2012
DOI: 10.1007/978-3-642-33167-1_40
|View full text |Cite
|
Sign up to set email alerts
|

Dismantling iClass and iClass Elite

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…In other tokens, like HID iClass similar flaws were found [5]. Insecure RFID technologies were also found in Hitag2 car keys [20].…”
Section: Introductionmentioning
confidence: 80%
See 1 more Smart Citation
“…In other tokens, like HID iClass similar flaws were found [5]. Insecure RFID technologies were also found in Hitag2 car keys [20].…”
Section: Introductionmentioning
confidence: 80%
“…Writing a new serial number is performed in a non-standard way. Each written bit is followed by 10 ms high state delay on the bus (5). The whole procedure is finished in about 680 ms.…”
Section: Contactless Rfid Tokens For Access Managementmentioning
confidence: 99%
“…Based on the latest results [7], their secret keys can be extracted in six minutes. Further insecure products for access control include HID Global iClass [8] and Legic Prime cards, both based on highly ineffective cryptographic measures [9].…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, each cell update incorporates an 8-bit chaining value z i , which is the result of the update of the preceding cell. The update equation for the successive state x i from x i is given as x i = y i + z i + x i mod 2 8 . There are basically three ways the chaining value is computed for any round r with 0 ≤ r ≤ 7:…”
Section: Fig 4 Structure Of the Obscurity Functionmentioning
confidence: 99%
“…Despite this, they already managed to find critical flaws in several widely deployed devices. For example, Texas Instruments' Digital Signature Transponder was successfully attacked in 2005 [2]; Mifare Classic was completely "dismantled" by several research teams [3]; critical flaws in the KeeLoq ignition car system were revealed [4] and later improved upon; serious weaknesses were found in iClass [5] and Hitag2 [6]; DES-Fire MF3ICD40 was shown to suffer from sidechannel attacks [7], etc. This enumeration is long and quite worrying.…”
Section: Introductionmentioning
confidence: 99%