26.12.2014 Views

bachelor

bachelor

bachelor

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.2 Technology and card layout 7<br />

Figure 1.1: The Mifare memory layout. Figure by de Koning Gans et. al, used<br />

with permission.<br />

• Access control: 3 bytes. These bits define the access conditions for the<br />

sector. See 1.2.3.3 for a list of functions these bytes govern access to.<br />

• An unused byte.<br />

• Key B: 6 bytes. This is the secondary key. It can have access control<br />

separate to key A,<br />

The first block of the first sector of every Mifare card is a little special; it is<br />

burned into the card and cannot be changed, ever. It contains the manufacturer<br />

data of the card, including the cards unique ID. For this reason sector 0 only<br />

has only two writable blocks instead of three, see Figure 1.1.<br />

1.2.3.3 Challenge/response<br />

Mifare implements a challenge/response protocol that must be satisfied before<br />

a terminal can log in to a card. The protocol is described in [3], and can be<br />

described in plain text as seen in Figure 1.2.<br />

After authenticating to the sector, the card provides the following actions, for<br />

some given block in the sector:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!