Share this story
Close X
Switch to Desktop Site

Another RFID smart card vulnerability exposed


(Read caption) The MBTA's CharlieCard relies on NXP Semiconductor's Mifare Classic smart card protocol. A Dutch group of researchers claims to have cracked the cryptographic cypher behind the system.

About these ads

Just two months after a judge barred a group of MIT students from disclosing vulnerabilities discovered in Boston's CharlieCard fare collection system, another group, this time from the Netherlands, has published instructions for cracking the cryptographic cypher used to secure the world's most popular transit system smart card.

The Dutch team of researchers presented the results [PDF] of their experiments with NXP Semiconductor's Mifare Classic card at the Esorics security conference Monday in Malaga, Spain. As a Dutch affiliate of Infoworld reports, the team created a device to analyze the communication between the Mifare card and a reader. They then identified partial strings of the code given off by the reader as part of its digital handshake with the card, opening the door to cracking the cypher. It all sounds like something from the current season of Prison Break[Hulu], if you ask me.


Page:   1   |   2

Follow Stories Like This
Get the Monitor stories you care about delivered to your inbox.