
Near field communication
Near field communicationNear field communication
Near field communication
 

Similar to Mifare Desfire Technology

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
Nagendra Um
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
DhamuKing1
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
Hardik Manocha
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha
 
3 des
3 des3 des
3 des
3afrite
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Harry Potter
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
James Wong
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Young Alista
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
David Hoen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Tony Nguyen
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Luis Goldster
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
Fraboni Ec
 
Cryptography
CryptographyCryptography
CryptographyRohan04
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
KannanN45
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Intro compute
Intro computeIntro compute
Intro compute
Usman Shah
 
Intro compute
Intro computeIntro compute
Intro compute
GHOTRAANGEL
 
Intro computeRRR
Intro computeRRRIntro computeRRR
Intro computeRRR
GHOTRAANGEL
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret
 

Similar to Mifare Desfire Technology (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
3 des
3 des3 des
3 des
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 
Cryptography
CryptographyCryptography
Cryptography
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Intro compute
Intro computeIntro compute
Intro compute
 
Intro compute
Intro computeIntro compute
Intro compute
 
Intro computeRRR
Intro computeRRRIntro computeRRR
Intro computeRRR
 
Introduction To PKI Technology
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
 

Mifare Desfire Technology

  • 1.
  • 2. Mifare Has 2 type Technology : • Mifare Sector/Block Card (Classic Mifare) • Mifare Desfire (File System, More secured, fast & reliable) with Crypto • DES (Data Encryption Standard ) • What is Crypto in Desfire Cards
  • 3. The DESFire® platform is a memory technology like the Mifare Classic, but with enhanced file handling and security features. DESFire ® Platform Differences MF3IC40 MF3IC21–EV1 MF3IC41-EV1 MF3 IC D80 Memory Size 4k 2k 4k 8k Internal Use 256 bytes Free Space 4096 bytes 2272 bytes 4832 bytes 7936 bytes Max. Applications 28 28 28 28 Max. Files per Application 16 32 32 32 Crypto DES, TDES DES, TDES DES, TDES DES, TDES Life 10 Years 10 years 10 Years 10 years DESFire® AIDs DESFire® allows up to 32 applications on a card. Every application has a three byte Application Identifier (AID) by means of which it can be found and selected.
  • 4. Cryptographic Security Implementation • Authenticity – implementation using challenge - response • Confidentiality – implementation using data encryption • Integrity – implementation using message signature • Non-repudiation – implementation using message signature
  • 5. DES - Data Encryption Standard • symmetrical key algorithm • manipulate data in 8 bytes block • only known attack is exhaustive key search, 2 to the power of 56 computations • 2 million years for today’s PC @1ms per computation or a few hours with special designed hardware, parallel processing • security can be increased using triple DES
  • 6. Symmetrical Algorithm • Symmetrical e.g. DES (or triple DES) – good for many-to-one and one-to-one security for e.g. bank customers , Personal Identification & Verification – simple key management (Public & Private) – Cannot achieve non-repudiation
  • 7. DES plain text, P DES Z=DES(K,P) know K, P, can find Z easily know K,Z, can find P easily know P,Z, impossible to find key, K K except exhaustive search -1 ciphered text,Z P=DES(K,Z) -1 DES
  • 8. DES / Triple DES  Single DES uses single length key (8 bytes), K(8)  3DES uses double length key (16 bytes), K(16) = KL(8) | KR(8) or KA(8) | KB(8)  If the left and right part are the same, 3DES reduces to single DES  Allows smooth migration from single DES to 3DES  Least significant bit of each byte not used
  • 9. Triple DES 3-DES Encryption 3-DES Decryption Plain Text Cipher Text Left Key DES Left Key DES-1 Right key DES-1 Right key DES Left Key DES Left Key DES-1 Ciphered Text Plain Text Z=3DES(K,P) P=3DES-1 (K,Z)
  • 10. MAC - Message Authentication Code Single DES message I.V. xor xor xor key DES DES DES K mac=MAC(Kmac,message)
  • 11. MAC - Message Authentication Code Triple DES message I.V. xor xor xor key DES DES DES K -1 DES DES mac=3MAC(Kmac,message)
  • 12. Hash a cryptographic function takes a variable length message returns a fixed length hash value also known as a Message Digest function examples MD5(128 bits), SHA(160 bits) analogous to a message finger print no key is involved usage - signature on message’s hash is as good as signature on the message
  • 13. Public Key Algorithm each party gets a public key and a private (secret) key which is unique public key is published (free read access) private key is secret (known only to the party) public key is certified by a key certification body - key certificate the public key of the certification body is public read access
  • 14. Encryption Using Public Key Algorithm  Check receiver public key certificate with CA public key  Check public key revocation list  Generate random 3DES key  Encrypt message using 3DES  Encrypt 3DES Key using other party public key  Append encrypted 3DES key with encrypted message Decryption Using Public Key Algorithm  Decrypt 3DES key using the private key  Use decrypted 3DES key to decrypt the message
  • 15. Decryption Using Public Key Algorithm  Decrypt 3DES key using the private key  Use decrypted 3DES key to decrypt the message
  • 16. Application • Advanced public transportation • High secure access control • Event ticketing • E-Government • Identity Verification without Central connectivity • E-Purse ( Canteen, Laundry & any payment) Available file types The files within an application can be any of the following types: • Standard data files • Backup data files • Value files with backup • Linear record files with backup • Cyclic record files with backup