dc.contributor.authorLoh, Sheng Long
dc.date.accessioned2014-04-17T05:27:56Z
dc.date.available2014-04-17T05:27:56Z
dc.date.copyright2014en_US
dc.date.issued2014
dc.identifier.urihttp://hdl.handle.net/10356/58959
dc.description.abstractThe MIFARE Classic is the most widely used contactless smart card chip in the world. Its design and implementation details are kept secret by its manufacturer but several academic researchers have already cracked the encryption. Arduino is a programmable single-board microcontroller. It has gained popularity among the DIY community in the recent years. Any hobbyist is able to purchase one because it is readily available, relatively inexpensive, easy to develop and simple to setup. This project aims to study the architecture of MIFARE Classis, understand the weaknesses in its security and investigate the feasibility of exploiting those vulnerabilities using a DIY Arduino project setup. I will illustrate how the MIFARE Classic operates as a contactless smart card as well as the cryptosystem employs by MIFARE Classic. I will also break down the architecture of MIFARE Classic to explain its weaknesses. Last but not least, I will justify why it is not feasible to mount a cryptographic attack with just a simple DIY Arduino setup.en_US
dc.format.extent40 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Computer science and engineering::Hardware::Input/output and data communicationsen_US
dc.titleSecurity analysis of contactless cardsen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorWoo Wing Keongen_US
dc.contributor.schoolSchool of Computer Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
dc.contributor.supervisor2Teo Kian Jin, Jasonen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record