Latest Activity

Nagendra N updated their profile
yesterday
Pallavi Sushant Sapkal and S. Jaffer Basha are now friends
Monday
Dr. Divyanshu Gupta updated their profile
Mar 20
Nilesh and Dr. Badan Barman are now friends
Mar 19
Dr. Gulshan Kumar Sachdeva updated their profile
Mar 17
Dr. Gulshan Kumar Sachdeva and sandeep shukla are now friends
Mar 17
Devendra Parker joined Dr. Badan Barman's group
Mar 17
Manoj Kumar updated their profile
Mar 15
Ranjansen Shende updated their profile
Mar 15
Ku. Dipti Lodwal joined Dr. Badan Barman's group
Mar 13
Ku. Dipti Lodwal joined Dr. Badan Barman's group
Mar 13
Ku. Dipti Lodwal left a comment for Arun kumar Sirla
Mar 13
Ku. Dipti Lodwal left a comment for Vikrant Dubey
Mar 13
Ku. Dipti Lodwal posted a status
Mar 13
Ku. Dipti Lodwal commented on Ku. Dipti Lodwal's event 'Two Days International Seminar'
Mar 12
sangeeta sharma is attending Dr. Ashis Biswas's event
Mar 11
sangeeta sharma commented on Ku. Dipti Lodwal's event 'Two Days International Seminar'
Mar 11
sangeeta sharma updated their profile
Mar 11
sangeeta sharma is attending Ku. Dipti Lodwal's event
Thumbnail

Two Days International Seminar at Government Law College Ujjain (Madhya Pradesh)

March 28, 2026 at 10:30am to March 29, 2026 at 5:30pm
Mar 10
Dr. U. PRAMANATHAN posted an event

Gokhale Institute of Politics and Economics (GIPE), Pune, is organizing a National Workshop on DSpace 9.0, which will be held from 08–10 April 2026 at Gokhale Institute of Politics and Economics (GIPE), Pune

April 8, 2026 at 9am to April 10, 2026 at 5:30pm
Mar 3

German researchers crack RFID smartcard encryption

 

German researchers have cracked the encryption used to protect a type of smartcard whose functions range from restricting access to buildings to processing public transit system payments.

The team demonstrated a hack that can duplicate the magnetic security card and break a previous version of contactless ID cards from Mifare in 2008.

"The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated measurements of electricity consumption during encryption and decryption. This can be determined by measuring the magnetic field close to the card," The Hacker News said.

It was this same team that broke a previous version of contactless-ID cards from Mifare in 2008.

At the time, the intrusion prompted Mifare to upgrade its security to create a card able to be programmed only once.

The upgrade also contained a unique identifying number that could be checked against the programmed content on the card for extra security.

A separate article on IT World identified the researchers who worked on both cracks as David Oswald and Christof Paar at Ruhr University in Germany.

In their cracks, the team used a probe and oscilloscope to record the card's broadcasts while it's being read by and RFID reader.

The researchers needed about seven hours to crack the security on one card and get its 112-bit encryption key, the IT World article said.

However, they said it only works if one spent months profiling the card's architecture, behavior and responses.

They also noted the weak point for the MF31CD40 – and many of NXD's other cards, which were the ones cracked – is that it does little or nothing to resist being recorded, prodded and poked by crackers.

The EV1 upgrade to that card has an on-chip backup management systems, an authentication mechanism that uses three separate authentication methods, encryption based on the 3DES hardware encryption that meets security requirements for most U.S. government agencies, but is compatible with existing systems designed to read the card using Near Field Communications (NFC) radio systems.

Views: 170

Reply to This

© 2026   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

LIS Links whatsApp