Abstract
The way that Mifare Classic smart cards work has been uncovered recently [6,8] and several vulnerabilities and exploits have emerged. This paper gives a precise logical formalisation of the essentials of the Mifare Classic card, in the language of a theorem prover (PVS). The formalisation covers the LFSR, the filter function and (parts of) the authentication protocol, thus serving as precise documentation of the card’s ingredients and their properties. Additionally, the mathematics is described that makes two key-retrieval attacks from [6] work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Blanchet, B., Comon-Lundh, H.: Models and proofs of protocol security: A progress report. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 35–49. Springer, Heidelberg (2009)
Barthe, G., Daubignard, M., Kapron, B., Lakhnech, Y.: Computational indistinguishability logic. In: Computer and Communications Security, pp. 375–386. ACM, New York (2010)
Barthe, G., Grégoire, B., Zanella Béguelin, S.: Formal certification of code-based cryptographic proofs. In: Principles of Programming Languages, pp. 90–101. ACM Press, New York (2009)
The Boyer-Moore theorem prover, http://www.computationallogic.com/software/nqthm/
Cortier, V., Kremer, S., Warinschi, B.: A survey of symbolic methods in computational analysis of cryptographic systems. Journ. Automated Reasoning 46(3-4), 225–259 (2010)
Garcia, F.D., de Koning Gans, G., Muijrers, R., van Rossum, P., Verdult, R., Schreur, R.W., Jacobs, B.: Dismantling MIFARE classic. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97–114. Springer, Heidelberg (2008)
Nipkow, T., Paulson, L.C., Wenzel, M.T.: Isabelle/HOL – A Proof Assistant for Higher-Order Logic. In: Nipkow, T., Paulson, L.C., Wenzel, M.T. (eds.) LNCS, vol. 2283, p. 3. Springer, Heidelberg (2002)
Nohl, K., Evans, D., Plötz, S., Plötz, H.: Reverse-engineering a cryptographic RFID tag. In: 17th USENIX Security Symposium, San Jose, CA, USA, pp. 185–194 (2008)
Owre, S., Rajan, S., Rushby, J.M., Shankar, N., Srivas, M.: PVS: Combining specification, proof checking, and model checking. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, vol. 1102, pp. 411–414. Springer, Heidelberg (1996)
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journ. of Computer Security 6, 85–128 (1998)
The Coq proof assistant, http://coq.inria.fr
The Isabelle proof assistant, http://isabelle.in.tum.de
Solomon, W.G.: Shift register sequences. Aegean Park Press, Laguna Hills (1982)
The PVS Specification and Verification System, http://pvs.csl.sri.com
van Tilborg, H.C.A.: Fundamentals of Cryptology: a professional reference and interactive tutorial. Kluwer Academic Publishers, Dordrecht (2000)
Zanella Béguelin, S.: Formal Certification of Game-Based Cryptographic Proofs. PhD thesis, École Nationale Supérieure des Mines de Paris (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jacobs, B., Wichers Schreur, R. (2011). Logical Formalisation and Analysis of the Mifare Classic Card in PVS. In: van Eekelen, M., Geuvers, H., Schmaltz, J., Wiedijk, F. (eds) Interactive Theorem Proving. ITP 2011. Lecture Notes in Computer Science, vol 6898. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22863-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-22863-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22862-9
Online ISBN: 978-3-642-22863-6
eBook Packages: Computer ScienceComputer Science (R0)