Emulator of Contactless Smart Cards in FPGA
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F17%3A00312321" target="_blank" >RIV/68407700:21240/17:00312321 - isvavai.cz</a>
Result on the web
<a href="http://dx.doi.org/10.1109/MECO.2017.7977169" target="_blank" >http://dx.doi.org/10.1109/MECO.2017.7977169</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/MECO.2017.7977169" target="_blank" >10.1109/MECO.2017.7977169</a>
Alternative languages
Result language
angličtina
Original language name
Emulator of Contactless Smart Cards in FPGA
Original language description
This paper describes implementation of contactless smart card emulator compliant with ISO/IEC 14443 in Field Programmable Gate Array (FPGA). Systems using contactless smart cards are widely used and some of these systems are not secured properly. For example in many such systems smart card Unique Identifier (UID) is used as the only one authentication mean. As the UID is not encrypted and is read from the card in plain, it is easy to make a copy of the smart card and use the clone as the original card. In this work we describe emulator of a smart card implemented in FPGA which is able to spoof some genuine smart card. Emulator described in this work emulates protocol described in ISO/IEC 14443 standard, which in detail describes all aspects of RFID smart cards (from physical attributes of both - cards and readers - to communication by digital signals). The emulator is able to come through the whole card selection process and to spoof the real smart card with given UID. Moreover emulator can be selected also for higher application layer protocol communication. If we know the proprietary application layer protocol, emulator is able to spoof communication on this protocol with data recorded in it. This functionality was successfully tested on systems used at Czech Technical University in Prague, where the weak implementation of UID as the only one authentication mean is used. Emulator is responding faster than most of other existing smart card emulators thanks to high efficient implementation in hardware.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
20206 - Computer hardware and architecture
Result continuities
Project
<a href="/en/project/GA16-05179S" target="_blank" >GA16-05179S: Fault-Tolerant and Attack-Resistant Architectures Based on Programmable Devices: Research of Interplay and Common Features</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2017
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
Proceedings of the 6th Mediterranean Conference on Embedded Computing (MECO 2017)
ISBN
978-1-5090-6741-1
ISSN
—
e-ISSN
—
Number of pages
4
Pages from-to
96-99
Publisher name
IEEE (Institute of Electrical and Electronics Engineers)
Place of publication
—
Event location
Bar
Event date
Jun 11, 2017
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000428759500028