All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Emulator of Contactless Smart Cards in FPGA

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F17%3A00312321" target="_blank" >RIV/68407700:21240/17:00312321 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.1109/MECO.2017.7977169" target="_blank" >http://dx.doi.org/10.1109/MECO.2017.7977169</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/MECO.2017.7977169" target="_blank" >10.1109/MECO.2017.7977169</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Emulator of Contactless Smart Cards in FPGA

  • Original language description

    This paper describes implementation of contactless smart card emulator compliant with ISO/IEC 14443 in Field Programmable Gate Array (FPGA). Systems using contactless smart cards are widely used and some of these systems are not secured properly. For example in many such systems smart card Unique Identifier (UID) is used as the only one authentication mean. As the UID is not encrypted and is read from the card in plain, it is easy to make a copy of the smart card and use the clone as the original card. In this work we describe emulator of a smart card implemented in FPGA which is able to spoof some genuine smart card. Emulator described in this work emulates protocol described in ISO/IEC 14443 standard, which in detail describes all aspects of RFID smart cards (from physical attributes of both - cards and readers - to communication by digital signals). The emulator is able to come through the whole card selection process and to spoof the real smart card with given UID. Moreover emulator can be selected also for higher application layer protocol communication. If we know the proprietary application layer protocol, emulator is able to spoof communication on this protocol with data recorded in it. This functionality was successfully tested on systems used at Czech Technical University in Prague, where the weak implementation of UID as the only one authentication mean is used. Emulator is responding faster than most of other existing smart card emulators thanks to high efficient implementation in hardware.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    20206 - Computer hardware and architecture

Result continuities

  • Project

    <a href="/en/project/GA16-05179S" target="_blank" >GA16-05179S: Fault-Tolerant and Attack-Resistant Architectures Based on Programmable Devices: Research of Interplay and Common Features</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2017

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of the 6th Mediterranean Conference on Embedded Computing (MECO 2017)

  • ISBN

    978-1-5090-6741-1

  • ISSN

  • e-ISSN

  • Number of pages

    4

  • Pages from-to

    96-99

  • Publisher name

    IEEE (Institute of Electrical and Electronics Engineers)

  • Place of publication

  • Event location

    Bar

  • Event date

    Jun 11, 2017

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000428759500028