Peeling Away Layers of an RFID Security System

@inproceedings{Pltz2011PeelingAL,
  title={Peeling Away Layers of an RFID Security System},
  author={Henryk Pl{\"o}tz and Karsten Nohl},
  booktitle={Financial Cryptography},
  year={2011}
}
  • Henryk Plötz, Karsten Nohl
  • Published in Financial Cryptography 2011
  • Computer Science
  • Highlight Information
    The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. [...] Key Result Beyond these card weaknesses, we find that Legic's trust delegation model can be abused to create master tokens for all Legic installations.Expand Abstract

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 11 CITATIONS

    Radboud Repository of the Radboud University Nijmegen

    • putte о.р, KRELING O.P, DE DOGMATISCHE, WAARDE VAN DE THEOLOGISCHE, Jacobo van der Putte
    • 2018

    Wirelessly lockpicking a smart card reader

    A Toolbox for RFID Protocol Analysis

    RFID communication: How well protected against reverse engineering?

    • Artis Mednis, Reinholds Zviedris
    • Computer Science
    • 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC)
    • 2012
    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-4 OF 4 REFERENCES

    Reverse-Engineering a Cryptographic RFID Tag

    VIEW 2 EXCERPTS

    Security Analysis of a Cryptographically-Enabled RFID Device

    VIEW 1 EXCERPT

    Cryptographic Implementation of a Tree Hierarchy for Access Control

    VIEW 1 EXCERPT