Cryptography Reference
In-Depth Information
A Authentication Protocols
This appendix provides the commands and the exact binary format for the au-
thentication protocols used in this paper. Note that for DESFire (EV1), the
message format according to ISO 14443A part 4 (including the 16-bit CRC) is
taken into account in the following.
A.1 Mifare Classic Authentication Protocol
Table 3.
Authentication protocol between a reader R and a Mifare Classic card C
# Direction Protocol Message
Explanation
1R
→
C
60, sector (1 byte), CRC1 CRC2 (2 byte)
Auth
||
sector
||
CRC
2C
→
R
4 byte
n
C
3R
→
C
4 byte, 4 byte
n
R
⊕
ks
1
||
a
R
⊕
ks
2
4C
→
R
4 byte
a
C
⊕
ks
3
A.2 Mifare DESFire Authentication Protocol
Table 4.
Authentication protocol between a reader R and a Mifare DESFire card C
# Direction Protocol Message
Explanation
1R
→
C
02 0A, key (1 byte), CRC1 CRC2
Auth || key number || CRC
2C
→
R
02 AF, 8 byte, CRC1 CRC2
Card nonce ||
b
0
|| CRC
3R
→
C
03 AF, 8 byte, 8 byte, CRC1 CRC2
Reader response ||
b
1
||
b
2
||
CRC
4C
→
R
03 00, 8 byte, CRC1 CRC2
Success ||
b
3
|| CRC
A.3 Mifare DESFire EV1 Authentication Protocol
Table 5.
Authentication protocol between a reader R and a Mifare DESFire EV1
card C
# Direction Protocol Message
Explanation
1R
→
C
02 AA, key (1 byte), CRC1 CRC2
Auth || key number || CRC
2C
→
R
02 AF, 16 byte, CRC1 CRC2
Card nonce ||
b
0
|| CRC
3R
→
C
03 AF, 16 byte, 16 byte, CRC1 CRC2
Reader response ||
b
1
||
b
2
|| CRC
4C
→
R
03 00, 16 byte, CRC1 CRC2
Success ||
b
3
|| CRC
Search WWH ::
Custom Search