Application of the encryption mode of SL3 MIfare cards on the example of one company

Hello, my name is Andrey and I am an employee of one of the largest management companies in the country. It would seem that the employee on Habré can tell? Operate the buildings that the builder built and nothing interesting, but this is not so.



The management company has one important and responsible function in the role of building a house - is the development of technical specifications for construction. It is the Criminal Code that puts forward the requirements that a ready-made, built-in ACS system will meet.



MIFARE



In this article, I would like to expand on the topic of creating technical conditions within which a house with an access control system is built, which uses Mifare Plus technology of SL3 security level with sector encryption with a security key that neither the developer, nor the contractor, nor the subcontractor know.



And one of the global ones is completely not obvious at first glance - how to prevent the leak of the encryption code of the Mifare Plus cards selected for encryption within the hierarchy of builders, contractors, vendors and other responsible people working with the access control system at home from the beginning of its construction to operation in the post-warranty period.

The main contactless card technologies today:





Since the use of Em-Marine in access control systems, much has changed, and recently we switched from the Mifare Classic SL1 format to the Mifare Plus SL3 encryption format.



Mifare Plus SL3 uses private sector encryption with a secret 16-byte key in AES format. For these purposes, the type of chip Mifare Plus is used.



The transition was carried out due to the presence of known vulnerabilities in the SL1 encryption format. Namely:



Map cryptography is well researched. The vulnerability of the implementation of the pseudo random number generator (PRNG) card and the vulnerability of the CRYPTO1 algorithm are found. In practice, these vulnerabilities are used in the following attacks:





So: encryption of cards at this factory is the first moment where the code is used, the second side is the reader. And we do not trust the manufacturers of the reader the encryption code simply because they are not interested in it.



Each manufacturer has tools for entering the code into the reader. But it is at this moment that the problem of preventing code leakage to third parties in the person of contractors and subcontractors for the construction of an access control system appears. Enter the code in person?



There are difficulties, since the geography of operated houses is presented in various regions of Russia, far beyond the borders of Moscow Region.



And all these houses are being built according to a single standard, on absolutely uniform equipment.



By analyzing the market of Mifare card readers, I was not able to find a large number of companies that work with modern standards that provide protection against copying cards.



Today, most equipment manufacturers operate in UID reading mode, which can be copied by any modern NFC-enabled cell phone.



Some manufacturers support a more modern security system SL1, which was already compromised back in 2008.



And only some manufacturers demonstrate the best in terms of price / quality technological solutions for working with Mifare technology in SL3 mode which makes it impossible to copy a card and create its clone.



The key advantage of SL3 in this story is the inability to copy keys. Such technology does not exist today.



Separately, I will talk about the risks of using card copying with a circulation of more than 200,000 copies.





In conclusion, I want to say that only an in-depth analysis of the equipment market and competitors allows you to create modern and safe access control systems that meet the requirements of 2019, because it is the access control system in an apartment building that is the only low-current system that a resident encounters several times a day.



All Articles