MIFARE Classic

Contactless

Legacy contactless card using Crypto-1 security (known to be broken since 2008), still widely deployed in transit and access.

Contactless | ISO/IEC 14443 | Desde 1994

Quick Specs

Contactless
Interface Contactless
Chip Type Memory
OS Proprietary
EAL Level Not Evaluated
Lifespan 10 years
First Deployed 1994

Especificaciones completas

Hardware

InterfazContactless
Tipo de chipMemory
Sistema operativoProprietary

Comunicación

ProtocoloISO 14443-A (partial)
APDU extendido No
Canales lógicos1

Seguridad

Nivel EALNot Evaluated
Elemento seguro
Resistente a manipulaciones
Coprocesador criptográfico
Soporte biométrico No

Algoritmos criptográficos

Crypto-1 (broken)

Preguntas frecuentes

Consider four key factors: interface type (contact, contactless, or dual-interface), security requirements (EAL certification level), application domain (payment, identity, transport), and chip platform (JavaCard, MULTOS, native). For EMV payments, dual-interface cards are now standard. For government eID, EAL5+ certified cards are typically required.

Contact smart cards require physical insertion into a reader and communicate via the ISO 7816 interface (gold contact pads). Contactless cards use radio frequency (ISO 14443) and work within a few centimeters of a reader. Dual-interface cards combine both interfaces on a single chip, offering maximum flexibility.

EAL (Evaluation Assurance Level) is part of the Common Criteria framework for evaluating IT security. For smart cards, EAL4+ is common for payment cards, while EAL5+ or EAL6+ is required for government identity documents and ePassports. Higher EAL levels indicate more rigorous security testing and formal verification methods.