Peeling Away Layers of an RFID Security System


The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. The employed algorithms rely on obscurity and consequently did not withstand scrutiny. This paper details how the algorithms were found from opening silicon chips as well as interacting with tags and readers. The security of the tags is based on several… (More)
DOI: 10.1007/978-3-642-27576-0_17


5 Figures and Tables

Cite this paper

@inproceedings{Pltz2011PeelingAL, title={Peeling Away Layers of an RFID Security System}, author={Henryk Pl{\"o}tz and Karsten Nohl}, booktitle={Financial Cryptography}, year={2011} }