Fact-checked by Grok 2 weeks ago

MIFARE

MIFARE is a family of integrated circuits (ICs) developed by , operating at a of 13.56 MHz and compliant with ISO/IEC 14443 Type A standards for proximity cards. Introduced in 1994 by Semiconductors (now NXP), MIFARE revolutionized the contactless smart card industry by enabling secure, wireless data exchange for applications such as , public transportation ticketing, and micropayments. The MIFARE portfolio includes several variants tailored to different security and functionality needs, such as MIFARE Classic for basic legacy systems, MIFARE Plus for enhanced security in existing infrastructures, and MIFARE DESFire for advanced, multi-application environments with features like AES encryption and flexible file structures. These ICs support memory capacities ranging from 1 to 8 , with up to 10 years and write cycles exceeding 500,000, ensuring reliability in high-volume deployments. MIFARE solutions are also backward compatible across generations, facilitating seamless upgrades in large-scale systems. Since its inception, MIFARE has evolved from a simple electronic purse technology into a comprehensive powering secure -enabled solutions in smart cards, tickets, mobiles, and wearables. By 1996, it enabled the world's first large-scale contactless transport ticketing in , , marking the start of widespread adoption. Today, over 12 billion MIFARE ICs have been shipped, supporting daily transactions for 1.2 billion people across more than 750 cities in , , programs, and closed-loop payments. The technology's interoperability with global standards like NFC Forum Type 4 tags further extends its use to emerging areas such as smart access and .

Overview

Definition and Purpose

MIFARE is a brand name owned by for a family of chips used in contactless smart cards and proximity cards. These chips operate at a high frequency of 13.56 MHz, leveraging RFID and principles to facilitate communication between the card and a reader device. MIFARE technology complies with the ISO/IEC 14443 Type A standard for proximity cards, which defines the physical characteristics, radio frequency power, and signal interface for contactless integrated circuit cards. This compliance enables reliable non-contact data exchange over short distances, typically up to 10 cm, making it suitable for quick and convenient interactions without physical insertion. The primary purposes of MIFARE are to provide secure data storage and efficient transaction processing in various applications, including public transportation ticketing, building access control, and personal identification systems. By supporting rewritable memory and basic cryptographic features, MIFARE distinguishes itself from simpler RFID technologies, which are often limited to passive tagging without advanced processing or security capabilities.

Development and Ownership

MIFARE technology originated in 1994 when Mikron, an Austrian company based in Gratkorn, developed the world's first (IC) under the name MIFARE, standing for MIKron FARE collection system, primarily aimed at fare collection applications. This innovation marked a significant advancement in contactless identification, building on Mikron's expertise in (RF) transmission technologies. In 1995, Philips Semiconductors acquired Mikron, integrating its contactless IC portfolio, including MIFARE, which accelerated commercialization and global adoption through ' established manufacturing and distribution networks. The acquisition provided Philips with advanced RF anti-collision and high-data-rate capabilities, enabling broader deployment in smart card ecosystems. In 2006, Philips Semiconductors was spun off as an independent entity named , which assumed full ownership of the MIFARE trademark and continued research and development efforts. Under NXP's stewardship, MIFARE has achieved substantial , with over 12 billion contactless and dual-interface sold worldwide as of 2022. NXP maintains control through a licensing model that allows third-party manufacturers to produce compatible cards and readers, fostering an of interoperable products while ensuring standards. This approach has supported MIFARE's integration into diverse applications, from to , without compromising proprietary advancements.

Technical Specifications

Contactless Interface

MIFARE cards operate in the high-frequency band at 13.56 MHz, utilizing between the reader's and the card's to enable both to the passive and bidirectional data transfer without physical contact. This generates an alternating that induces a voltage in the card's , powering the and facilitating communication over typical distances of up to 10 cm. The contactless interface adheres to the ISO/IEC 14443 standard for proximity cards, specifically Type A, with compliance to Part 1 defining physical characteristics such as card dimensions and RF field limits, and Part 2 specifying the RF power and signal interface including modulation depth and field strength requirements. Part 3 covers initialization and anticollision procedures to select and activate a single card from multiple in the reader's field. Advanced MIFARE variants, such as DESFire, further comply with Part 4, which outlines a half-duplex for structured exchange, including error detection and protocol negotiation like the Request for Answer to Select (RATS) command. Communication employs distinct modulation schemes for each direction: from reader to card, 100% (ASK) with coding at subcarrier frequencies derived from the 13.56 MHz carrier, ensuring robust signal detection. Conversely, card-to-reader transmission uses load modulation on a subcarrier (typically 847 kHz), encoded with coding at 106 kbit/s or (BPSK) at higher data rates for self-clocking and reliable bit . Data rates start at 106 kbit/s in both directions for basic operations but can reach up to 848 kbit/s in compliant implementations, supporting faster transactions in high-throughput scenarios. To manage multiple cards in the field, the anticollision mechanism follows a search algorithm as defined in ISO/IEC 14443-3 Type A, where the reader iteratively queries unique identifiers (UIDs) bit by bit, detecting collisions and branching to isolate individual cards through cascaded levels for 4-, 7-, or 10-byte UIDs. This deterministic process ensures efficient selection without requiring time-slotted responses, minimizing identification time even with several cards present.

Memory Organization and Byte Layout

MIFARE chips employ electrically erasable programmable (EEPROM) for non-volatile, rewritable data storage, enabling repeated updates while retaining information without power. EEPROM capacities range from approximately 48 bytes in MIFARE Ultralight variants to 8 KB in MIFARE DESFire, with up to 10 years and write endurance typically from 100,000 to 500,000 cycles depending on the variant. Memory organization and byte layout vary across MIFARE families. In the MIFARE Classic family, the memory is divided into logical sectors, each comprising multiple blocks of 16 bytes, providing a structured for data management. The first block in sector 0 serves as the manufacturer block, containing the (UID), which is 4 or 7 bytes and uniquely identifies the chip. Subsequent blocks within a sector as data blocks for user information, while the final trailer block stores elements. In contrast, MIFARE DESFire uses a flexible supporting multiple applications and files, while MIFARE Ultralight employs linear addressing without sectors. Access modes for reading and writing are governed by configurations in the trailer block (in ), which define permissions for individual sectors and protect against unauthorized modifications. occurs via a challenge-response mechanism tied to keys housed in the trailer (in ), allowing secure operations on protected . Byte in follows a fixed pattern: the occupies the initial bytes of the manufacturer block, followed by manufacturer ; data blocks hold 16 bytes of arbitrary user content; and the trailer dedicates bytes to keys (typically 6 bytes each for two keys) and 4 bytes for access bits. Data integrity during transmission is maintained through a 16-bit () appended to each block's content, verifying the accuracy of read or write operations.

Variants

MIFARE Classic Family

The MIFARE Classic family represents the original series of integrated circuits developed by , designed for applications such as , public transportation, and micropayments. It includes three primary models: MIFARE Classic Mini, MIFARE Classic 1K, and MIFARE Classic 4K, each differing in memory capacity while sharing a common architecture for . The Mini variant provides 384 bytes of total memory with 224 bytes usable for user data, suitable for low-capacity needs. The 1K model offers 1,024 bytes total and 752 bytes usable, while the 4K model provides 4,096 bytes total and 3,440 bytes usable, enabling more complex data storage. Memory in the MIFARE Classic family is organized into sectors and blocks for efficient and security management. The has 5 sectors, the 1K has 16 sectors, and the has 40 sectors (with the first 32 sectors containing 4 blocks each and the remaining 8 containing 16 blocks each). Each sector consists of 4 blocks of 16 bytes (64 bytes total per sector in standard configurations), where the first three blocks hold data and the fourth is the sector trailer. The trailer stores two secret keys—Key A (mandatory, 6 bytes) and Key B (optional, 6 bytes)—along with access condition bits that define read/write permissions for the sector's data blocks. Sector 0, block 0 serves as a manufacturer block, containing the (UID) and is read-only. Authentication and data protection in the MIFARE Classic family rely on the proprietary , which uses 48-bit keys for mutual three-pass compliant with ISO/IEC DIS 9798-2. This process secures communication between the card and reader, encrypting data transfers to prevent unauthorized access. All models support the same command set, including read, write, increment, decrement, restore, and transfer operations, ensuring across variants for seamless integration in existing systems. Although the MIFARE Classic family remains in production for legacy applications, NXP recommends against its use in new high-security deployments due to evolving standards, favoring successors like MIFARE Plus or DESFire for enhanced protection. It continues to be widely deployed in established infrastructures worldwide, supporting ISO/IEC 14443 Type A compliance for reliable 13.56 MHz contactless operation.

MIFARE Plus Family

The MIFARE Plus family represents an evolutionary upgrade to the MIFARE Classic series, designed to enhance while maintaining compatibility with existing contactless infrastructures. Developed by , it supports a phased security upgrade path, allowing cards to operate in legacy environments initially and transition to advanced as needed. This family is particularly suited for applications requiring secure and transmission, such as and public transportation, where minimizes deployment costs. MIFARE Plus operates across three security levels (SL) to facilitate migration: SL1 provides full with MIFARE Classic using 3-pass , enabling seamless integration with legacy readers without immediate changes. SL2 introduces mandatory AES-128 while retaining keys for data , offering an intermediate step for enhanced protection against certain attacks. SL3 employs native AES-128 for , communication , via MACing, and secure messaging, providing the highest level of with optional proximity checks. Memory in MIFARE Plus is available in 2 kB or 4 kB variants, organized into sectors for structured data access. The 2 kB version features 32 sectors, each comprising 4 blocks of 16 bytes (64 bytes per sector total). The 4 kB version extends this with 32 sectors of 4 blocks plus 8 additional sectors of 16 blocks (256 bytes per extended sector), supporting up to 200,000 write cycles and 10-year . This layout mirrors MIFARE Classic for ease of adaptation but includes reserved areas for security keys and transaction data. Backward compatibility is a core feature, with MIFARE Plus cards emulating MIFARE behavior in SL1 mode, allowing detection and operation by unmodified ISO/IEC 14443 Type A readers. This enables pre-issuance of high-security cards that function in Classic ecosystems until infrastructure upgrades occur, reducing risks during transitions. Additional capabilities include transaction messaging via Transaction MAC (TMAC) for verifying multi-step operations, mutual three-pass in higher security levels, and support for elevated data rates up to 848 kbit/s for faster interactions. These features enhance reliability in dynamic environments like fare collection systems. Specific models within the family include MIFARE Plus EV1, available in 2 kB and 4 kB configurations as the foundational version with standard security migration. MIFARE Plus EV2 builds on EV1 with enhancements such as improved key diversification using symmetric and ECC-based originality checks, along with stricter update controls for better protection during the upgrade process.

MIFARE Ultralight Family

The MIFARE Ultralight family consists of low-cost contactless ICs designed primarily for limited-use applications such as single-trip tickets and simple , offering a balance of affordability and basic functionality without the complexity of multi-sector memory or advanced multi-application support. These ICs operate at 13.56 MHz in compliance with ISO/IEC 14443 Type A and support anticollision protocols for reliable reading in high-density environments. Key models in the family include the original MIFARE Ultralight (MF0ICU1), which provides 16 pages of 4 bytes each for a total of 64 bytes, with 48 bytes dedicated to user memory across pages 04h to 0Fh. The MIFARE Ultralight EV1 extends this with variants MF0UL11 (20 pages total, 48 bytes user memory) and MF0UL21 (41 pages total, 128 bytes user memory), maintaining with the original for the first 512 bits. The MIFARE Ultralight C (MF0ICU2) offers 48 pages for 192 bytes total , including 144 bytes of user memory from pages 04h to 27h, along with a 16-bit one-way counter for usage tracking. MIFARE Ultralight AES variants provide user memory options of 48 bytes, 128 bytes, or 144 bytes, with the 144-byte model organized across 36 user pages in a 60-page total structure. The memory structure in the Ultralight family uses a linear organization of fixed 4-byte pages without sectors, enabling straightforward suitable for simple read/write operations. Lockable areas allow permanent of through one-time programmable (OTP) bits, with ranging from individual pages in the original model (pages 03h to 0Eh) to 2-page blocks in larger EV1 variants, preventing further writes once set. The base MIFARE Ultralight and EV1 models lack built-in cryptographic engines, relying instead on basic mechanisms like password protection (32 bits in EV1) and OTP areas for limited data integrity. Later variants introduce enhanced protection: Ultralight C adds 3DES authentication for secure access to protected areas, while Ultralight AES incorporates AES-128 for 3-pass mutual authentication and CMAC-based secure messaging to safeguard against unauthorized reads and modifications. These ICs are optimized for high-volume production in disposable formats, supporting applications like tickets where rapid issuance and reading are essential, with transaction times under 35 ms and read distances up to 100 mm. They enable storage compliant with NFC Forum Type 2 Tag specifications, facilitating links to such as event details or loyalty programs. The family also includes three independent 24-bit one-way counters in EV1, C, and models to prevent ticket reuse by incrementing on validation. MIFARE 2GO serves as a flexible cloud-based solution integrating the Ultralight core for embedding in paper tickets, enabling seamless digitization and management of single-use credentials in transit and event scenarios through NFC-enabled devices.

MIFARE DESFire Family

The MIFARE DESFire family comprises a series of integrated circuits (ICs) developed by , designed for secure multi-application environments such as , public transportation, and programs. These ICs feature a microcontroller-based architecture with robust cryptographic capabilities, enabling flexible data storage and processing in complex systems. Unlike sector-based predecessors, DESFire employs a file-based structure that supports multiple independent applications on a single card, facilitating virtual card architectures where diverse services can coexist without interference. The family evolved through several models to enhance performance and security. The original MIFARE DESFire (MF3ICD40), introduced around 2002, was available in 2K, 4K, and 8K variants and relied on and 3DES with 56/112/168-bit keys for and secure messaging. It was succeeded by MIFARE DESFire EV1 (MF3ICD41) in 2008, which introduced enhanced native commands for improved , while maintaining 2K, 4K, and 8K memory options and adding AES-128 support alongside legacy DES/3DES. Subsequent iterations include MIFARE DESFire EV2 (MF3DX2/MF3DHX2) from 2016, emphasizing faster transaction speeds through optimized protocols and unlimited applications per card, available in 2K to 32K sizes with AES-128 as the primary algorithm and compatibility for /3DES. The latest MIFARE DESFire EV3 (MF3DHX3), released in 2020, offers up to 16 kB and incorporates advanced features like the D40 backward-compatibility mode for 3DES, alongside AES-128/256, while supporting unlimited applications and enhanced proximity checks. Additionally, the MIFARE DESFire EV3C variant extends EV3 functionality with emulation capabilities, allowing it to mimic legacy card types such as MIFARE Classic for seamless system migrations. At its core, the DESFire structure utilizes a with up to 32 files per application—such as standard data, value, linear record, cyclic record, and transaction files—enabling granular via diversified keys and secure messaging with message authentication codes (). This design supports up to 32 applications in early models like EV1, expanding to unlimited in EV2 and later, promoting a virtual card approach for segmented data isolation. All models comply fully with ISO/IEC 14443-4 for contactless communication at 13.56 MHz, including advanced protocol features like APDU support per ISO/IEC 7816-4, ensuring broad . Key features include an on-chip backup management system for atomic operations and data integrity via anti-tear mechanisms, preventing incomplete transactions during power loss. Transaction history logging is facilitated through cyclic record files, which maintain audit trails for compliance in multi-application scenarios. These elements, combined with Common Criteria EAL5+ certification across recent models, position DESFire as a high-capacity, secure alternative to single-application systems, emphasizing cryptographic strength over minimalistic designs.

Specialized Variants

The MIFARE SAM AV2 is a secure access module designed specifically for integration into contactless reader devices, providing enhanced security services for offline transaction processing. It features an AV2 cryptographic co-processor that supports (TDEA), , and algorithms, along with secure key storage for protecting access keys and assets in MIFARE-based systems. This module enables secure messaging options, including plain, MACed, and fully protected modes, and supports host commands, making it suitable for applications requiring robust offline in terminals such as readers and payment devices. Introduced in November 2024, the MIFARE DUOX represents a specialized evolution in NXP's MIFARE portfolio, combining symmetric cryptography with asymmetric methods like ECDSA and in a single contactless IC. Available in 2 kB, 4 kB, 8 kB, and 16 kB memory configurations, it is optimized for high-security use cases including secure , electric vehicle (EV) charging authentication, and digital car keys. Key features include (PKI) support for between devices, secure boot mechanisms to prevent tampering, and a high data transfer rate of up to 1 Mbit/s, simplifying while maintaining with ISO/IEC 14443 standards. These specialized variants extend the MIFARE ecosystem beyond traditional cards by focusing on reader-side and hybrid cryptographic solutions; for instance, the SAM AV2 facilitates offline key derivation and session key generation in reader terminals, ensuring secure interactions without constant online connectivity. While other niche products like MIFARE FleX enable flexible multi-application support in sensor-integrated environments, the SAM AV2 and DUOX stand out for their targeted advancements in cryptographic versatility and deployment efficiency.

History

Origins and Early Development

The development of MIFARE began in when the Austrian Mikron, based in Gratkorn, launched the first contactless MIFARE Classic (IC) chip in response to growing demand for efficient contactless ticketing solutions in public transportation and related applications. This initial chip, known as MIFARE Classic 1K, featured 1 of user memory and operated on a 13.56 MHz , enabling short-range proximity reading without physical contact. The technology addressed limitations of magnetic stripe and contact-based cards by offering faster transaction times and greater durability, particularly for high-volume scenarios like fare collection. In 1995, Philips Semiconductors acquired Mikron, integrating its RFID expertise and investing heavily in scaled production to commercialize MIFARE more broadly. This acquisition facilitated the first practical deployments of MIFARE chips in vending machines and systems across , where the contactless interface simplified operations in environments requiring quick, hygienic interactions. By the late , adoption expanded to pilot projects in European public transportation, such as the Transmo system in , UK, which utilized MIFARE for rapid bus boarding. During this period, the proprietary algorithm was finalized as the core security mechanism for MIFARE Classic, providing and basic to protect against unauthorized in these early implementations. From 2000 to 2005, the MIFARE lineup evolved with the introduction of higher-capacity models, including the MIFARE Classic 4K variant offering 4 kilobytes of memory to support more complex multi-application use cases. This expansion coincided with rapid market growth, culminating in over 1 billion MIFARE shipped worldwide by 2009, driven by widespread in transportation and identification systems. Early commercialization faced challenges in achieving , particularly in aligning with the emerging ISO/IEC 14443 standard for contactless proximity cards, which was published in 2000 and formalized MIFARE's Type A as a baseline for global compatibility. These efforts helped solidify MIFARE's position as a foundational technology in contactless smart cards during its formative years.

Key Milestones and Evolution

In 2006, Semiconductors was spun off to form , an independent that positioned MIFARE as its flagship product line for () technologies, building on its established role in contactless smart cards. In 2001, NXP introduced MIFARE Ultralight, a low-cost IC designed for single-use tickets and basic applications in public transport and event ticketing, followed in 2002 by the original MIFARE DESFire, a microprocessor-based product for multi-application environments. By 2008, the portfolio expanded further with MIFARE DESFire EV1, which introduced advanced security features like AES-128 encryption. Throughout the , NXP addressed security vulnerabilities in MIFARE Classic by releasing enhanced variants and providing migration guidelines to transition systems to more secure options like MIFARE Plus and DESFire, ensuring while upgrading cryptographic protections. Key releases included MIFARE DESFire EV2 in 2016, which improved transaction speeds and added features such as proximity check and transaction relax for efficient multi-application services. In 2020, MIFARE Plus EV2 was introduced as a for legacy systems, offering authentication and enhanced connectivity for mobile integration. Entering the 2020s, NXP continued innovation with MIFARE DESFire EV3 in 2020, enhancing operating distances and supporting Forum Type 4 tags for broader in ecosystems. This was followed by MIFARE DESFire EV3 variants with certified security profiles in subsequent years, culminating in the 2024 launch of MIFARE DUOX, the first contactless IC combining asymmetric (e.g., ECDSA) and symmetric cryptography for simplified (PKI) integration in and secure transactions. By 2024, NXP had shipped over 12 billion MIFARE ICs, reflecting widespread adoption. Over these decades, MIFARE's market focus evolved from dominant use in public transportation ticketing to expanded roles in () devices, mobile emulation for virtual credentials, and secure multi-service platforms across industries.

Security Features and Vulnerabilities

MIFARE Classic

The MIFARE Classic family employs , a proprietary 48-bit (LFSR)-based for and data between the card and reader. This cipher generates a keystream by filtering the output of the LFSR through a non-linear function, but it is vulnerable to cryptanalytic attacks due to linear approximations that exploit statistical biases in the keystream and the use of a predictable derived from a weak 16-bit . These weaknesses allow recovery of the internal state with limited data, compromising the confidentiality of the card's 1KB or 4KB memory, which is organized into 16 or 64 sectors of four blocks each, protected by per-sector keys. Key vulnerabilities in were first demonstrated through a nested attack in , which recovers the pseudo-random number generator (PRNG) state by exploiting the low entropy of the card's generation—limited to 16 bits—allowing an attacker with temporary physical access to replay modified authentications and extract keystream bits for sector zero. This enables partial decryption without the full key. A full break followed later in via algebraic , solving a system of non-linear equations over derived from observed keystream; using just 50 bits of keystream and one known , the 48-bit key can be recovered in approximately 200 seconds on a 1.66 GHz PC. Subsequent attacks built on these flaws. The 2009 Dark Side attack is a card-only exploit requiring no prior trace or , where an attacker in proximity to the target card sends around 300 targeted queries over several minutes to reproduce the nonce and analyze keystream differentials via parity bits, fully recovering the without reader interaction. MIFARE Classic is also susceptible to relay attacks, where communication between card and reader is intercepted and forwarded in ; the protocol's tolerates message delays of up to several seconds, enabling man-in-the-middle scenarios without immediate detection. Once are compromised—via nested, algebraic, or Dark Side methods—cloning becomes straightforward using tools like the Proxmark3, an open-source RFID that automates , dumping, and onto blank cards. To mitigate these issues, implementers are advised to diversify sector keys from a master key using the card's (UID) and sector number, reducing the risk of widespread key compromise from a single interception. However, due to the fundamental weaknesses in , long-term security requires migration to successors like MIFARE Plus, which introduces stronger options while maintaining for gradual replacement. These vulnerabilities have had significant real-world impact, affecting an estimated 1 billion cards in circulation by across global applications like public transit and . A prominent example is the Dutch system for public transportation, where exploitation of flaws enabled unauthorized cloning and free rides; following the 2008 disclosure, the Dutch government implemented additional security measures rather than replacing the cards. In , further vulnerabilities were disclosed in unlicensed MIFARE Classic-compatible chips, such as the FM11RF08S produced by Fudan Microelectronics, revealing a that allows brute-forcing of a backdoor key in minutes to gain unauthorized access and clone cards without standard . Additionally, researchers demonstrated attacks on a static encrypted variant intended to resist card-only exploits, enabling key recovery through analysis of nonce generation flaws. These findings, as of 2025, underscore ongoing risks in legacy and clone deployments, particularly in systems for hotels and offices.

MIFARE DESFire

MIFARE DESFire is a family of contactless smart cards designed for secure multi-application use, employing standardized cryptographic algorithms to ensure confidentiality, integrity, and authentication. Early variants, such as the MF3ICD40 (also known as D40), primarily relied on the (DES) and (3DES) with key lengths up to 112 bits for encryption and . Subsequent evolutions, starting with DESFire EV1, introduced support for the (AES) with 128-bit or 256-bit keys, alongside continued compatibility with DES and 3DES, allowing flexible cryptographic settings per application. These algorithms facilitate secure messaging modes, including plain communication, MACed communication for integrity, and fully enciphered modes, with Cipher-based (CMAC) derived from AES or 3DES in CBC mode to verify data integrity and authenticity during transactions. Despite these robust primitives, DESFire implementations have faced side-channel vulnerabilities requiring physical access. In 2011, researchers demonstrated a differential power analysis (DPA) attack on the MF3ICD40 variant's 3DES implementation, recovering the full 112-bit using non-invasive power traces collected via an and template-based correlation, with an attack setup costing under $3,000. This exploit targeted the protocol's of nonces, enabling key extraction after approximately 10,000 traces, though it did not affect later AES-based modes directly. attacks on implementations have also been a concern, as demonstrated in broader cryptographic around 2015, where induced errors during AES rounds could potentially leak key material if countermeasures are absent, though no full remote exploitation of DESFire AES has been publicly reported. The DESFire EV3 addresses prior weaknesses with enhanced protections, including the D40 Native mode for using DES-based , but prioritizing AES-128 in EV2 secure messaging for new deployments. EV3 incorporates hardware-level to DPA through exception sensors that detect anomalous consumption and self-securing mechanisms, alongside secure key derivation that generates session keys from concatenated and rotated nonces (nR and nC) encrypted under the master key, reducing leakage risks. These features achieve EAL5+ certification, emphasizing to physical attacks like and . All known attacks on DESFire require physical proximity and specialized equipment for side-channel or fault induction, with no documented remote full key recoveries as of 2025. For optimal security, deployments should prioritize cards with AES-128 or higher, enable EV2 secure messaging with CMAC, and implement regular rotation to mitigate long-term exposure from potential physical compromises.

MIFARE Ultralight and Plus

The MIFARE Ultralight family, designed for low-cost applications like disposable tickets, features a base model without built-in cryptographic protections, relying instead on basic mechanisms such as one-time programmable (OTP) bits and monotonic counters for . This lack of exposes the card's to unauthorized modifications, including bit-flipping attacks that alter specific fields, such as lock bytes, to enable unauthorized reuse of tickets. A 2013 of Ultralight-based tickets demonstrated how attackers could flip bits in the lock sector to bypass OTP restrictions, effectively creating unlimited-use cards without triggering security checks. The AES variant of MIFARE Ultralight introduces 128-bit AES cryptography to enhance security, supporting three-pass mutual authentication and secure messaging with CMAC for data integrity. However, this protection is limited primarily to authentication processes and does not extend to full data encryption across all operations, leaving room for cloning or replay attacks if not paired with additional system-level safeguards. In practice, the AES implementation allows limited negative authentication attempts via configurable limits, but its constrained memory (144 bytes) and focus on cost-sensitive uses make it unsuitable for scenarios requiring comprehensive encryption. MIFARE Ultralight C, an evolution within the family, incorporates a 3DES-based authentication alongside monotonic counters to track usage, but remains vulnerable to counter manipulation. Specifically, attackers can exploit a tear-off attack during write operations to the counter, bypassing anti-tearing mechanisms and resetting the 24-bit monotonic counter to zero, which undermines usage limits in applications like event ticketing. This vulnerability, documented as CVE-2021-33881, affects Ultralight C and related NTAG variants, allowing repeated use despite increment protections. MIFARE Plus builds on the Ultralight foundation with configurable security levels (SL1 to SL3), incorporating 128-bit for authentication and secure messaging in SL2 and SL3 modes. In SL2, handles authentication while retaining some compatibility for data confidentiality, providing resistance to known MIFARE attacks like key recovery; SL3 operates in a native -only mode, fully avoiding the vulnerable algorithm and enhancing overall integrity with MACing. However, operation in SL1 emulates MIFARE behavior, and improper configuration allowing downgrade to this level exposes the card to classic vulnerabilities, such as nested attacks. Despite these upgrades, is susceptible to relay attacks if the optional proximity —available in SL3—is not enabled, as it measures response times to verify physical proximity to the reader. Without this , attackers can relay signals over distance, bypassing location-based controls in systems. Enhancements like lock bits in the EV1 variant of Ultralight and provide anti-tampering support, freezing pages and incorporating signatures to prevent unauthorized writes during power interruptions. Compared to MIFARE Classic, Ultralight and variants offer improved through AES adoption and reduced reliance on proprietary , mitigating risks like full key extraction; however, their lightweight design limits them to low-to-medium applications, necessitating additional backend protections for high-value uses to address residual vulnerabilities like counter bypass or relay threats.

Applications

Public Transportation

MIFARE technology saw its initial adoption in public transportation during the mid-1990s through pilot projects in , particularly in and the , where contactless smart cards were tested for fare collection in urban transit systems. Today, MIFARE-based solutions are deployed in over 750 cities worldwide, enabling seamless ticketing for billions of daily journeys across buses, trains, subways, and trams. Prominent implementations include London's Oyster card system, which utilizes MIFARE DESFire EV1 cards for stored-value fare payments on the city's extensive network, having migrated from MIFARE in 2011. In , the Istanbulkart employs MIFARE DESFire technology to support multi-application ticketing, allowing users to load fares for buses, metros, and ferries on a single card. Similarly, Moscow's card leverages MIFARE Ultralight chips for disposable tickets and MIFARE for low-cost refillable tickets, facilitating quick access to the metro, buses, and trams. Key features of MIFARE in transit include stored-value purses for flexible deductions and multi-ride that support time-based or zonal passes, all processed via contactless readers at fare gates for rapid validation. These capabilities enable offline transactions with minimal , reducing the need for physical handling. The technology's benefits are evident in faster boarding times, with transactions completing in less than 100 milliseconds to maintain passenger flow at high-volume gates. Additionally, integration with mobile via services like MIFARE allows users to provision digital on smartphones, including compatibility with for virtual transit credentials, eliminating the need for physical cards and enhancing convenience in environments. A notable challenge involves upgrading legacy systems based on the vulnerable MIFARE Classic to more secure variants like DESFire EV2, which offers AES-128 encryption and improved resistance to attacks, ensuring long-term reliability in high-stakes operations. These migrations address security concerns while preserving for existing infrastructure.

Access Control and Identification

MIFARE contactless smart cards are widely deployed in physical systems for securing building entries, campus facilities, and corporate environments through employee badges and credentials. These cards facilitate rapid, secure at readers installed on doors, turnstiles, and gates, enabling organizations to manage permissions efficiently across large-scale installations. The technology's compatibility with ISO/IEC 14443 standards ensures interoperability with diverse reader hardware, supporting both high-frequency operations and with legacy systems. MIFARE cards feature a segmented structure, with securely isolated sectors that allow of multiple types, including photo IDs for visual alongside credentials. This multi-sector supports up to 28 applications on advanced variants like DESFire, permitting the coexistence of and logic without compromising through independent per sector. For instance, commonly issue MIFARE DESFire EV1 cards as multifunctional IDs, which grant entry to residences, halls, and dining areas while storing photos and enrollment details in dedicated sectors. Government entities leverage MIFARE DESFire configurations for national and agency ID cards, capitalizing on encryption to protect sensitive rights in high-security settings. Hotels, meanwhile, favor MIFARE Ultralight variants for disposable key cards, where the limited-use memory and AES authentication provide cost-effective room without the need for extensive . These implementations highlight MIFARE's versatility in balancing and usability across institutional applications. Key features of MIFARE in include time-based permissions, where card data encodes validity windows to restrict entry outside designated hours, enhancing operational efficiency in shift-based or event-driven environments. Integration with enables , such as combining a MIFARE card tap with scanning for heightened at critical entry points. Readers supporting offline operations rely on MIFARE Secure Access Modules (SAMs), which perform cryptographic and locally, ensuring reliability in areas with intermittent . MIFARE systems integrate seamlessly with building infrastructure for zoned control, linking card readers to elevator controllers that authorize floor-specific based on user profiles, preventing unauthorized movement within multi-level facilities. When paired with networks, access events trigger video recording or alerts, providing comprehensive audit trails and real-time to correlate entries with visual . This holistic approach underpins MIFARE's widespread , with billions of units enabling secure in institutional deployments.

Payment and Loyalty Programs

MIFARE technologies facilitate various retail payment and loyalty applications by enabling secure, contactless transactions in non-transit environments. MIFARE Classic cards are commonly deployed in vending machines for closed-loop payments, where users preload value onto the card to purchase items without external network connectivity. This setup allows operators to implement loyalty rewards, such as discounts or promotional credits, directly on the MIFARE media to encourage repeat usage. In loyalty programs, MIFARE Ultralight cards serve as cost-effective options for store-specific schemes, storing points or rewards data on low-memory chips suitable for high-volume issuance. These cards support simple read-write operations for accumulating and redeeming loyalty points at points of sale. For more advanced closed-loop payments, MIFARE DESFire variants handle micropayments in settings, supporting multiple applications on a single card for seamless integration of payment and rewards. Key features of MIFARE in these contexts include stored value purses, which use dedicated value files to securely manage prepaid balances with decrement and increment operations protected by cryptographic checks. Coupon redemption is enabled through file structures that store vouchers, verifiable via to prevent unauthorized use. Additionally, NFC compatibility allows smartphone linking, where mobile devices emulate MIFARE cards or read tags to transfer or initiate payments. MIFARE solutions continue to support secure contactless payments in emerging markets, leveraging their established infrastructure and compatibility with standards for affordable transactions in growing digital economies as of 2025. This growth aligns with broader contactless adoption, where MIFARE's facilitates upgrades to higher-security standards without replacing existing ecosystems. Security in MIFARE payment and loyalty implementations relies on encryption for transaction integrity, ensuring that data exchanges, such as value updates or point redemptions, remain confidential and unaltered. Anti-cloning measures employ diversified keys, where unique per-card derivations from a master key prevent duplication, enhancing protection against unauthorized replication in retail environments.

Integration and Standards

Systems Integration Considerations

When integrating MIFARE systems in multi-vendor environments, effective is essential to maintain security across diverse hardware. The Secure Application Module (SAM), such as the MIFARE SAM AV3, serves as a dedicated for storing master keys and performing cryptographic operations, thereby isolating sensitive data from the main reader processor. Key diversification techniques, supported by SAM AV2 and AV3, generate unique session keys from a base master key using card-specific identifiers like unique identifiers (UIDs), which mitigates risks from master key compromise by limiting the impact of any single breach. Compatibility across MIFARE variants requires standardized reader configurations to ensure seamless . All MIFARE products operate under ISO/IEC 14443 Type A , allowing universal support via Type A-compatible readers without the need for variant-specific hardware. For advanced protocols, updates on readers enable compliance with ISO 14443-4, facilitating higher-layer communications for variants like DESFire while maintaining with legacy systems. Multi-application deployments leverage the flexibility of MIFARE DESFire to consolidate multiple services on a single card, reducing issuance costs and user friction in environments like and payments. DESFire EV1 and later support native multi-application architecture, enabling independent applets for distinct schemes such as ticketing and programs within one . Migration from MIFARE Classic to DESFire can utilize dual-interface cards that embed both chips, allowing phased rollouts where legacy readers continue to function alongside new secure applications. Performance optimization in MIFARE integrations focuses on environmental factors to achieve reliable operation within the technology's inherent constraints. Readers should be positioned to maintain a 5-10 cm read range, accounting for typical high-frequency (13.56 MHz) signal from metal surfaces or , which ensures collision-free anti-collision during peak usage. For battery-powered readers, intelligent features, such as those in advanced modules like the MFRC630, dynamically adjust to extend operational while preserving detection accuracy. Scalability in large-scale MIFARE deployments relies on robust backend architectures to handle high transaction volumes without . Integration with centralized databases, often via cloud platforms like MIFARE 2GO, enables authorization by querying user permissions and updating card states during each tap, supporting millions of daily interactions in urban transit or enterprise access systems. This approach decouples reader hardware from data processing, allowing horizontal through API-driven for multi-vendor ecosystems.

Certification and Compliance

MIFARE products adhere to the ISO/IEC 14443 Type A standard for contactless smart cards, ensuring compatibility across layers 1 through 4 for physical characteristics, power, initialization, anticollision, and transmission protocols. This compliance facilitates seamless integration in global applications such as and . For variants, MIFARE DESFire series supports EMVCo specifications through its ISO/IEC 14443 foundation and secure messaging, enabling in ecosystems. Additionally, specific MIFARE implementations align with NFC Forum standards, including Type 2 Tag compliance for Ultralight variants, which provide 144 bytes of user memory and anticollision support, and Type 4 Tag for DESFire , certified under NFC Forum ID 58652 with ISO/IEC 7816-4 APDU support. Security certifications underscore the robustness of MIFARE ICs in regulated environments. The MIFARE DESFire EV3 achieves EAL5+ certification for both hardware and software, equivalent to levels required for e-passports and banking cards, validating resistance to sophisticated attacks. Complementing this, the MIFARE SAM AV3 secure access module holds CAVP validation for its cryptographic functions, ensuring validated security for and in high-stakes deployments. The MIFARE DUOX, introduced for advanced access management, attains EAL6+ and Forum Type 4 Tag compliance, further enhancing its suitability for multi-site systems. NXP's MIFARE Certification program, conducted by independent test houses, verifies functional and security conformance at two levels: Level 1 for specification adherence and Level 2 for RFID interface integrity per ISO/IEC 14443-3, promoting interoperability among cards, readers, and terminals. This testing includes fraud detection mechanisms, such as backend monitoring for anomalous card behavior and UID deny-listing to prevent deployment of counterfeit or cloned devices. As of 2025, evolving security landscapes emphasize quantum-resistant features, with MIFARE DUOX incorporating readiness through AES-256 alongside support for ECC-based algorithms like NIST P-256, aligning with anticipated regulatory shifts toward PQC in contactless systems. These certifications collectively enable vendor-agnostic global deployment, reducing lock-in risks and supporting scalable, secure implementations across industries.

References

  1. [1]
    [PDF] MIFARE DESFire EV2 Fact Sheet
    The MIFARE DESFire EV2 contactless IC is ideal for system operators and developers building reliable, interoperable and scalable contactless solutions. The ...
  2. [2]
    25 Years of MIFARE and “THE NEW NORMAL” - NXP Semiconductors
    Aug 13, 2019 · In 1994 the first MIFARE chip was introduced to the public, and just two years later the contactless revolution in transport ticketing began to ...
  3. [3]
    MIFARE Classic - NXP Semiconductors
    MIFARE Classic ICs started a revolution in the contactless smart card business back in 1994. Today, they're still used in a variety of applications worldwide.
  4. [4]
    MIFARE (HF) - NXP Semiconductors
    NXP MIFARE is the leading brand for contactless and dual interface smart card schemes supporting public transport, hospitality, loyalty, and micropayment ...MIFARE DESFire · MIFARE Classic · MIFARE Plus · Mifare sam
  5. [5]
    Celebrating 30 Years of MIFARE | NXP Semiconductors
    Nov 28, 2024 · Since its inception by NXP in 1994, MIFARE technology has transformed from a simple electronic purse into a comprehensive suite of solutions ...<|control11|><|separator|>
  6. [6]
    MIFARE: Contactless NFC Solutions | NXP Semiconductors
    MIFARE provides NFC-enabled contactless solutions in multiple form factors for a range of applications, including smart car access and smart cards.
  7. [7]
    [PDF] MIFARE ISO/IEC 14443 PICC selection - NXP Semiconductors
    Aug 10, 2021 · The anti-collision procedure is mandatory for both type A and type B cards. In addition to the card activation procedure, the system itself has ...
  8. [8]
    IS THE DEBATE STILL RELEVANT? An in-depth look at ISO 14443 ...
    Jul 1, 2003 · Mikron's own technology, called Mifare, was used as the basis for the standard. In 1995, Philips purchased Mikron and the Mifare technology ...
  9. [9]
    PHILIPS SEMICONDUCTORS ACQUIRES MIKRON - Telecompaper
    Jun 27, 1995 · With the acquisition, Philips will gain access to advanced technology in RF transmission, including anti-collision transmission and high-data ...
  10. [10]
    Philips Semiconductors to become NXP - EE Times
    Aug 31, 2006 · NXP is also associated with Philips Semiconductors' Nexperia platform where audio and video processing technologies reside. The NXP trademark ...
  11. [11]
    [PDF] The value of genuine MIfare products - NXP Semiconductors
    MIFARE® is NXP's well-known brand for a wide range of contactless IC products with more than 12 billion contactless and dual interface ICs sold. MIFARE is used ...
  12. [12]
    Mifare Fobs & Cards - Security Fobs Direct
    According to NXP, 10 billion of their Mifare Smart Card chips have already been sold and over 150 million reader modules are used throughout the world.
  13. [13]
    NXP and Gemalto Sign Licensing Agreement for Adding MIFARE to ...
    Nov 29, 2010 · In addition to this latest license for SIM cards, NXP has licensed MIFARE technology to various chip manufacturers, while hundreds of ...
  14. [14]
    [PDF] MFRC630 (PDF) - NXP Semiconductors
    READER. 1. Reader to Card 100 % ASK, Miller Coded, Transfer speed 106 kbit/s to 848 kbit/s. 2. Card to Reader, Subcarrier Load Modulation Manchester Coded or ...
  15. [15]
    [PDF] High-performance ISO/IEC 14443 A/B frontend MFRC631 and ...
    Jan 3, 2024 · The MFRC631 supports higher transfer speeds of the MIFARE product family up to 848 kbit/s in both directions. The MFRC631 supports layer 2 and 3 ...
  16. [16]
    [PDF] Implementation of ISO14443A Anti-Collision Sequence in the TI ...
    This application note discusses the anti-collision sequence of the ISO14443A standard implemented in the MSP430F2370 (a 16-bit ultra-low power microcontroller ...
  17. [17]
    All about the anti-collision mechanisms ! - SpringCard
    Nov 13, 2018 · The part A of the norm ISO 14443 is based on a principle well-adapted to wired-logic cards: cards should answer in a synchronic manner and the ...
  18. [18]
    [PDF] MIFARE Classic EV1 1K - Mainstream contactless smart card IC for ...
    • Write endurance 200000 cycles. 3 Applications. • Public transportation ... For detailed and full information see the relevant full data sheet, which is ...
  19. [19]
    [PDF] MIFARE Classic EV1 4K - Mainstream contactless smart card IC for ...
    Sep 3, 2017 · The 4096 × 8 bit EEPROM memory is organized in 32 sectors of 4 blocks and 8 sectors of 16 blocks. One block contains 16 bytes. Page 8. NXP ...
  20. [20]
    [PDF] MF1 IC S20 - IDcardMarket.com
    Jan 23, 2007 · 1.1 Contactless energy and data transfer. In the Mifare system, the MF1 IC S20 is connected to a coil with a few turns and then.
  21. [21]
  22. [22]
    [PDF] NXP® MIFARE Plus® X
    KEY FEATURES. ▻ 2K or 4K EEPROM. ▻ Simple fixed memory structure compatible with MIFARE Classic with 1K memory (MF1ICS50),. MIFARE Classic with 4K memory ...
  23. [23]
    [PDF] MIFARE Plus EV2 - NXP Semiconductors
    Aug 9, 2021 · The non-volatile memory of the MF1P(H)22 is organized in 32 sectors of 4 blocks (from sector 0d to 31d). The MF1P(H)42 has in addition 8 sectors ...
  24. [24]
    [PDF] MF0ICU1 MIFARE Ultralight contactless single-ticket IC
    Jul 23, 2014 · The unique 7-byte serial number (UID) and its two check bytes are programmed into the first 9 bytes of memory covering page addresses 00h, 01h ...
  25. [25]
    [PDF] MF0ULX1 - MIFARE Ultralight EV1 - NXP Semiconductors
    Apr 9, 2019 · • Write endurance 100.000 cycles. • Write endurance for one-way counters. 1.000.000 cycles. 3 Applications. • Public transportation. • Event ...
  26. [26]
    [PDF] MIFARE Ultralight C - Contactless ticket IC - NXP Semiconductors
    Mar 20, 2024 · MIFARE Ultralight C - Contactless ticket IC. • 32-bit user definable One-Time Programmable (OTP) area • Write endurance 100000 cycles. • Data ...
  27. [27]
    [PDF] MIFARE Ultralight AES quick start guide - NXP Semiconductors
    Feb 18, 2022 · Abstract. This document gives a quick introduction to MIFARE Ultralight AES and lists all supporting documents, software tools and further ...
  28. [28]
    MIFARE 2GO | Cloud Service for NFC Devices - NXP Semiconductors
    The MIFARE 2GO cloud service digitizes traditional smart city services so they can be seamlessly managed and used on NFC-enabled devices.
  29. [29]
    MIFARE® Ultralight® | NXP Semiconductors
    MIFARE Ultralight ICs for limited-use applications can lead industry standard for contactless and dual interface smart card schemes.MIFARE Ultralight C · MIFARE Ultralight AES · MIFARE Ultralight EV1
  30. [30]
    MIFARE DESFire - NXP Semiconductors
    NXP MIFARE DESFire product family provides highly secure microcontroller-based ICs for contactless and dual interface smart card schemes.
  31. [31]
    [PDF] MIFARE DESFire EV2 contactless multi-application IC
    Jun 12, 2019 · MIFARE DESFire EV2 offers best flexibility when creating multi-application schemes and features such as MIsmartApp with multiple key sets and ...
  32. [32]
    [PDF] MF3ICDx21_41_81 MIFARE DESFire EV1 contactless multi ...
    Dec 9, 2015 · It is compliant to all 4 levels of ISO/IEC 14443A and uses optional ISO/IEC 7816-4 commands.<|separator|>
  33. [33]
    [PDF] MIFARE DESFire EV3 contactless multi-application IC
    Jan 11, 2024 · MF3D(H)x3 offers best flexibility when creating multi-application schemes and feature such as MIsmartApp is supporting new business models.Missing: emulation capabilities
  34. [34]
    MF3D83C0DA8 Product Information - NXP Semiconductors
    30-day returnsFeatures. MIFARE DESFire EV3C, 8 KB, 17 pF, MOA8 ; Package. PLLMC: plastic leadless module carrier package; 35 mm wide tape ; Operating Features. No information ...
  35. [35]
    [PDF] MIFARE secure access module SAM AV2 - NXP Semiconductors
    Sep 13, 2023 · SAM_AuthenticateMFP. SAM_AuthenticateMFP can be used for all MIFARE Plus authentications (e.g. SL1, SL2,. SL3, originality keys, SL2 re- ...
  36. [36]
    MIFARE SAM AV2 - NXP Semiconductors
    The NXP MIFARE SAM AV2 hardware solution is an ideal add-on for reader devices offering additional security services. Supporting TDEA, AES and RSA capabilities.
  37. [37]
    NXP Simplifies NFC Security Applications with New MIFARE DUOX
    Nov 19, 2024 · About MIFARE. Celebrating 30 years of innovation, MIFARE has been at the forefront of contactless smart card technology since its inception.
  38. [38]
    MIFARE DUOX - NXP Semiconductors
    As the first contactless smartcard IC in its class to combine asymmetric and symmetric cryptography in a single chip, MIFARE DUOX simplifies key management and ...
  39. [39]
    SMARTMX3 P71D321 | Secure and Flexible Microcontroller
    Available with fully certified symmetric, hash and asymmetric cryptography libraries. Solutions. Multi-application enabled by MIFARE FleX® with MIFARE ...
  40. [40]
    [PDF] NXP History: A Timeline
    Philips Semiconductor founded. 1994. Philips launches MIFARE® 1K chip for automaticfare collection. 1995. Motorola technology powers. OnStar®—one of the first.Missing: Mikron | Show results with:Mikron
  41. [41]
    We're all getting smarter | Technology | The Guardian
    Feb 17, 1999 · Transmo's Mifare system uses a "contactless card" based on radio-frequency identification or RFID, which allows for rapid boarding of buses, ...
  42. [42]
    Reverse-Engineering a Cryptographic RFID Tag - USENIX
    2 Mifare Crypto-1 Cipher. We analyzed the Mifare Classic RFID tag by NXP (formerly Philips). This tag has been on the market for over a decade with over a ...Missing: pilots Europe 1990s
  43. [43]
    NXP History
    NXP launches MIFARE Ultralight EV1—the smart paper ticketing IC. 2012. NXP-HISTORY-2012-1. Freescale launches industry's first MCU built on the Arm Cortex-M0+ ...
  44. [44]
    MIFARE DESFire EV1 - NXP Semiconductors
    A MIFARE DESFire EV1 card can hold up to 28 different applications and 32 files per application. The size of each file is defined at the moment of its creation.Missing: original | Show results with:original
  45. [45]
    [PDF] AN11340 - NXP Semiconductors
    May 5, 2021 · In this document the term „MIFARE Classic card“ refers to a MIFARE Classic IC-based contactless card, the term „MIFARE Ultralight card“ refers ...
  46. [46]
    NXP's MIFARE® DESFire® EV2 Fast Tracks Multi-Application Smart ...
    Mar 1, 2016 · “NXP's MIFARE DESFire EV2 allows cities to easily integrate additional services like our bike-sharing service to existing city cards,” said ...
  47. [47]
    Secure Smart City Access Cardss - NXP Semiconductors
    Jun 2, 2020 · In addition, NXP's upcoming MIFARE Plus EV2 IC will provide a drop-in replacement for upgrading existing MIFARE Plus and MIFARE Classic ...Missing: date | Show results with:date
  48. [48]
    [PDF] NXP Introduces MIFARE DESFire EV3 IC, Ushers In New Era of ...
    Jun 2, 2020 · “With the launch of MIFARE DESFire EV3, NXP is laying the foundation for a new level of connected smart city services that are form factor.
  49. [49]
    MIFARE Innovation Roadmap – | NXP Semiconductors
    Oct 24, 2016 · Since 1994, MIFARE has shaped the contactless industry like no other brand. With 260 million reader and over 10 billion ICs sold, ...Missing: milestones | Show results with:milestones
  50. [50]
    [PDF] Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic ...
    MiFare Crypto 1 is a lightweight stream cipher used in Lon- don's Oyster card, Netherland's OV-Chipcard, US Boston's CharlieCard, and in numerous wireless ...Missing: pilots Europe late 1990s
  51. [51]
    [PDF] THE DARK SIDE OF SECURITY BY OBSCURITY
    The main security vulnerability that we need to address with regard to MiFare Classic is not about cryptogra- phy, RFID protocols and software vulnerabilities.Missing: trace | Show results with:trace
  52. [52]
    [PDF] Practical Relay Attack on Contactless Transactions by Using NFC ...
    session setup, would introduce about a 1.5 second delay to the attack. This ... Dismantling MIFARE Classic. In Pro- ceedings of European Symposium on ...
  53. [53]
    [PDF] A Practical Attack on the MIFARE Classic - Proxmark3
    Contactless cards are based on radio frequency identification technology (RFID) [1]. In 1995 NXP,. Philips at that time, introduced mifare6. Some target ...
  54. [54]
    [PDF] Making the Best of Mifare Classic Update
    Oct 6, 2008 · the Mifare sector keys should be diversified from a master key. Mifare master key (MASTER) This key is given to all readers in the sys- tem.
  55. [55]
    [PDF] Security Flaw in MIFARE Classic
    Mar 12, 2008 · The working of the CRYPTO1 encryption algorithm has been reverse engineered, and we developed our own implementation of the algorithm. • We ...Missing: pilots | Show results with:pilots
  56. [56]
    OV-chipkaart - Wikipedia
    Later in 2011, it appeared that TLS had started issuing a new version of the OV-chipkaart, which no longer uses the Dutch MIFARE chip but a chip manufactured by ...History and coverage · Travelling with the OV-chipkaart · Issues and criticisms
  57. [57]
    Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates ...
    We detail on how to recover the complete 112-bit secret key of the employed 3DES algorithm, using non-invasive power analysis and template attacks. Our methods ...
  58. [58]
    [PDF] Fault Tolerant Infective Countermeasure for AES
    The fault tolerant implementation of algorithm 2 requires a much higher number of fault injections per success as compared to algorithm 2, and the ratio ...Missing: MIFARE DESFire<|control11|><|separator|>
  59. [59]
    [PDF] Reverse Engineering of Authentication Protocol in DesFire
    Jul 17, 2023 · We have reverse-engineered the authentication proto- col of MIFARE DESFire EV3 cards, which consists of. D40, EV1, and EV2 secure messaging. AES ...Missing: CMAC | Show results with:CMAC
  60. [60]
    None
    ### Summary of Vulnerabilities in MIFARE Ultralight (circa 2012)
  61. [61]
    [PDF] MIFARE Ultralight AES contactless limited-use IC
    Mar 28, 2023 · MIFARE Ultralight AES can be configured to comply to the NFC Forum Tag 2 Type technical specification, see. [20] and allows to enable NDEF data ...
  62. [62]
    CVE-2021-33881 Detail - NVD
    Jun 6, 2021 · On NXP MIFARE Ultralight and NTAG cards, an attacker can interrupt a write operation (aka conduct a tear off attack) over RFID to bypass a Monotonic Counter ...Missing: overflow | Show results with:overflow
  63. [63]
    RFID: Monotonic Counter Anti-Tearing Defeated - Quarkslab's blog
    May 18, 2021 · We have demonstrated the possibility to reset completely a MIFARE Ultralight EV1 counter despite its anti-tearing features and we reported the issue to NXP.Missing: flipping 2012<|separator|>
  64. [64]
    [PDF] The Fall of a Tiny Star - Flavio D. Garcia
    Verdult quickly found out that the disposable cards were MIFARE Ultralight. This kind of card does not support any cryptography and the only security mechanism.
  65. [65]
    NXP's MIFARE 2GO and Google Pay Transform Public Transportation
    Mar 19, 2018 · Companies integrate NXP's MIFARE 2GO with Google Pay to provide seamless mobile travel experiences.
  66. [66]
    MIFARE Cards: A Comprehensive Guide for Beginners - Nexqo
    Dec 15, 2023 · MIFARE cards were first introduced in 1994 by Philips (now NXP Semiconductors), as a brand name for their contactless smart card products. The ...What are MIFARE cards? · The history of MIFARE cards · The types of MIFARE cards
  67. [67]
    City of Istanbul Selects NXP's Multi-Application ID Technology for ...
    With over 4.5 million Istanbulkarts already deployed in recent months, the MIFARE DESFire-based system delivers an improved level of service, as well as a ...
  68. [68]
    What is a MIFARE Card? - Oomph Made
    Jul 1, 2025 · Introduced in 1994, MIFARE was the world's first contactless ISO/IEC 14443 memory IC with built-in cryptography. Owned and developed by NXP ...
  69. [69]
    Transport Ticketing - NXP Semiconductors
    Our secure RAIN RFID ICs support hands-free access in public transport, which makes it easier to get around without having to tap a card or ticket to a reader.
  70. [70]
    Transit Payment Security Solutionss | NXP Semiconductors
    Dec 2, 2014 · Virtual MIFARE tickets on a smartphone make transport that much easier. You can use your phone for anywhere, anytime ticket purchases – there's no need to wait ...Missing: value gates
  71. [71]
    MIFARE DESFire EV2 - NXP Semiconductors
    ... MIFARE DESFire EV2 card can hold as many applications as the memory can accommodate. Each application can hold up to 32 files with various data configurations.
  72. [72]
    How To Choose Mifare DESFire Ev1 Or Ev2-www.s4a-access.com
    In this blog, we'll examine the differences between the two and hopefully demonstrate why the latter is the better choice for access control.
  73. [73]
    Access Management - NXP Semiconductors
    Physical and logical access control solutions from NXP spanning MIFARE cards, NFC and UWB technologies for seamless building and device security.
  74. [74]
    MIFARE DESFire - Universal Smart Cards
    This allows universities to issue DESFire cards as student ID badges that also work with any of the existing campus applications including: access control ...
  75. [75]
    HID® MIFARE Classic/HID Prox™ 1431 Combo Card | HID Global
    ... photo ID cards. Securely separated sectors enable multiple applications and support future growth. Different keys can protect read/write operations to build ...
  76. [76]
  77. [77]
    MIFARE Ultralight AES - NXP Semiconductors
    The MIFARE Ultralight AES IC delivers a new level of trust for limited-use tickets and key cards by supporting AES cryptographic authentication.Missing: core | Show results with:core<|control11|><|separator|>
  78. [78]
    Finger and MiFare Classic Card Based Biometric Access Control ...
    Matrix offers Finger and MiFare Classic Card Based Biometric Access Control Reader with Built-in Buzzer Alert System with Tamper Detection !!
  79. [79]
    How to Choose an Elevator Access Control Security System - Avigilon
    Elevator access control consists of both hardware and software that regulate who can call or enter an elevator in a building.Missing: MIFARE CCTV
  80. [80]
  81. [81]
    MIFARE: Contactless NFC Solutions - NXP Semiconductors
    MIFARE provides NFC-enabled contactless solutions in multiple form factors for a range of applications, including smart car access and smart cards.
  82. [82]
    Closed Loop Devices - Cashless - Crane Payment Innovations
    Closed loop solutions let customers load credit on MIFARE media to make vending purchases. Site operators offer loyalty rewards, promos, and discounts to ...
  83. [83]
    US8799085B2 - Redeeming coupons using NFC - Google Patents
    The invention describes how a consumer can hold their NFC enabled device in proximity to an NFC enabled point-of-sale terminal and with a single “wave” or “tap ...
  84. [84]
    [PDF] MIFARE Ultralight AES features and hints - NXP Semiconductors
    Feb 22, 2022 · For MIFARE Ultralight AES with 144 bytes of user memory, the lock bytes 2, 3 and 4 are located at page 28h.Missing: models structure
  85. [85]
    What are diversified security keys? - Idesco
    Diversified security keys gives each transponder its own, unique security key. With 128-bit AES encryption protecting it, DESFire already provides effectively ...Missing: integrity anti-
  86. [86]
    [PDF] AN10975 MIFARE SAM AV2 Documentation and Sampling
    Sep 11, 2013 · MIFARE SAMs (Secure Application Module) have been designed to provide the secure storage of cryptographic keys and cryptographic functions for ...<|control11|><|separator|>
  87. [87]
    [PDF] AN10922 Symmetric key diversifications - NXP Semiconductors
    Jul 2, 2019 · MIFARE. SAM AV3 can be an optimum secure solution for this key diversification process. The master (base) key can be stored securely in the ...Missing: management | Show results with:management
  88. [88]
    MIFARE Classic EV1 1K - 4K - NXP Semiconductors
    EEPROM. 1 kB - 4 kB, organized in 16 sectors with 4 blocks of 16 bytes each (one block consists of 16 bytes); User-definable access conditions for each memory ...
  89. [89]
    Multi-Technology Cards with MIFARE Classic / MIFARE DESFire
    Jan 23, 2019 · Ideal Migration Solution – Multi-application card that supports two 13.56 MHz read/write contactless chips that are fully compatible with MIFARE ...
  90. [90]
    5 Ways to Solve the Difficulty of RFID Reading Distance Problem
    Mifare Classic series (such as Mifare 1K and Mifare 4K): The reading distance is generally 2-10 cm, widely used in bus cards, access control cards, hotel door ...
  91. [91]
    [PDF] MFRC630 High performance MIFARE reader solution - AdvanIDe
    Feb 11, 2016 · The digital module manages the complete ISO/IEC 14443A framing and error detection functionality (parity and CRC). The MFRC630 supports MIFARE ...Missing: placement | Show results with:placement
  92. [92]
    EMVCo Trademark License Agreement For Non-Payment Uses of ...
    The applicable MiFARE protocols published by NXP Semiconductors NV; The applicable FeliCa protocols published by Sony Corporation. Schedule 2. Permitted Uses.
  93. [93]
    [PDF] NXP® MIFARE Ultralight® C
    NXP®. MIFARE. Ultralight® C. KEY FEATURES. ▻ Fully ISO/IEC 14443 A 3 compliant. ▻ NFC Forum Type 2 Tag compliant. ▻ 144 byte EEPROM user memory.
  94. [94]
    MIFARE SAM AV3 - NXP Semiconductors
    The MIFARE SAM AV3 (secure access module) is designed for flexible performance in today's IoT edge nodes, as it helps to secure keys and protect assets.Missing: offline | Show results with:offline
  95. [95]
    MIFARE Functional and Security Certifications - NXP Semiconductors
    NXP MIFARE certification ensures conformity and interoperability with MIFARE products including smart cards and terminals or readers.
  96. [96]
    [PDF] AN10969 - NXP Semiconductors
    Apr 22, 2020 · Fraud detection: The ability to find out that a fraudulent card exists. 3. Mechanism to stop deployment of fraudulent cards: This can be either ...