Cryptography Reference
In-Depth Information
A Authentication Protocols
This appendix provides the commands and the exact binary format for the au-
thentication protocols used in this paper. Note that for DESFire (EV1), the
message format according to ISO 14443A part 4 (including the 16-bit CRC) is
taken into account in the following.
A.1 Mifare Classic Authentication Protocol
Table 3. Authentication protocol between a reader R and a Mifare Classic card C
# Direction Protocol Message
Explanation
1R C
60, sector (1 byte), CRC1 CRC2 (2 byte) Auth
||
sector
||
CRC
2C R
4 byte
n C
3R C
4 byte, 4 byte
n R ks 1
|| a R ks 2
4C R
4 byte
a C ks 3
A.2 Mifare DESFire Authentication Protocol
Table 4. Authentication protocol between a reader R and a Mifare DESFire card C
# Direction Protocol Message
Explanation
1R C
02 0A, key (1 byte), CRC1 CRC2
Auth || key number || CRC
2C R
02 AF, 8 byte, CRC1 CRC2
Card nonce || b 0
|| CRC
3R C
03 AF, 8 byte, 8 byte, CRC1 CRC2 Reader response ||
b 1
||
b 2
||
CRC
4C R
03 00, 8 byte, CRC1 CRC2
Success || b 3
|| CRC
A.3 Mifare DESFire EV1 Authentication Protocol
Table 5. Authentication protocol between a reader R and a Mifare DESFire EV1
card C
# Direction Protocol Message
Explanation
1R C
02 AA, key (1 byte), CRC1 CRC2
Auth || key number || CRC
2C R
02 AF, 16 byte, CRC1 CRC2
Card nonce || b 0
|| CRC
3R
C
03 AF, 16 byte, 16 byte, CRC1 CRC2 Reader response ||
b 1
||
b 2
|| CRC
4C R
03 00, 16 byte, CRC1 CRC2
Success || b 3
|| CRC
Search WWH ::




Custom Search