MIFARE Classic

Contactless

Legacy contactless card using Crypto-1 security (known to be broken since 2008), still widely deployed in transit and access.

Contactless | ISO/IEC 14443 | Tarihinden beri 1994

Quick Specs

Contactless
Interface Contactless
Chip Type Memory
OS Proprietary
EAL Level Not Evaluated
Lifespan 10 years
First Deployed 1994

Tam Özellikler

Donanım

ArayüzContactless
Çip TürüMemory
İşletim SistemiProprietary

İletişim

ProtokolISO 14443-A (partial)
Genişletilmiş APDU Hayır
Mantıksal Kanallar1

Güvenlik

EAL SeviyesiNot Evaluated
Güvenli Element Evet
Kurcalamaya Dayanıklı Evet
Kripto Yardımcı İşlemcisi Evet
Biyometrik Destek Hayır

Kriptografik Algoritmalar

Crypto-1 (broken)

Sıkça Sorulan Sorular

Consider four key factors: interface type (contact, contactless, or dual-interface), security requirements (EAL certification level), application domain (payment, identity, transport), and chip platform (JavaCard, MULTOS, native). For EMV payments, dual-interface cards are now standard. For government eID, EAL5+ certified cards are typically required.

Contact smart cards require physical insertion into a reader and communicate via the ISO 7816 interface (gold contact pads). Contactless cards use radio frequency (ISO 14443) and work within a few centimeters of a reader. Dual-interface cards combine both interfaces on a single chip, offering maximum flexibility.

EAL (Evaluation Assurance Level) is part of the Common Criteria framework for evaluating IT security. For smart cards, EAL4+ is common for payment cards, while EAL5+ or EAL6+ is required for government identity documents and ePassports. Higher EAL levels indicate more rigorous security testing and formal verification methods.