Mobility

Peeling Away Layers of an RFID Security System

Download Now Free registration required

Executive Summary

The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. The employed algorithms rely on obscurity and consequently did not withstand scrutiny. This paper details how the algorithms were found from opening silicon chips as well as interacting with tags and readers. The security of the tags is based on several secret check-sums but no secret keys are employed that could lead to inherent security on the cards. Cards can be read, written to and spoofed using an emulator. Beyond these card weaknesses, the authors find that Legic's trust delegation model can be abused to create master tokens for all Legic installations.

  • Format: PDF
  • Size: 320.6 KB