bachelor
bachelor
bachelor
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
1.2 Technology and card layout 7<br />
Figure 1.1: The Mifare memory layout. Figure by de Koning Gans et. al, used<br />
with permission.<br />
• Access control: 3 bytes. These bits define the access conditions for the<br />
sector. See 1.2.3.3 for a list of functions these bytes govern access to.<br />
• An unused byte.<br />
• Key B: 6 bytes. This is the secondary key. It can have access control<br />
separate to key A,<br />
The first block of the first sector of every Mifare card is a little special; it is<br />
burned into the card and cannot be changed, ever. It contains the manufacturer<br />
data of the card, including the cards unique ID. For this reason sector 0 only<br />
has only two writable blocks instead of three, see Figure 1.1.<br />
1.2.3.3 Challenge/response<br />
Mifare implements a challenge/response protocol that must be satisfied before<br />
a terminal can log in to a card. The protocol is described in [3], and can be<br />
described in plain text as seen in Figure 1.2.<br />
After authenticating to the sector, the card provides the following actions, for<br />
some given block in the sector: