Emulator of Contactless Smart Cards in FPGA
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21240%2F16%3A00301817" target="_blank" >RIV/68407700:21240/16:00301817 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Emulator of Contactless Smart Cards in FPGA
Popis výsledku v původním jazyce
This paper describes implementation of contactless smart card emulator compliant with ISO/IEC 14443 in FPGA. Systems using contactless smart cards are widely used and some of these systems are not secured properly. For example in many such systems UID (unique identifier) is used as the only one authentication mean. As the UID is not encrypted and is read from the card in plain, it is easy to make a copy of the smart card and use the clone as the original card. In this work we describe emulator of a smart card implemented in FPGA which is able to spoof some genuine smart card Emulator then can be used to spoof some other card successfully. Emulator described in this work emulates protocol described in parts from 1 to 3 of ISO/IEC 14443 standard. So emulator is able to come through whole card selection process and so spoof the real smart card with given UID. This functionality was successfully tested on systems used at CTU in Prague, where the weak implementation of UID as the only one authentication mean is used. If the last part of the standard would be implemented, this device should be used as part of relay attack system. This is possible thanks to high efficient implementation in hardware and thus possibility to overcome proximity–check protection.
Název v anglickém jazyce
Emulator of Contactless Smart Cards in FPGA
Popis výsledku anglicky
This paper describes implementation of contactless smart card emulator compliant with ISO/IEC 14443 in FPGA. Systems using contactless smart cards are widely used and some of these systems are not secured properly. For example in many such systems UID (unique identifier) is used as the only one authentication mean. As the UID is not encrypted and is read from the card in plain, it is easy to make a copy of the smart card and use the clone as the original card. In this work we describe emulator of a smart card implemented in FPGA which is able to spoof some genuine smart card Emulator then can be used to spoof some other card successfully. Emulator described in this work emulates protocol described in parts from 1 to 3 of ISO/IEC 14443 standard. So emulator is able to come through whole card selection process and so spoof the real smart card with given UID. This functionality was successfully tested on systems used at CTU in Prague, where the weak implementation of UID as the only one authentication mean is used. If the last part of the standard would be implemented, this device should be used as part of relay attack system. This is possible thanks to high efficient implementation in hardware and thus possibility to overcome proximity–check protection.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2016
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of the 4th Prague Embedded Systems Workshop
ISBN
978-80-01-05984-5
ISSN
—
e-ISSN
—
Počet stran výsledku
6
Strana od-do
—
Název nakladatele
ČVUT FIT, Katedra číslicového návrhu
Místo vydání
Praha
Místo konání akce
Roztoky u Prahy
Datum konání akce
30. 6. 2016
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—