Peeling Away Layers of an RFID Security System
@inproceedings{Pltz2011PeelingAL, title={Peeling Away Layers of an RFID Security System}, author={H. Pl{\"o}tz and Karsten Nohl}, booktitle={Financial Cryptography}, year={2011} }
The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. [...] Key Result Beyond these card weaknesses, we find that Legic's trust delegation model can be abused to create master tokens for all Legic installations.Expand Abstract
11 Citations
RFID communication: How well protected against reverse engineering?
- Computer Science
- 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC)
- 2012
- 3
- PDF
Wirelessly lockpicking a smart card reader
- Computer Science
- International Journal of Information Security
- 2014
- 6
- PDF
References
SHOWING 1-6 OF 6 REFERENCES
Security Analysis of a Cryptographically-Enabled RFID Device
- Computer Science
- USENIX Security Symposium
- 2005
- 310
- PDF
Cryptographic Implementation of a Tree Hierarchy for Access Control
- Mathematics, Computer Science
- Inf. Process. Lett.
- 1988
- 270
Article ISO14443 " in the openpcd wiki, section " LEGIC RF " , revision as of 00
- Article ISO14443 " in the openpcd wiki, section " LEGIC RF " , revision as of 00
- 2010
ISO 14443 Part 2 Amendment 1, dRAFT 2nd P-DAM BALLOT TEXT 3. PROXMARK III community
- ISO 14443 Part 2 Amendment 1, dRAFT 2nd P-DAM BALLOT TEXT 3. PROXMARK III community