conference logo

Playlist "25C3: nothing to hide"

Analyzing RFID Security

Henryk Plötz and Karsten Nohl

Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID cards, we release an open-source, software-controlled, and extensible RFID reader with support for most common standards.