MIFARE Classic

Contactless

Legacy contactless card using Crypto-1 security (known to be broken since 2008), still widely deployed in transit and access.

Contactless | ISO/IEC 14443 | С 1994

Quick Specs

Contactless
Interface Contactless
Chip Type Memory
OS Proprietary
EAL Level Not Evaluated
Lifespan 10 years
First Deployed 1994

Полные спецификации

Аппаратное обеспечение

ИнтерфейсContactless
Тип чипаMemory
Операционная системаProprietary

Связь

ПротоколISO 14443-A (partial)
Расширенный APDU Нет
Логические каналы1

Безопасность

Уровень EALNot Evaluated
Защищённый элемент Да
Защита от вскрытия Да
Криптографический сопроцессор Да
Биометрическая поддержка Нет

Криптографические алгоритмы

Crypto-1 (broken)

Часто задаваемые вопросы

Consider four key factors: interface type (contact, contactless, or dual-interface), security requirements (EAL certification level), application domain (payment, identity, transport), and chip platform (JavaCard, MULTOS, native). For EMV payments, dual-interface cards are now standard. For government eID, EAL5+ certified cards are typically required.

Contact smart cards require physical insertion into a reader and communicate via the ISO 7816 interface (gold contact pads). Contactless cards use radio frequency (ISO 14443) and work within a few centimeters of a reader. Dual-interface cards combine both interfaces on a single chip, offering maximum flexibility.

EAL (Evaluation Assurance Level) is part of the Common Criteria framework for evaluating IT security. For smart cards, EAL4+ is common for payment cards, while EAL5+ or EAL6+ is required for government identity documents and ePassports. Higher EAL levels indicate more rigorous security testing and formal verification methods.