Peeling Away Layers of an RFID Security System

@inproceedings{Pltz2011PeelingAL,
  title={Peeling Away Layers of an RFID Security System},
  author={H. Pl{\"o}tz and Karsten Nohl},
  booktitle={Financial Cryptography},
  year={2011}
}
  • H. Plötz, Karsten Nohl
  • Published in Financial Cryptography 2011
  • Computer Science
  • The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. [...] Key Result Beyond these card weaknesses, we find that Legic's trust delegation model can be abused to create master tokens for all Legic installations.Expand Abstract
    11 Citations
    A Toolbox for RFID Protocol Analysis
    • 16
    • PDF
    Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research
    • 17
    RFID communication: How well protected against reverse engineering?
    • A. Mednis, R. Zviedris
    • Computer Science
    • 2012 Second International Conference on Digital Information Processing and Communications (ICDIPC)
    • 2012
    • 3
    • PDF
    Wirelessly lockpicking a smart card reader
    • 6
    • PDF
    Do you trust the cryptography used in your devices
    • PDF
    The (in)security of proprietary cryptography
    • 43
    Dismantling iClass and iClass Elite
    • 23
    • PDF
    Security analysis of a widely deployed locking system
    • 7
    Radboud Repository of the Radboud University Nijmegen
    • putte о.р, KRELING O.P, DE DOGMATISCHE, WAARDE VAN DE THEOLOGISCHE, Jacobo van der Putte
    • 2018
    • PDF
    Evaluation of Practical Attacks Against RFID Technology
    • PDF

    References

    SHOWING 1-6 OF 6 REFERENCES
    Reverse-Engineering a Cryptographic RFID Tag
    • 275
    • PDF
    Security Analysis of a Cryptographically-Enabled RFID Device
    • 310
    • PDF
    Cryptographic Implementation of a Tree Hierarchy for Access Control
    • R. Sandhu
    • Mathematics, Computer Science
    • Inf. Process. Lett.
    • 1988
    • 270
    Article ISO14443 " in the openpcd wiki, section " LEGIC RF " , revision as of 00
    • Article ISO14443 " in the openpcd wiki, section " LEGIC RF " , revision as of 00
    • 2010
    ISO 14443 Part 2 Amendment 1, dRAFT 2nd P-DAM BALLOT TEXT 3. PROXMARK III community
    • ISO 14443 Part 2 Amendment 1, dRAFT 2nd P-DAM BALLOT TEXT 3. PROXMARK III community