MIFARE Classic

Contactless

Legacy contactless card using Crypto-1 security (known to be broken since 2008), still widely deployed in transit and access.

Contactless | ISO/IEC 14443 | Sejak 1994

Quick Specs

Contactless
Interface Contactless
Chip Type Memory
OS Proprietary
EAL Level Not Evaluated
Lifespan 10 years
First Deployed 1994

Spesifikasi Lengkap

Perangkat Keras

AntarmukaContactless
Jenis ChipMemory
Sistem OperasiProprietary

Komunikasi

ProtokolISO 14443-A (partial)
APDU Diperluas Tidak
Saluran Logis1

Keamanan

Tingkat EALNot Evaluated
Elemen Aman Ya
Tahan Gangguan Ya
Koprosessor Kriptografi Ya
Dukungan Biometrik Tidak

Algoritma Kriptografi

Crypto-1 (broken)

Pertanyaan yang Sering Diajukan

Consider four key factors: interface type (contact, contactless, or dual-interface), security requirements (EAL certification level), application domain (payment, identity, transport), and chip platform (JavaCard, MULTOS, native). For EMV payments, dual-interface cards are now standard. For government eID, EAL5+ certified cards are typically required.

Contact smart cards require physical insertion into a reader and communicate via the ISO 7816 interface (gold contact pads). Contactless cards use radio frequency (ISO 14443) and work within a few centimeters of a reader. Dual-interface cards combine both interfaces on a single chip, offering maximum flexibility.

EAL (Evaluation Assurance Level) is part of the Common Criteria framework for evaluating IT security. For smart cards, EAL4+ is common for payment cards, while EAL5+ or EAL6+ is required for government identity documents and ePassports. Higher EAL levels indicate more rigorous security testing and formal verification methods.