Brute Force Cryptanalysis of MIFARE Classic Cards on GPU

Cihangir Tezcan

2017

Abstract

MIFARE Classic is the most widely deployed contactless smartcard on the market. However, many active and passive attacks are provided after its proprietary stream cipher CRYPTO1 was reverse engineered. The short 48-bit key of the CRYPTO1 cipher, leaked parity bits and the encrypted error code that is sent after a failed authentication (which is corrected in the hardened new cards) allow the adversary to perform offline brute force attack and avoid detection. Such an attack requires wireless interaction with a card for less than a second and then a brute force attack which was shown to take around 9 days on a single GTX280 GPU.We optimized this brute force attack on modern GPUs by using bitsliced implementation technique and observed that a brute force attack on a GTX970 GPU can be performed in less than 5 hours. Although this attack is not applicable to hardened MIFARE Classic cards, a similar attack using the short key length and the leaked parity bits can be performed when a single key is known, possibly using the default keys for unused sectors. Such an attack requires wireless interaction with a card for less than a second and then a brute force attack which was shown to take approximately one month on a single GTX460 GPU. Our bitsliced implementation of this attack takes less than 7 hours on a GTX970 GPU.

Download


Paper Citation


in Harvard Style

Tezcan C. (2017). Brute Force Cryptanalysis of MIFARE Classic Cards on GPU . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 524-528. DOI: 10.5220/0006262705240528

in Bibtex Style

@conference{icissp17,
author={Cihangir Tezcan},
title={Brute Force Cryptanalysis of MIFARE Classic Cards on GPU},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={524-528},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006262705240528},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Brute Force Cryptanalysis of MIFARE Classic Cards on GPU
SN - 978-989-758-209-7
AU - Tezcan C.
PY - 2017
SP - 524
EP - 528
DO - 10.5220/0006262705240528