Date Added: Nov 2011
Due to severe limitations in their computational and storage capabilities, many low-cost RFID tags have been shown to implement quite weak authentication protocols, largely due to weakness in their PseudoRandom Number Generators (PRNG). This aim of this is to examine the PRNG in use within the authentication protocol of the new NXP MIFARE Ultralight C RFID low-cost card. The paper investigates the nonces generated by the card during the authentication protocol to assess their randomness, and to test any possible attacks down this path. The authors confirm the validity of the methodology by applying similar techniques to the Mifare 1K Classic, confirming previously discovered weaknesses.