tag:blogger.com,1999:blog-13020065.post3237397219685055782..comments2019-07-30T08:39:37.301+02:00Comments on $dd if=/dev/brain of=/dev/blogger.com: How to calculate MIFARE passwordAnonymoushttp://www.blogger.com/profile/01534542895626299713noreply@blogger.comBlogger12125tag:blogger.com,1999:blog-13020065.post-41393819253120976462014-08-09T15:26:47.098+02:002014-08-09T15:26:47.098+02:00Does this mean that as long as an applet has both ...Does this mean that as long as an applet has both KeyA and KeyB can reset the access bits, no matter what the access bits current is.douniwanhttps://www.blogger.com/profile/03669793800702769258noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-45384714972962504962014-08-09T15:19:37.844+02:002014-08-09T15:19:37.844+02:00Does this mean that as long as an applet has both ...Does this mean that as long as an applet has both KEYA and KEYB can reset the access bits no matter what the current access bits is ?douniwanhttps://www.blogger.com/profile/03669793800702769258noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-5629688655865777382013-09-27T11:51:21.940+02:002013-09-27T11:51:21.940+02:00
I am trying to implement Crypto1 algorithm for si...<br />I am trying to implement Crypto1 algorithm for simulating exact mifare card, and im referring to the following doc for Crypto1 algorithm flow.<br />http://www.mifarecards-rfid.comRabbi Hossainhttps://www.blogger.com/profile/09720347156638603153noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-31270955845804559232013-08-16T19:04:24.160+02:002013-08-16T19:04:24.160+02:00im not able to verify my code for complete complia...im not able to verify my code for complete compliance with Crypto1 algo, is der is any tool to verify the same like which will take card challenge, reader challenge and mifare key to generate card and reader responses.<br />http://www.mifarecards-rfid.com<br />mifarecardhttp://www.mifarecards-rfid.comnoreply@blogger.comtag:blogger.com,1999:blog-13020065.post-84651259876757762852013-08-12T22:03:44.080+02:002013-08-12T22:03:44.080+02:00This comment has been removed by the author.Anonymoushttps://www.blogger.com/profile/01534542895626299713noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-52853776126530846812013-08-12T22:03:39.848+02:002013-08-12T22:03:39.848+02:00I think MifareWnd tool has similar functionality b...I think MifareWnd tool has similar functionality but I'm not sure it is public tool. Try to google it.Anonymoushttps://www.blogger.com/profile/01534542895626299713noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-27208654068188018812013-08-11T11:09:00.283+02:002013-08-11T11:09:00.283+02:00m not able to verify my code for complete complian...m not able to verify my code for complete compliance with Crypto1 algo, is der is any tool to verify the same like which will take card challenge, reader challenge and mifare key to generate card and reader responses.mifarecardhttp://www.mifarecards-rfid.comnoreply@blogger.comtag:blogger.com,1999:blog-13020065.post-6446524274626238752013-01-11T09:41:50.481+01:002013-01-11T09:41:50.481+01:00Hi,
I am trying to implement Crypto1 algorithm fo...Hi, <br />I am trying to implement Crypto1 algorithm for simulating exact mifare card, and im referring to the following doc for Crypto1 algorithm flow<br />http://www.cs.ru.nl/~flaviog/publicat<br />ions/Pickpocketing.Mifare.pdf<br /><br />But now im not able to verify my code for complete compliance with Crypto1 algo, is der is any tool to verify the same like which will take card challenge, reader challenge and mifare key to generate card and reader responses.<br /><br />Thanks,<br />Praveen P Teragaonkarhttps://www.blogger.com/profile/15400421378155984450noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-50619731207540194962012-06-07T11:59:25.273+02:002012-06-07T11:59:25.273+02:00Hi,
Sorry for late response. I was quite overloade...Hi,<br />Sorry for late response. I was quite overloaded these days.<br />Actually I don't fully understand your code. You should use DESede algorithm for password calculation. Something like that:<br /><br />.....<br /> SecretKeyFactory kf = SecretKeyFactory.getInstance("DESede");<br /> Cipher encipher = Cipher.getInstance("DESede/ECB/NoPadding");<br /> DESedeKeySpec deskey = new DESedeKeySpec(desKey);<br /> SecretKey secretKey = kf.generateSecret(deskey);<br /><br /> encipher.init(Cipher.ENCRYPT_MODE, secretKey);<br /> byte[] data = new byte[8]; // all 0s<br /> byte[] ciphered = encipher.doFinal(data, 0, 8);<br /> ciphered = invert(ciphered);<br />.....<br /><br />Hope it will helpAnonymoushttps://www.blogger.com/profile/01534542895626299713noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-31761257636860741102012-05-31T17:19:52.062+02:002012-05-31T17:19:52.062+02:00It's OK for me to calculate the 3DES keys, but...It's OK for me to calculate the 3DES keys, but after that, the calculation of the password does not get the right result.<br /><br />Here is the code I use :<br /><br />// set the keys A and B<br />SecretKey secretKeyA = new SecretKeySpec(keyADES, "DES");<br />SecretKey secretKeyB = new SecretKeySpec(keyBDES, "DES");<br /> <br />// get 2 DES cipher object<br />Cipher cipherA = Cipher.getInstance("DES/ECB/NoPadding");<br />cipherA.init(Cipher.ENCRYPT_MODE, secretKeyA);<br />Cipher cipherB = Cipher.getInstance("DES/ECB/NoPadding");<br />cipherB.init(Cipher.DECRYPT_MODE, secretKeyB);<br /> <br />byte[] plainText = new byte[] {(byte)0x00, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x00, (byte)0x00};<br />// encrypt using the keyA and the plaintext<br />byte[] cipherText = cipherA.doFinal(plainText);<br />// decrypt the ciphertext using the keyB<br />byte[] newPlainText = cipherB.doFinal(cipherText);<br />// encrypt using the keyA and the new plaintext<br />password = cipherA.doFinal(newPlainText);<br /><br />An idea of where I am wrong ?Verlop14https://www.blogger.com/profile/11986372384660750498noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-40586101304019102912011-05-20T12:03:45.336+02:002011-05-20T12:03:45.336+02:00No, I am not.
The values of Key A and Key B are se...No, I am not.<br />The values of Key A and Key B are secret. But you cannot use them from javacard API as it requires password. This post explains by knowing of values of Key A and Key B how to calculate Mifire password.Anonymoushttps://www.blogger.com/profile/01534542895626299713noreply@blogger.comtag:blogger.com,1999:blog-13020065.post-59122527835798495072011-05-19T22:31:46.861+02:002011-05-19T22:31:46.861+02:00Are you saying is it possible to crack a mifare pa...Are you saying is it possible to crack a mifare password?RMhttps://www.blogger.com/profile/14465009942637144185noreply@blogger.com