本研究主要探討「非接觸式」的智慧卡,因為「非接觸式」智慧卡溝通是透過無線電的方式做傳送,因此很容易讓攻擊者以側錄的手段,獲取相關的資訊,造成安全上的問題,例如:複製卡片,竄改卡片的資料…等。
目前使用最廣泛的智慧卡是Mifare Classic卡,Mifare Classic卡是一種可在同一張卡片處理多種不同應用的卡片,因此,本研究以Mifare Classic卡為對象。
2008年開始有許多對Mifare Classic卡之安全性的研究被提出,這些研究發現有許多弱點並透過某些攻擊 可以取得卡片的金鑰,藉以更改卡片的資訊,本研究會對這些方式做相關實驗,驗證其可行性。本研究成功利用proxmark3設備去模擬Mifare Classic卡片,與相關讀卡機實驗,可通過門禁與餘額查詢機。
透過實驗了解到Mifare Classic卡鑑別上安全性之弱點,並從這些弱點中,提出改進的方式。對攻擊者可能產生的行為中,尋求因應的方法,能提高Mifare Classic卡安全性,減少被攻擊的機會,本研究提出相關的防禦方法能抵禦大部份現有攻擊方式。
This study focused on the simulation and security problems of contactless smart card. Since contactless smart cards communicate through radio, it is easy for an attacker to eavesdrop and obtain the card related information. This causes security problems such as card duplicating and card data tampering.
Currently, the most widely used smart card is Mifare Classic card, which is used in a broad range of applications including transport ticketing, access management, e-payment, etc. Therefore, this study targets Mifare Classic card.
In the last few years, many articles have been devoted to the study of Mifare Classic card security. Their studies found that due to many weaknesses in Mifare Classic card the card key can be retrieved by certain attacks and accordingly the card data can be changed. According to their methods, this study conducts experiment to verify their feasibility. This study makes use of Proxmark3 device to read and emulate Mifare Classic card. In the card emulation experiments, the emulation card can be read by building access control reader and MRT balance inquiry machine, successfully.
According to the security weakness of Mifare Classic card authentication learned through experiments, an improved method is proposed to increase the security of Mifare Classic card. Since the proposed method aimed at possible attacker behaviors, it can defend against most existing attacks.