MIFARE Classic

Contactless

Legacy contactless card using Crypto-1 security (known to be broken since 2008), still widely deployed in transit and access.

Contactless | ISO/IEC 14443 | Desde 1994

Quick Specs

Contactless
Interface Contactless
Chip Type Memory
OS Proprietary
EAL Level Not Evaluated
Lifespan 10 years
First Deployed 1994

Especificações completas

Hardware

InterfaceContactless
Tipo de chipMemory
Sistema operacionalProprietary

Comunicação

ProtocoloISO 14443-A (partial)
APDU estendido Não
Canais lógicos1

Segurança

Nível EALNot Evaluated
Elemento seguro Sim
Resistente a adulterações Sim
Coprocessador criptográfico Sim
Suporte biométrico Não

Algoritmos criptográficos

Crypto-1 (broken)

Perguntas frequentes

Consider four key factors: interface type (contact, contactless, or dual-interface), security requirements (EAL certification level), application domain (payment, identity, transport), and chip platform (JavaCard, MULTOS, native). For EMV payments, dual-interface cards are now standard. For government eID, EAL5+ certified cards are typically required.

Contact smart cards require physical insertion into a reader and communicate via the ISO 7816 interface (gold contact pads). Contactless cards use radio frequency (ISO 14443) and work within a few centimeters of a reader. Dual-interface cards combine both interfaces on a single chip, offering maximum flexibility.

EAL (Evaluation Assurance Level) is part of the Common Criteria framework for evaluating IT security. For smart cards, EAL4+ is common for payment cards, while EAL5+ or EAL6+ is required for government identity documents and ePassports. Higher EAL levels indicate more rigorous security testing and formal verification methods.