MIFARE DESFire vs Ultralight

Card vs Card

DESFire is a full microprocessor card with AES encryption and multi-application support, while Ultralight is a simple memory IC for disposable use.

MIFARE DESFire vs MIFARE Ultralight

MIFARE DESFire and MIFARE Ultralight are both NXP products operating at 13.56 MHz with ISO 14443ISO 14443StandardStandard for contactless smart cards.Click to view → Type A compliance, but they target completely different cost-security-complexity trade-offs. Understanding their differences is essential when choosing a contactless card or ticket format for a new deployment.

Overview

MIFARE DESFire EV3 is NXP's flagship multi-application contactless smart card. It features a full native OS, AESAESCryptographyNIST symmetric block cipher for smart card encryption.Click to view →-128 cryptography, a hierarchical file system with up to 28 applications, ISO 14443-4 T=CL protocol, hardware random number generation, and Common CriteriaCommon CriteriaSecurityInternational IT security evaluation standard.Click to view → EAL5+ certification. It is designed for high-security, multi-purpose deployments where a card will be used for years.

MIFARE Ultralight C (and the newer Ultralight EV1/Nano) is a low-cost, memory-only NFC tag format with minimal security. It provides 48–192 bytes of user memory (depending on variant), a simple counter, one-time password (OTP) field, and basic write locking. Ultralight C adds 3DES3DESCryptographyLegacy triple-DES symmetric cipher in payment smart cards.Click to view → authentication to prevent unauthorized writes. The chip has no processor capable of running cryptographic protocols autonomously — it is essentially a secure EEPROMEEPROMHardwareNon-volatile card memory for data.Click to view → with a wireless interface.

Key Differences

  • Security: DESFire — full mutual AES-128 authentication, diversified keys, transaction MAC; Ultralight — OTP lock bits + optional 3DES write protection (Ultralight C) or AES password (EV1)
  • Memory: DESFire — 2–8 KB EEPROM with file system; Ultralight — 48–192 bytes flat memory
  • Cryptography: DESFire — AES-128, on-chip computation; Ultralight — none (Ultralight), 3DES (Ultralight C), simple AES password (EV1)
  • Transaction complexity: DESFire — full APDUAPDUProtocolCommunication unit between card and reader.Click to view → session, read/write/MAC; Ultralight — simple read/write/increment
  • Cost: Ultralight is significantly cheaper per unit (cents vs. dollars at volume)
  • Write endurance: DESFire — 500,000 write cycles; Ultralight — 100,000 write cycles
  • Form factor: Both available in card, keyfob, sticker/inlay (Ultralight primarily as inlay/sticker)

Use Cases

MIFARE DESFire is the right choice for: - Long-lived transit cards reused thousands of times (monthly passes, stored-value wallets) - Building access credentials where card cloning must be prevented - Multi-application city cards (transit + library + parking) - Any deployment where a lost/stolen card can be blacklisted via a secure backend

MIFARE Ultralight is the right choice for: - Single-use or short-term paper tickets (event admission, single-trip transit tickets) - Disposable NFC wristbands for concerts or water parks (EV1 password protection) - Low-cost loyalty punch cards or simple asset tags - Price-sensitive deployments where fraud risk is managed via other means (inspection gates, short validity windows)

Verdict

The two formats are rarely in direct competition — Ultralight is disposable ticket media; DESFire is a durable card credential. Many transit operators use both simultaneously: DESFire for season pass holders and Ultralight for day-ticket purchasers. If budget is the constraint and the use case involves single-trip or time-limited access, Ultralight is correct. If the card is a multi-year identity or stored-value instrument, DESFire's security margin is non-negotiable.

推荐

DESFire for secure multi-application cards; Ultralight for disposable or single-use.

常见问题

Each comparison provides a side-by-side analysis covering interface type, chip architecture, security certification, communication protocol, application domains, and cost. Card-vs-card comparisons focus on specific products, while cross-technology comparisons evaluate broader categories like Contact vs Contactless or EMV vs MIFARE.