SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
EXTERNAL USE
CHRISTOPH ZWAHLEN
JUNE 1ST, 2016
PRESENT IMPROVED - FUTURE
INSIDE
HOW TO PROTECT YOUR
CONTACTLESS SYSTEMS
TODAY AND TOMORROW
• Basic forms of password protection requires
exchange of the actual secret – the password –
to be exchanged
• Additional measures used to improve weakness
of basic form
• Second factor authentication
• Enciphered transmission of password
• Password policies, e.g. minimal complexity, regular update
• Achievement of basic requirements for protection
• Confidentiality No
• Authenticity No
• Integrity No
Passwords
Commonly used to access to IT equipment and online services
June 1, 20162.
Agenda
1. Security requirements in access management
2. Requirements for sustainable system security
3. Practical implementation
• MIFARE Plus EV1
• MIFARE DESFire EV2
Christoph Zwahlen
Marketing Manager
Access Management
• Selective restriction of access to places and
resources
• Access management protects assets and
value streams
• Required level of protection depends on value
of assets and value streams
• Basic requirements for protection
• Confidentiality
• Authenticity
• Integrity
Access Management
Protecting our assets
4. June 1, 2016
Access Management
Market Segments
5.
Enterprise
Access to corporate
facilities and services
including
• Access mgmt.
• Logical Access
• Resource mgmt.
• Payment
• Parking
• IT Services
Hospitality
Access to facilities and
services including
• Room Access
• Leisure facilities
• Parking
• Vending
Education
Access to campus
facilities and services
including
• Access mgmt.
• Logical Access
• Attendance ctrl.
• Payment
• IT Services
• Library services
Residential
Access to residential
buildings
• House
• Appartment building
• Residential complex
Leisure
Access to leisure
activities such as
• Theme park
• Fitness studio
• Stadium
• Event ticketing
• Waterpark and Spa
• Ski resorts
June 1, 2016
Access Management
Security requirement
6.
Single Use
Low Value
Limited Use
Limited Value
Long-term Use
High Value
Security means
Password protection
Authentication
MAC
Full enciphered
communication
ApplicationsProtected value Product recommendation
June 1, 2016
• Address current security demands
• Appropriate security mechanisms for individual situation
• Support of existing legacy applications
• Updateability to comply with new security needs
• Possibility to adopt to new security demands
• Long term maintainability of protection mechanisms
• Reliable and secure concepts for in-field updates
• Application independent work flow
• Individual migration depending on application
requirements
• Smooth migration path for cost efficiency
Sustainable system security
Demands for long-term protection of assets and value streams
7. June 1, 2016
• Latest innovations in MIFARE portfolio
simplify sustainable system security
• MIFARE Plus EV1
Selective system security upgrades
• MIFARE DESFire EV2
In-field key update procedure
• Independent security validation according
Common Criteria EAL5+
• Functional backwards compatibility
MIFARE – Evolutionary enhancements
Protecting contactless systems today and tomorrow!
8. June 1, 2016
MIFARE Plus® generation benefits
MIFARE Plus® EV1
MIFARE
Plus S
MIFARE
Plus SE
MIFARE
Plus X
MIFARE
Plus EV1
RF Interface
P rotocol
UID –
unique
identifier
Communication
speed
M emory size
[Byte]
2KB 1KB 2KB 2KB
4KB 4KB 4KB
M emory M odel
Crypto
Key Length
Authentication
Communication,
S ecurity
T ransaction
M AC
yes
P roximity Check yes
V irtual Card
S elect
CC Certification EAL4+ no EAL4+ EAL5+
IS O 7816-4
AP DU
yes
NFC compliance
T arget
applications
Input
capacitance
17pF 17pF 17pF 17pF or 70pF
S ecure NFC
channel
in SL1& SL3
M ulti
applications
yes
NFC capabilities in SL3
Public transport / Campus cards / Access management
Compact, Sectors & 16- byte block
Crypto- 1, AES
48- bit crypto- 1, 128- bit AES
3- pass mutual
CMACed
MIFARE Plus
ISO/IEC 14443- 2, type A
ISO/IEC 14443- 3&4
7- byte UID, 4- byte NUID, RID
106- 848 Kbps
in SL3 level
Supported via MAD
no
no
no
1994
MIFARE
Classic
2009
MIFARE Plus
06/2015
MIFARE Plus SE
04/2016
MIFARE Plus EV1
June 1, 20169.
MIFARE Plus® EV1 Key Features
10.
Functional backwards compatible to MIFARE Classic – Seamless upgrade path
Functional backwards compatible to MIFARE Plus EV0 – Easy replacement
Upgrade security relevant applications to AES only – Enable AES system security upgrades
Leave non-security relevant applications in Crypto1 – Reduce system upgrade cost
Performance
Secureend-end
comm.
Sector-wiseSL
switching
SL1SL3 Mix Mode– Enabling fast security update for critical applications
Transaction MAC – Fraudulent Transaction Claim Protection
Fully ISO compliant Proximity Check – Relay Attack Protection
Virtual Card Architecture – Privacy Protection
Optimum transaction speed vs security – Fast & Reliable Transactions
High-cap versions available – More Operating Range
Features & Benefits
11.
Sector-wise
security level
switching
Optional AES
secure channel
in SL1
Extending the application scope for existing customers
 Switching only necessary infrastructure to AES
security
 keep and operate non-security relevant Crypto1
infrastructure
 Switching system integrators as soon as
implementation is finished
Enabling security update for critical applications
 Introduce secure services into legacy systems
 Fast enhancement of security critical use cases
June 1, 2016
Nutshell Security Concept for Physical Access Control
Sector-wise Security Level Switching
 Different security layers possible
 Reduce system upgrade effort and
complexity
 Reduce system upgrade cost
AES
AES
June 1, 201612.
Optional security in legacy mode for critical use cases
Optional AES secure channel in SL1
13.
All applications use the
same protocol
 Seamless integration into existing
infrastructure
 Fast update of security in critical
infrastructure
 Reduce system upgrade cost
June 1, 2016
MIFARE DESFire® generation benefits
MIFARE DESFire® EV2
14.
2002
MIFARE DESFire
2008
MIFARE DESFire EV1
2015
MIFARE DESFire EV1 256B
2016
MIFARE DESFire EV2
MIFARE
DESFire EV1
MIFARE
DESFire EV2
ISO/IEC 14443 A 1-4  
ISO/IEC 7816-4 support extended extended
EEPROM data memory 2/4/8KB 2/4/8KB
Flexible file structure  
NFC Forum Tag Type 4  
Secure, high-speed cmd  
Unique ID 7BUID or 4B RID 7BUID or 4B RID
Number of applications 28 unlimited
Number of files per app 32 32
High data rates support up to 848 Kbit/s up to 848 Kbit/s
Crypto algorithms support
DES/2K3DES/
3K3DES/AES
DES/2K3DES/
3K3DES/AES
CC certification (HW + SW) EAL 4+ EAL 5+
MIsmartApp feature - 
Transaction MAC per app - 
Multiple keysets per app - Up to 16 keysets
Multiple file access rights - Up to 8 keys
Inter-app files sharing - 
Virtual Card Architecture - 
Proximity Check - 
Delivery types
Wafer, MOA4 &
MOA8
Wafer, MOA4 &
MOB6June 1, 2016
MIFARE DESFire® EV2 Key Features
15.
Features & Benefits
16.
Multiple Rolling
Keysets
• Simplified key changing procedure for deployed cards
• Rolling to the next keyset can be done in a secure and reliable way in the field
• Increase system security by rolling keyset regularly to limit its exposure in the field
• A self-healing mechanism in the event of current keyset being compromised
• Enabling current MIFARE DESFire installations to migrate to AES or 3K3DES crypto progressively
Application n
Std. Data
File
BackUp Data
File
Cyclic Record
File
Linear Record
File
Value
File
Application Keys
Keyset 16
Keyset 2
…
Active
Keyset Keyset 2
Up to 16
keysets
per
applicationRollKey
command
June 1, 2016
• Verify backwards compatibility of new products in
existing components
• Update key management procedures
• Extend credential key management to extended features
• Define system key deployment
• Introduction of new platforms
• Extended feature set for new and existing systems
Integration
Enabling in-field security updates
17. June 1, 2016
Thank you
Visit us at http://MIFARE.net
Follow us:
https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
Q&A
Webinar Series
Outlook
Date Title
May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside
June 1st 2016 How to protect contactless systems today and tomorrow
June 8th 2016 Enhanced user experience through active application management
June 15th 2016 Streamlined user management for multi-vendor installations
June 22nd 2016 Secure closed loop payments in an open environment
June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades
July 6th 2016 Added value to card based environments through NFC and cloud – when IoT
becomes reality
July 13th 2016 Complement use cases with mobiles and wearables
How to Protect Contactless Systems Today and Tomorrow

Weitere ähnliche Inhalte

Was ist angesagt?

Winmate trusted mobile security solution
Winmate trusted mobile security solutionWinmate trusted mobile security solution
Winmate trusted mobile security solutionAllan (Yun-Chin) Lin
 
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBRichard Schmidmaier
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...NFC Forum
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
NFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PROIDEA
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC Forum
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_usEmma Garnier
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture Block Armour
 
Near field communication
Near field communicationNear field communication
Near field communicationParamvir Singh
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTTransUnion
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Null mumbai-iot-workshop
Null mumbai-iot-workshopNull mumbai-iot-workshop
Null mumbai-iot-workshopNitesh Malviya
 

Was ist angesagt? (20)

Winmate trusted mobile security solution
Winmate trusted mobile security solutionWinmate trusted mobile security solution
Winmate trusted mobile security solution
 
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEB
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
NFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum Compliance Program Overview
NFC Forum Compliance Program Overview
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 
Retail
RetailRetail
Retail
 
Bank security
Bank securityBank security
Bank security
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_us
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
CONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customersCONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customers
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Smart Business using IoT
Smart Business using IoTSmart Business using IoT
Smart Business using IoT
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Null mumbai-iot-workshop
Null mumbai-iot-workshopNull mumbai-iot-workshop
Null mumbai-iot-workshop
 

Andere mochten auch

NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Team
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011AurMiana
 
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveBurak Ilgıcıoğlu
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Team
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...NFC Forum
 
Introduction to nfc
Introduction to nfcIntroduction to nfc
Introduction to nfcRay Cheng
 
Near field communication
Near field communicationNear field communication
Near field communicationdivyasolanki101
 
Tap into NFC Meetup - Boston
Tap into NFC Meetup  - Boston Tap into NFC Meetup  - Boston
Tap into NFC Meetup - Boston NFC Forum
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
NfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperNfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperTmac77
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Near Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteNear Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteAndrew Roughan
 
Mobile-based NFC fare collection
Mobile-based NFC fare collectionMobile-based NFC fare collection
Mobile-based NFC fare collectionnnaveiras
 

Andere mochten auch (20)

NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011
 
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
 
Introduction to nfc
Introduction to nfcIntroduction to nfc
Introduction to nfc
 
Norme NFC - Romain Menetrier PAUG
Norme NFC - Romain Menetrier PAUGNorme NFC - Romain Menetrier PAUG
Norme NFC - Romain Menetrier PAUG
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Tap into NFC Meetup - Boston
Tap into NFC Meetup  - Boston Tap into NFC Meetup  - Boston
Tap into NFC Meetup - Boston
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
NfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperNfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White Paper
 
La Saga NFC
La Saga NFCLa Saga NFC
La Saga NFC
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Near Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteNear Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarte
 
Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10
 
Mobile-based NFC fare collection
Mobile-based NFC fare collectionMobile-based NFC fare collection
Mobile-based NFC fare collection
 

Ähnlich wie How to Protect Contactless Systems Today and Tomorrow

Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
130418   makan pourzandi - esf -- an elastic security framework for cloud inf...130418   makan pourzandi - esf -- an elastic security framework for cloud inf...
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...Ptidej Team
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICSjohnsdeepsecure
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud AdoptionProtectWise
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
eWON_SecurityV5 - Public
eWON_SecurityV5 - PubliceWON_SecurityV5 - Public
eWON_SecurityV5 - PublicYvan Rudzinski
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloudHimani Singh
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocolKirti Ahirrao
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 

Ähnlich wie How to Protect Contactless Systems Today and Tomorrow (20)

Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
130418   makan pourzandi - esf -- an elastic security framework for cloud inf...130418   makan pourzandi - esf -- an elastic security framework for cloud inf...
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICS
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption
 
Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
eWON_SecurityV5 - Public
eWON_SecurityV5 - PubliceWON_SecurityV5 - Public
eWON_SecurityV5 - Public
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

How to Protect Contactless Systems Today and Tomorrow

  • 1. EXTERNAL USE CHRISTOPH ZWAHLEN JUNE 1ST, 2016 PRESENT IMPROVED - FUTURE INSIDE HOW TO PROTECT YOUR CONTACTLESS SYSTEMS TODAY AND TOMORROW
  • 2. • Basic forms of password protection requires exchange of the actual secret – the password – to be exchanged • Additional measures used to improve weakness of basic form • Second factor authentication • Enciphered transmission of password • Password policies, e.g. minimal complexity, regular update • Achievement of basic requirements for protection • Confidentiality No • Authenticity No • Integrity No Passwords Commonly used to access to IT equipment and online services June 1, 20162.
  • 3. Agenda 1. Security requirements in access management 2. Requirements for sustainable system security 3. Practical implementation • MIFARE Plus EV1 • MIFARE DESFire EV2 Christoph Zwahlen Marketing Manager Access Management
  • 4. • Selective restriction of access to places and resources • Access management protects assets and value streams • Required level of protection depends on value of assets and value streams • Basic requirements for protection • Confidentiality • Authenticity • Integrity Access Management Protecting our assets 4. June 1, 2016
  • 5. Access Management Market Segments 5. Enterprise Access to corporate facilities and services including • Access mgmt. • Logical Access • Resource mgmt. • Payment • Parking • IT Services Hospitality Access to facilities and services including • Room Access • Leisure facilities • Parking • Vending Education Access to campus facilities and services including • Access mgmt. • Logical Access • Attendance ctrl. • Payment • IT Services • Library services Residential Access to residential buildings • House • Appartment building • Residential complex Leisure Access to leisure activities such as • Theme park • Fitness studio • Stadium • Event ticketing • Waterpark and Spa • Ski resorts June 1, 2016
  • 6. Access Management Security requirement 6. Single Use Low Value Limited Use Limited Value Long-term Use High Value Security means Password protection Authentication MAC Full enciphered communication ApplicationsProtected value Product recommendation June 1, 2016
  • 7. • Address current security demands • Appropriate security mechanisms for individual situation • Support of existing legacy applications • Updateability to comply with new security needs • Possibility to adopt to new security demands • Long term maintainability of protection mechanisms • Reliable and secure concepts for in-field updates • Application independent work flow • Individual migration depending on application requirements • Smooth migration path for cost efficiency Sustainable system security Demands for long-term protection of assets and value streams 7. June 1, 2016
  • 8. • Latest innovations in MIFARE portfolio simplify sustainable system security • MIFARE Plus EV1 Selective system security upgrades • MIFARE DESFire EV2 In-field key update procedure • Independent security validation according Common Criteria EAL5+ • Functional backwards compatibility MIFARE – Evolutionary enhancements Protecting contactless systems today and tomorrow! 8. June 1, 2016
  • 9. MIFARE Plus® generation benefits MIFARE Plus® EV1 MIFARE Plus S MIFARE Plus SE MIFARE Plus X MIFARE Plus EV1 RF Interface P rotocol UID – unique identifier Communication speed M emory size [Byte] 2KB 1KB 2KB 2KB 4KB 4KB 4KB M emory M odel Crypto Key Length Authentication Communication, S ecurity T ransaction M AC yes P roximity Check yes V irtual Card S elect CC Certification EAL4+ no EAL4+ EAL5+ IS O 7816-4 AP DU yes NFC compliance T arget applications Input capacitance 17pF 17pF 17pF 17pF or 70pF S ecure NFC channel in SL1& SL3 M ulti applications yes NFC capabilities in SL3 Public transport / Campus cards / Access management Compact, Sectors & 16- byte block Crypto- 1, AES 48- bit crypto- 1, 128- bit AES 3- pass mutual CMACed MIFARE Plus ISO/IEC 14443- 2, type A ISO/IEC 14443- 3&4 7- byte UID, 4- byte NUID, RID 106- 848 Kbps in SL3 level Supported via MAD no no no 1994 MIFARE Classic 2009 MIFARE Plus 06/2015 MIFARE Plus SE 04/2016 MIFARE Plus EV1 June 1, 20169.
  • 10. MIFARE Plus® EV1 Key Features 10. Functional backwards compatible to MIFARE Classic – Seamless upgrade path Functional backwards compatible to MIFARE Plus EV0 – Easy replacement Upgrade security relevant applications to AES only – Enable AES system security upgrades Leave non-security relevant applications in Crypto1 – Reduce system upgrade cost Performance Secureend-end comm. Sector-wiseSL switching SL1SL3 Mix Mode– Enabling fast security update for critical applications Transaction MAC – Fraudulent Transaction Claim Protection Fully ISO compliant Proximity Check – Relay Attack Protection Virtual Card Architecture – Privacy Protection Optimum transaction speed vs security – Fast & Reliable Transactions High-cap versions available – More Operating Range
  • 11. Features & Benefits 11. Sector-wise security level switching Optional AES secure channel in SL1 Extending the application scope for existing customers  Switching only necessary infrastructure to AES security  keep and operate non-security relevant Crypto1 infrastructure  Switching system integrators as soon as implementation is finished Enabling security update for critical applications  Introduce secure services into legacy systems  Fast enhancement of security critical use cases June 1, 2016
  • 12. Nutshell Security Concept for Physical Access Control Sector-wise Security Level Switching  Different security layers possible  Reduce system upgrade effort and complexity  Reduce system upgrade cost AES AES June 1, 201612.
  • 13. Optional security in legacy mode for critical use cases Optional AES secure channel in SL1 13. All applications use the same protocol  Seamless integration into existing infrastructure  Fast update of security in critical infrastructure  Reduce system upgrade cost June 1, 2016
  • 14. MIFARE DESFire® generation benefits MIFARE DESFire® EV2 14. 2002 MIFARE DESFire 2008 MIFARE DESFire EV1 2015 MIFARE DESFire EV1 256B 2016 MIFARE DESFire EV2 MIFARE DESFire EV1 MIFARE DESFire EV2 ISO/IEC 14443 A 1-4   ISO/IEC 7816-4 support extended extended EEPROM data memory 2/4/8KB 2/4/8KB Flexible file structure   NFC Forum Tag Type 4   Secure, high-speed cmd   Unique ID 7BUID or 4B RID 7BUID or 4B RID Number of applications 28 unlimited Number of files per app 32 32 High data rates support up to 848 Kbit/s up to 848 Kbit/s Crypto algorithms support DES/2K3DES/ 3K3DES/AES DES/2K3DES/ 3K3DES/AES CC certification (HW + SW) EAL 4+ EAL 5+ MIsmartApp feature -  Transaction MAC per app -  Multiple keysets per app - Up to 16 keysets Multiple file access rights - Up to 8 keys Inter-app files sharing -  Virtual Card Architecture -  Proximity Check -  Delivery types Wafer, MOA4 & MOA8 Wafer, MOA4 & MOB6June 1, 2016
  • 15. MIFARE DESFire® EV2 Key Features 15.
  • 16. Features & Benefits 16. Multiple Rolling Keysets • Simplified key changing procedure for deployed cards • Rolling to the next keyset can be done in a secure and reliable way in the field • Increase system security by rolling keyset regularly to limit its exposure in the field • A self-healing mechanism in the event of current keyset being compromised • Enabling current MIFARE DESFire installations to migrate to AES or 3K3DES crypto progressively Application n Std. Data File BackUp Data File Cyclic Record File Linear Record File Value File Application Keys Keyset 16 Keyset 2 … Active Keyset Keyset 2 Up to 16 keysets per applicationRollKey command June 1, 2016
  • 17. • Verify backwards compatibility of new products in existing components • Update key management procedures • Extend credential key management to extended features • Define system key deployment • Introduction of new platforms • Extended feature set for new and existing systems Integration Enabling in-field security updates 17. June 1, 2016
  • 18. Thank you Visit us at http://MIFARE.net Follow us: https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
  • 19. Q&A
  • 20. Webinar Series Outlook Date Title May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside June 1st 2016 How to protect contactless systems today and tomorrow June 8th 2016 Enhanced user experience through active application management June 15th 2016 Streamlined user management for multi-vendor installations June 22nd 2016 Secure closed loop payments in an open environment June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades July 6th 2016 Added value to card based environments through NFC and cloud – when IoT becomes reality July 13th 2016 Complement use cases with mobiles and wearables