Crypto-1 Cryptanalysis Coverage
Wednesday, April 16th, 2008ComputerWorld has an article about the new cryptanalysis of Crypto-1 results:
MiFare RFID crack more extensive than previously thought: Seconds, not hours, to effect; plus version tappable too, ComputerWorld, 15 April 2008.
The ubiquitous MiFare Classic RFID chip — used daily by millions worldwide in access control keys, subway passes and other applications — is even easier to crack than previously thought, according to security researchers who announced the development Tuesday at EuroCrypt, an international cryptography conference in Istanbul.
Mere seconds are all that is required to crack the chip’s security — not a few hours, as estimated last month. Karsten Nohl, a computer science graduate student and one of the masterminds behind reverse-engineering MiFare security, said in an interview that it now takes only 12 seconds to recover the key on a MiFare Classic card on an ordinary laptop.
On Monday, the Dutch government issued a final report arriving at the decisive conclusion that the chips, used by millions of citizens in the Netherlands, must be replaced. An earlier Dutch report had stated that a security breach on the MiFare cards was possible, but would be too unwieldy for the average attacker to accomplish.
There is also a series of articles in the Brisbane Times (Austrailia):
- Go cards ‘doomed’ over security, Brisbane Times, April 11, 2008.
- Reveal contract details: Opposition, Brisbane Times, April 11, 2008. (This one is mostly political.)
- New report slams go card security, Brisbane Times, April 16, 2008.
Other articles include: Dutch transit card crippled by multihacks, The Register, 16 April 2008.