Welcome![Sign In][Sign Up]
Location:
Search - MiFare Classic to

Search list

[SCM1

Description: Mifare 读写示范程序,完整Keil工程文件-Mifare reader demonstration program, complete engineering documents Keil
Platform: | Size: 52224 | Author: 吴生 | Hits:

[transportation applicationsrfid

Description: usin rgm130 to read and write on mifare ik classic
Platform: | Size: 237568 | Author: ashkan | Hits:

[Software EngineeringMF_RC531_scn

Description: MF RC531 是应用于13.56MHz 非接触式通 信中高集成读写卡芯片系列中的一员。该读写卡 芯片系列利用了先进的调制和解调概念,完全集 成了在13.56MHz 下所有类型的被动非接触式通 信方式和协议。芯片管脚兼容MF RC500、MF RC530 和SL RC400。 MF RC531 支持ISO/IEC14443A/B 的所有层 和MIFARE® 经典协议,以及与该标准兼容的标 准。支持高速MIFARE® 非接触式通信波特率。内部的发送器部分不需要增加有源电路就 能够直接驱动近操作距离的天线(可达100mm)。接收器部分提供一个坚固而有效的解调 和解码电路,用于ISO14443A 兼容的应答器信号。数字部分处理ISO14443A 帧和错误检 测(奇偶&CRC)。此外,它还支持快速CRYPTO1 加密算法,用于验证MIFARE 系列产 品。与主机通信模式有8 位并行和SPI 模式,用户可根据不同的需求选择不同的模式,这 样给读卡器/终端的设计提供了极大的灵活性。 2.特-MF RC531 is applied to 13.56MHz contactless communication highly integrated chip card reader in a series. The card reader chip series use advanced modulation and demodulation concept completely integrated in all types of passive 13.56MHz contactless communication methods and protocols. Chip pin compatible MF RC500, MF RC530 and the SL RC400. MF RC531 supports all layers ISO/IEC14443A/B and MIFARE Classic protocol, and is compatible with the standard criteria. MIFARE contactless support high-speed communication baud rate. The transmitter does not need to increase the active part of the internal circuit can directly drive the operation of the antenna near distance (up to 100mm). The receiver part provides a robust and effective demodulation and decoding circuitry for ISO14443A compatible transponder signal. The digital part handles ISO14443A framing and error detection (Parity & CRC). In addition, it supports fast CRYPTO1 encryption algorithm used to verify the MIFARE products. Commu
Platform: | Size: 352256 | Author: 余威 | Hits:

[Driver DevelopRc523_Mfc

Description: 通过NXP NFC Reader IC RC523 读取Mifare classic card,配合NXPRdLib使用(NXP官网下载) -Read mifare classic card with RC523(NXP NFC Reader IC).need to download NXPRdLib www.NXP.com
Platform: | Size: 34816 | Author: yeqin | Hits:

[Embeded-SCM DevelopMifare-crack-Hack

Description: 这是一个Mifare 卡的解密方法的文档。可以用文中的方法获取Mifare 的密钥。-This document describes a method to dismantle MIFARE Classic.
Platform: | Size: 510976 | Author: Ge,jiliang | Hits:

[Othermfrc522程序注释

Description: MF RC522支持ISO/IEC14443A/B的所有层和MIFARE?经典协议,以及与该标准兼容的标准。支持高速MIFARE?非接触式通信波特率。内部的发送器部分不需要增加有源电路就能够直接驱动近操作距离的天线(可达100mm)。接收器部分提供一个坚固而有效的解调和解码电路,用于ISO14443A兼容的应答器信号。数字部分处理ISO14443A帧和错误检测(奇偶&CRC)。此外,它还支持快速CRYPTO1加密算法,用于验证MIFARE系列产品。与主机通信模式有8位并行和SPI模式,用户可根据不同的需求选择不同的模式,这样给读卡器/终端的设计提供了极大的灵活性。(MF RC522 supports all layers of ISO/IEC14443A/B and the classic MIFARE protocol, as well as standards compatible with this standard. Supports high-speed MIFARE, contactless communications, baud rates. The internal transmitter does not need to add an active circuit to directly drive an antenna near the operating distance (up to 100mm). The receiver section provides a robust and efficient demodulation and decoding circuit for ISO14443A compatible transponder signals. The digital part of ISO14443A frames and error detection (parity CRC). In addition, it supports fast CRYPTO1 encryption algorithms for validating MIFARE products. The host communication mode has 8 bit parallel and SPI mode, and the user can select different modes according to different requirements, which provides great flexibility for the design of the reader / terminal.)
Platform: | Size: 5120 | Author: abcdef200 | Hits:

[Linux-Unixmfoc-master

Description: 破解全加密的key 支持PN532 这个程序允许从Mifare Classic卡恢复认证密钥。 请注意mfoc能够恢复密钥的目标只有有一个已知的关键:默认(硬编码在mfoc)或自定义(用户使用命令行)。(This program allow to recover authentication keys from MIFARE Classic card. Please note MFOC is able to recover keys from target only if it have a known key: default one (hardcoded in MFOC) or custom one (user provided using command line).)
Platform: | Size: 50176 | Author: Zyajac | Hits:

[RFIDmifare-classic-offline-cracker-windows

Description: ISO in RAR File, full package to crack offline Mifare Card.
Platform: | Size: 3122176 | Author: Erwinexloo | Hits:

[SourceCodeMifareClassicTool

Description: Read MIFARE Classic tags Save, edit and share the tag data you read Write to MIFARE Classic tags (block-wise) Clone MIFARE Classic tags (Write dump of a tag to another tag; write 'dump-wise') Key management based on dictionary-attack (Write the keys you know in a file (dictionary). MCT will try to authenticate with these keys against all sectors and read as much as possible. See chapter Getting Started.) Format a tag back to the factory/delivery state Write the manufacturer block of special MIFARE Classic tags Use external NFC readers like ACR 122U (See the Help & Info section for more information.) Create, edit, save and share key files (dictionaries) Decode & Encode MIFARE Classic Value Blocks Decode & Encode MIFARE Classic Access Conditions Compare dumps (Diff Tool) Display generic tag information Display the tag data as highlighted hex Display the tag data as 7-Bit US-ASCII Display the MIFARE Classic Access Conditions as a table Display MIFARE Classic Value Blocks as integer In-App (offline) help and information
Platform: | Size: 1495916 | Author: unpopz | Hits:

[Program docDismantling.Mifare

Description: The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We reverse engineered the security mechanisms of this chip: the authentication protocol, the symmetric cipher, and the initialization mechanism. We describe several security vulnerabilities in these mechanisms and exploit these vulnerabilities with two attacks; both are capable of retrieving the secret key from a genuine reader. The most serious one recovers the secret key from just one or two authentication attempts with a genuine reader in less than a second on ordinary hardware and without any pre-computation. Using the same methods, an attacker can also eavesdrop the communication between a tag and a reader, and decrypt the whole trace, even if it involves multiple authentications. This enables an attacker to clone a card or to restore a real card to a previous state.
Platform: | Size: 510586 | Author: AlipayLogin_2088002498429280 | Hits:

[Program docPractical Attacks on the MIFARE Classic

Description: The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers have cracked the encryption, and even proposed attacks to recover the secret keys. However, none of their attacks have been released so far. In this project, we analyse their attack descriptions and implement three attacks on the MIFARE Classic chip. The most critical attack recovers ANY secret key requiring wireless access to just the card only in less than five minutes on inexpensive commercial off-the-shelf hardware and without any pre-computation. Using our attacks, we expose the vulnerabilities of the Imperial College's access control system and show our ability to masquerade as any valid Imperial College personnel.
Platform: | Size: 3252486 | Author: AlipayLogin_2088002498429280 | Hits:

CodeBus www.codebus.net