Primer on hacking Mifare Classic NFC

There is a lot of information out on the internet about Mifare Classic NFC
cards and the various exploits that they are subject to. However, the
information is often fragmented or assumes a lot of prior knowledge.

This post aims to collect all the relevant information and provide a
high-level overview of the terminology and available exploits.

Glossary

Term Definition
RFID Radio-frequency identification. This is quite a broad, catch-all term that encompasses any system that uses electromagnetic fields to identify tags and/or transmit data. Frequency and range varies.
NFC Near Field Communications. A subset of RFID that specifically uses the 13.56MHz frequency, giving it roughly 4cm of range (hence “near field”). Defines a set of communication protocols.
Mifare A brand of smart cards from the company NXP, operating on the 13.56MHz frequency. It’s an implementation on top of the NFC communication protocols and can be read by NFC card readers.
NDEF NFC Data Exchange Format - a standardized way to exchange data between NFC tags and devices.
SL1 Security Level 1 [1]. Emulates Mifare Classic with standard CRYPTO1 cipher protocol.
SL2 Security Level 2 [1:1]. Combination of CRYPTO1 and AES.
SL3 Security Level 3 [1:2]. Most secure level offered by Mifare at the time of writing, using AES only.

Mifare Classic primer

While I’m not going to cover any of the concepts in detail, it’s important
to understand at least the following.

Passive NFC

Unlike the super early generation of RFID cards which literally only had a
publicly readable ID, Mifare smart cards use passive NFC technology to
receive data and compute a response.

The card reader induces a current in the Mifare card via electromagnetic
fields, powering the Mifare card and allowing it to run the proprietary
CRYPTO1 algorithm on its
ASIC.

Cloning a Mifare Classic card is not as trivially simple as reading data off
it and writing that data onto a blank card. The Mifare card contains
non-readable information and instead uses a cryptographic exchange to secure
its data.

Memory layout

The Mifare Classic card consists of 16 sectors, each with four 16-byte
blocks. The last block contains:

  • secret key A
  • secret key B
  • access rights of those two keys on the current sector

Mifare Classic memory layout

The secret keys are 48 bits in length. Typically, key A is used for reading
the sector data, while key B is used for writing. However, the rights can be
arbitrarily defined in the access rights section. I won’t go into detail
about the format of the access rights.

Typically, key A and key B are different. This allows a valid card reader to
possess key A and read data, while key B is only known by the master
programming device.

It’s entirely possible for each of the 16 sectors to have different keys,
but typically all the sectors share the same key A and key B.

There are a list of default keys with special meaning, such as:

  • FFFFFFFFFFFF is loaded as the default key for A and B on a blank chip
  • D3F7D3F7D3F7 must be set for key A if the Mifare Classic tag contains
    NDEF data
  • …many more

Exploits

See these slides from a Black Hat conference.

Exploit Goal Time required Cards vulnerable Tools Paper
Brute-force default keys Recover any key ~10 seconds All mfoc, MCT
Brute-force leaked keys Recover any key 1 minute All mfoc with custom list, MCT with included “extended” list
Darkside attack Recover any key ~1 hour Original Mifare Classic only mfcuk TODO
Nested attack Recover other key ~10 seconds Original Mifare Classic only mfoc TODO
Hard-nested attack Recover other key ??? Mifare Classic, Mifare Plus, maybe all? mfoc-hardnested, miLazyCracker TODO
CPU brute-force Recover any key ~4 years All Consumer-grade computer TODO
GPU brute-force Recover any key ~10 hours All Extremely expensive GPU or FPGA array TODO

Types of Mifare cards

There are a staggering number of different Mifare cards, and information
available on the internet does not tend to reliably specify the exact type
of Mifare card that is being talked about.

The most notorious and commonly mentioned variant is the Mifare Classic 1K,
which was the most popular smart card on the market, and remains
ubiquitous in a large range of applications (swipe card access, public
transit, etc) despite it’s well known and well publicised vulnerabilities.

However, successfully exploiting the Mifare Classic 1K first requires that
you’re actually working with a Mifare Classic 1K. This is not so easy to
ascertain, and most of the information on the internet glosses over this
critically important step of identifying the exact card. There are a lot of
variants that are resistant to the known vulnerabilities to different levels.

Roughly speaking, there are the following families (non-exhaustive list):

  • Mifare Classic
  • Mifare Plus
  • Mifare UltraLight
  • Mifare DESFire
  • SmartMX

And within each family, there are ~3-10 variants. A more comprehensive
listing and guide to identifying can be found at the MIFARE
type identification procedure [2].

Ultimately, for the purpose of running exploits against the card, all you
really need to know is:

  1. Is it literally the original, trivial to exploit Mifare Classic 1K?
  2. Is it something else emulating the Mifare Classic protocol?

If either of the above is true, you can try and run some of the well-known
exploits against the cards:

  1. Attempt to recover at least one key by brute-forcing default keys, or
    leaked keys, or using a darkside attack
  2. Attempt to recover the other keys by using a nested attack

  1. https://tech.springcard.com/2011/mifare-plus-in-a-nutshell/ ↩︎ ↩︎ ↩︎

  2. https://www.nxp.com/docs/en/application-note/AN10833.pdf ↩︎