LIS Links

First and Largest Academic Social Network of LIS Professionals in India

Latest Activity

RAKESH KUMAR updated their profile
1 hour ago
mukesh left a comment for Dr Nupur Srivastava
8 hours ago
mukesh left a comment for Dr Nupur Srivastava
8 hours ago
mukesh and Dr. Badan Barman are now friends
10 hours ago
Shakeel Ahmad Mir updated their profile
Tuesday
Dr. U. PRAMANATHAN posted a blog post
Monday
Dr. U. PRAMANATHAN posted an event
Oct 23
Dr. U. PRAMANATHAN is now friends with Sumit Sundar Ray and HINGE RAMAKANTH
Oct 23
Dr. Sheel Bhadra Yadav posted an event

Request to Participate in Research Study on AI Adoption in LIS at India

October 19, 2025 at 6pm to November 30, 2025 at 7pm
Oct 23
Dr. O Seshaiaih posted a discussion
Oct 23
Dr. N K Pachauri posted a discussion
Oct 23
Dr. U. PRAMANATHAN posted a discussion
Oct 23
Dr.Stephen.G updated their profile
Oct 21
Dr.Stephen.G and KADARI NAVEEN KUMAR are now friends
Oct 21
Dr. Sheel Bhadra Yadav updated their profile
Oct 18
jignesh nakum updated their profile
Oct 16
Dr. Badan Barman posted a blog post
Oct 15
Dr. Nilanjana Purkayastha posted an event
Thumbnail

ICSSSM 2025: First International Conference on Smart Systems and Social Management at The Assam Royal Global University, Guwahati

November 6, 2025 to November 8, 2025
Oct 15
Dr. Badan Barman and Geetanjali Tiwari are now friends
Oct 15
Pabitra Kumar Choudhury posted an event
Thumbnail

22nd MANLIBNET Convention and International Conference on Marching Beyond the Libraries: Talent, Technology, and Transformation (ICMBL) at KIIT Deemed to be University, Bhubaneswar, Odisha

December 18, 2025 at 9:30am to December 20, 2025 at 7:30pm
Oct 15

German researchers crack RFID smartcard encryption

 

German researchers have cracked the encryption used to protect a type of smartcard whose functions range from restricting access to buildings to processing public transit system payments.

The team demonstrated a hack that can duplicate the magnetic security card and break a previous version of contactless ID cards from Mifare in 2008.

"The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated measurements of electricity consumption during encryption and decryption. This can be determined by measuring the magnetic field close to the card," The Hacker News said.

It was this same team that broke a previous version of contactless-ID cards from Mifare in 2008.

At the time, the intrusion prompted Mifare to upgrade its security to create a card able to be programmed only once.

The upgrade also contained a unique identifying number that could be checked against the programmed content on the card for extra security.

A separate article on IT World identified the researchers who worked on both cracks as David Oswald and Christof Paar at Ruhr University in Germany.

In their cracks, the team used a probe and oscilloscope to record the card's broadcasts while it's being read by and RFID reader.

The researchers needed about seven hours to crack the security on one card and get its 112-bit encryption key, the IT World article said.

However, they said it only works if one spent months profiling the card's architecture, behavior and responses.

They also noted the weak point for the MF31CD40 – and many of NXD's other cards, which were the ones cracked – is that it does little or nothing to resist being recorded, prodded and poked by crackers.

The EV1 upgrade to that card has an on-chip backup management systems, an authentication mechanism that uses three separate authentication methods, encryption based on the 3DES hardware encryption that meets security requirements for most U.S. government agencies, but is compatible with existing systems designed to read the card using Near Field Communications (NFC) radio systems.

Views: 165

Reply to This

© 2025   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

Koha Workshop