SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
EXTERNAL USE
CHRISTOPH ZWAHLEN
JUNE 1ST, 2016
PRESENT IMPROVED - FUTURE
INSIDE
HOW TO PROTECT YOUR
CONTACTLESS SYSTEMS
TODAY AND TOMORROW
• Basic forms of password protection requires
exchange of the actual secret – the password –
to be exchanged
• Additional measures used to improve weakness
of basic form
• Second factor authentication
• Enciphered transmission of password
• Password policies, e.g. minimal complexity, regular update
• Achievement of basic requirements for protection
• Confidentiality No
• Authenticity No
• Integrity No
Passwords
Commonly used to access to IT equipment and online services
June 1, 20162.
Agenda
1. Security requirements in access management
2. Requirements for sustainable system security
3. Practical implementation
• MIFARE Plus EV1
• MIFARE DESFire EV2
Christoph Zwahlen
Marketing Manager
Access Management
• Selective restriction of access to places and
resources
• Access management protects assets and
value streams
• Required level of protection depends on value
of assets and value streams
• Basic requirements for protection
• Confidentiality
• Authenticity
• Integrity
Access Management
Protecting our assets
4. June 1, 2016
Access Management
Market Segments
5.
Enterprise
Access to corporate
facilities and services
including
• Access mgmt.
• Logical Access
• Resource mgmt.
• Payment
• Parking
• IT Services
Hospitality
Access to facilities and
services including
• Room Access
• Leisure facilities
• Parking
• Vending
Education
Access to campus
facilities and services
including
• Access mgmt.
• Logical Access
• Attendance ctrl.
• Payment
• IT Services
• Library services
Residential
Access to residential
buildings
• House
• Appartment building
• Residential complex
Leisure
Access to leisure
activities such as
• Theme park
• Fitness studio
• Stadium
• Event ticketing
• Waterpark and Spa
• Ski resorts
June 1, 2016
Access Management
Security requirement
6.
Single Use
Low Value
Limited Use
Limited Value
Long-term Use
High Value
Security means
Password protection
Authentication
MAC
Full enciphered
communication
ApplicationsProtected value Product recommendation
June 1, 2016
• Address current security demands
• Appropriate security mechanisms for individual situation
• Support of existing legacy applications
• Updateability to comply with new security needs
• Possibility to adopt to new security demands
• Long term maintainability of protection mechanisms
• Reliable and secure concepts for in-field updates
• Application independent work flow
• Individual migration depending on application
requirements
• Smooth migration path for cost efficiency
Sustainable system security
Demands for long-term protection of assets and value streams
7. June 1, 2016
• Latest innovations in MIFARE portfolio
simplify sustainable system security
• MIFARE Plus EV1
Selective system security upgrades
• MIFARE DESFire EV2
In-field key update procedure
• Independent security validation according
Common Criteria EAL5+
• Functional backwards compatibility
MIFARE – Evolutionary enhancements
Protecting contactless systems today and tomorrow!
8. June 1, 2016
MIFARE Plus® generation benefits
MIFARE Plus® EV1
MIFARE
Plus S
MIFARE
Plus SE
MIFARE
Plus X
MIFARE
Plus EV1
RF Interface
P rotocol
UID –
unique
identifier
Communication
speed
M emory size
[Byte]
2KB 1KB 2KB 2KB
4KB 4KB 4KB
M emory M odel
Crypto
Key Length
Authentication
Communication,
S ecurity
T ransaction
M AC
yes
P roximity Check yes
V irtual Card
S elect
CC Certification EAL4+ no EAL4+ EAL5+
IS O 7816-4
AP DU
yes
NFC compliance
T arget
applications
Input
capacitance
17pF 17pF 17pF 17pF or 70pF
S ecure NFC
channel
in SL1& SL3
M ulti
applications
yes
NFC capabilities in SL3
Public transport / Campus cards / Access management
Compact, Sectors & 16- byte block
Crypto- 1, AES
48- bit crypto- 1, 128- bit AES
3- pass mutual
CMACed
MIFARE Plus
ISO/IEC 14443- 2, type A
ISO/IEC 14443- 3&4
7- byte UID, 4- byte NUID, RID
106- 848 Kbps
in SL3 level
Supported via MAD
no
no
no
1994
MIFARE
Classic
2009
MIFARE Plus
06/2015
MIFARE Plus SE
04/2016
MIFARE Plus EV1
June 1, 20169.
MIFARE Plus® EV1 Key Features
10.
Functional backwards compatible to MIFARE Classic – Seamless upgrade path
Functional backwards compatible to MIFARE Plus EV0 – Easy replacement
Upgrade security relevant applications to AES only – Enable AES system security upgrades
Leave non-security relevant applications in Crypto1 – Reduce system upgrade cost
Performance
Secureend-end
comm.
Sector-wiseSL
switching
SL1SL3 Mix Mode– Enabling fast security update for critical applications
Transaction MAC – Fraudulent Transaction Claim Protection
Fully ISO compliant Proximity Check – Relay Attack Protection
Virtual Card Architecture – Privacy Protection
Optimum transaction speed vs security – Fast & Reliable Transactions
High-cap versions available – More Operating Range
Features & Benefits
11.
Sector-wise
security level
switching
Optional AES
secure channel
in SL1
Extending the application scope for existing customers
 Switching only necessary infrastructure to AES
security
 keep and operate non-security relevant Crypto1
infrastructure
 Switching system integrators as soon as
implementation is finished
Enabling security update for critical applications
 Introduce secure services into legacy systems
 Fast enhancement of security critical use cases
June 1, 2016
Nutshell Security Concept for Physical Access Control
Sector-wise Security Level Switching
 Different security layers possible
 Reduce system upgrade effort and
complexity
 Reduce system upgrade cost
AES
AES
June 1, 201612.
Optional security in legacy mode for critical use cases
Optional AES secure channel in SL1
13.
All applications use the
same protocol
 Seamless integration into existing
infrastructure
 Fast update of security in critical
infrastructure
 Reduce system upgrade cost
June 1, 2016
MIFARE DESFire® generation benefits
MIFARE DESFire® EV2
14.
2002
MIFARE DESFire
2008
MIFARE DESFire EV1
2015
MIFARE DESFire EV1 256B
2016
MIFARE DESFire EV2
MIFARE
DESFire EV1
MIFARE
DESFire EV2
ISO/IEC 14443 A 1-4  
ISO/IEC 7816-4 support extended extended
EEPROM data memory 2/4/8KB 2/4/8KB
Flexible file structure  
NFC Forum Tag Type 4  
Secure, high-speed cmd  
Unique ID 7BUID or 4B RID 7BUID or 4B RID
Number of applications 28 unlimited
Number of files per app 32 32
High data rates support up to 848 Kbit/s up to 848 Kbit/s
Crypto algorithms support
DES/2K3DES/
3K3DES/AES
DES/2K3DES/
3K3DES/AES
CC certification (HW + SW) EAL 4+ EAL 5+
MIsmartApp feature - 
Transaction MAC per app - 
Multiple keysets per app - Up to 16 keysets
Multiple file access rights - Up to 8 keys
Inter-app files sharing - 
Virtual Card Architecture - 
Proximity Check - 
Delivery types
Wafer, MOA4 &
MOA8
Wafer, MOA4 &
MOB6June 1, 2016
MIFARE DESFire® EV2 Key Features
15.
Features & Benefits
16.
Multiple Rolling
Keysets
• Simplified key changing procedure for deployed cards
• Rolling to the next keyset can be done in a secure and reliable way in the field
• Increase system security by rolling keyset regularly to limit its exposure in the field
• A self-healing mechanism in the event of current keyset being compromised
• Enabling current MIFARE DESFire installations to migrate to AES or 3K3DES crypto progressively
Application n
Std. Data
File
BackUp Data
File
Cyclic Record
File
Linear Record
File
Value
File
Application Keys
Keyset 16
Keyset 2
…
Active
Keyset Keyset 2
Up to 16
keysets
per
applicationRollKey
command
June 1, 2016
• Verify backwards compatibility of new products in
existing components
• Update key management procedures
• Extend credential key management to extended features
• Define system key deployment
• Introduction of new platforms
• Extended feature set for new and existing systems
Integration
Enabling in-field security updates
17. June 1, 2016
Thank you
Visit us at http://MIFARE.net
Follow us:
https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
Q&A
Webinar Series
Outlook
Date Title
May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside
June 1st 2016 How to protect contactless systems today and tomorrow
June 8th 2016 Enhanced user experience through active application management
June 15th 2016 Streamlined user management for multi-vendor installations
June 22nd 2016 Secure closed loop payments in an open environment
June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades
July 6th 2016 Added value to card based environments through NFC and cloud – when IoT
becomes reality
July 13th 2016 Complement use cases with mobiles and wearables
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow

Contenu connexe

Tendances

Winmate trusted mobile security solution
Winmate trusted mobile security solutionWinmate trusted mobile security solution
Winmate trusted mobile security solutionAllan (Yun-Chin) Lin
 
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBRichard Schmidmaier
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...NFC Forum
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationHans Klos
 
NFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PROIDEA
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC Forum
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_usEmma Garnier
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture Block Armour
 
Near field communication
Near field communicationNear field communication
Near field communicationParamvir Singh
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTTransUnion
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Block Armour
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
Null mumbai-iot-workshop
Null mumbai-iot-workshopNull mumbai-iot-workshop
Null mumbai-iot-workshopNitesh Malviya
 

Tendances (20)

Winmate trusted mobile security solution
Winmate trusted mobile security solutionWinmate trusted mobile security solution
Winmate trusted mobile security solution
 
NFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEBNFC Everywhere Brochure 2016_WEB
NFC Everywhere Brochure 2016_WEB
 
History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...History, Background and Future Perspectives of Near Field Communication for t...
History, Background and Future Perspectives of Near Field Communication for t...
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
NFC Forum Compliance Program Overview
NFC Forum Compliance Program OverviewNFC Forum Compliance Program Overview
NFC Forum Compliance Program Overview
 
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 
Retail
RetailRetail
Retail
 
Bank security
Bank securityBank security
Bank security
 
Prez ispay 2014_us
Prez ispay 2014_usPrez ispay 2014_us
Prez ispay 2014_us
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 Architecture
 
CONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customersCONNECTOR73 - communication between business and customers
CONNECTOR73 - communication between business and customers
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Smart Business using IoT
Smart Business using IoTSmart Business using IoT
Smart Business using IoT
 
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoTAuthentiThings: The Pitfalls and Promises of Authentication in the IoT
AuthentiThings: The Pitfalls and Promises of Authentication in the IoT
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0 IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
IoT Armour - Next-gen Zero Trust Cybersecurity for Industry 4.0
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
Null mumbai-iot-workshop
Null mumbai-iot-workshopNull mumbai-iot-workshop
Null mumbai-iot-workshop
 

En vedette

NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Team
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011AurMiana
 
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveBurak Ilgıcıoğlu
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryErfan Moradian
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Team
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPDroidcon Berlin
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...NFC Forum
 
Introduction to nfc
Introduction to nfcIntroduction to nfc
Introduction to nfcRay Cheng
 
Near field communication
Near field communicationNear field communication
Near field communicationdivyasolanki101
 
Tap into NFC Meetup - Boston
Tap into NFC Meetup  - Boston Tap into NFC Meetup  - Boston
Tap into NFC Meetup - Boston NFC Forum
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentationAkshat Rohatgi
 
NfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperNfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperTmac77
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Near Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteNear Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteAndrew Roughan
 
Mobile-based NFC fare collection
Mobile-based NFC fare collectionMobile-based NFC fare collection
Mobile-based NFC fare collectionnnaveiras
 

En vedette (20)

NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
 
Embedded systems security news mar 2011
Embedded systems security news mar 2011Embedded systems security news mar 2011
Embedded systems security news mar 2011
 
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/PerspectiveContactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
Contactless & NFC Ecosystem in Turkey & Yapi Kredi Products/Perspective
 
Emerging Technologies in Payment Industry
Emerging Technologies in Payment IndustryEmerging Technologies in Payment Industry
Emerging Technologies in Payment Industry
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
 
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXPdroidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
droidcon 2012: What's the Hack is NFC .., Hauke Meyn, NXP
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
 
Introduction to nfc
Introduction to nfcIntroduction to nfc
Introduction to nfc
 
Norme NFC - Romain Menetrier PAUG
Norme NFC - Romain Menetrier PAUGNorme NFC - Romain Menetrier PAUG
Norme NFC - Romain Menetrier PAUG
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Tap into NFC Meetup - Boston
Tap into NFC Meetup  - Boston Tap into NFC Meetup  - Boston
Tap into NFC Meetup - Boston
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
NfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White PaperNfC Forum Mobile NfC Ecosystem White Paper
NfC Forum Mobile NfC Ecosystem White Paper
 
La Saga NFC
La Saga NFCLa Saga NFC
La Saga NFC
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Near Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarteNear Field Communication on iPhone with iCarte
Near Field Communication on iPhone with iCarte
 
Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10Nfc developers nokia mit event 12 13 10
Nfc developers nokia mit event 12 13 10
 
Mobile-based NFC fare collection
Mobile-based NFC fare collectionMobile-based NFC fare collection
Mobile-based NFC fare collection
 

Similaire à NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow

Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
130418   makan pourzandi - esf -- an elastic security framework for cloud inf...130418   makan pourzandi - esf -- an elastic security framework for cloud inf...
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...Ptidej Team
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICSjohnsdeepsecure
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud AdoptionProtectWise
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
eWON_SecurityV5 - Public
eWON_SecurityV5 - PubliceWON_SecurityV5 - Public
eWON_SecurityV5 - PublicYvan Rudzinski
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloudHimani Singh
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocolKirti Ahirrao
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Ricardo Resnik
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 

Similaire à NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow (20)

Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
130418   makan pourzandi - esf -- an elastic security framework for cloud inf...130418   makan pourzandi - esf -- an elastic security framework for cloud inf...
130418 makan pourzandi - esf -- an elastic security framework for cloud inf...
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICS
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption
 
Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
eWON_SecurityV5 - Public
eWON_SecurityV5 - PubliceWON_SecurityV5 - Public
eWON_SecurityV5 - Public
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
oneM2M - Release 1 Primer
oneM2M - Release 1 PrimeroneM2M - Release 1 Primer
oneM2M - Release 1 Primer
 
Securing virtual workload and cloud
Securing virtual workload and cloudSecuring virtual workload and cloud
Securing virtual workload and cloud
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 

Dernier

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 

Dernier (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow

  • 1. EXTERNAL USE CHRISTOPH ZWAHLEN JUNE 1ST, 2016 PRESENT IMPROVED - FUTURE INSIDE HOW TO PROTECT YOUR CONTACTLESS SYSTEMS TODAY AND TOMORROW
  • 2. • Basic forms of password protection requires exchange of the actual secret – the password – to be exchanged • Additional measures used to improve weakness of basic form • Second factor authentication • Enciphered transmission of password • Password policies, e.g. minimal complexity, regular update • Achievement of basic requirements for protection • Confidentiality No • Authenticity No • Integrity No Passwords Commonly used to access to IT equipment and online services June 1, 20162.
  • 3. Agenda 1. Security requirements in access management 2. Requirements for sustainable system security 3. Practical implementation • MIFARE Plus EV1 • MIFARE DESFire EV2 Christoph Zwahlen Marketing Manager Access Management
  • 4. • Selective restriction of access to places and resources • Access management protects assets and value streams • Required level of protection depends on value of assets and value streams • Basic requirements for protection • Confidentiality • Authenticity • Integrity Access Management Protecting our assets 4. June 1, 2016
  • 5. Access Management Market Segments 5. Enterprise Access to corporate facilities and services including • Access mgmt. • Logical Access • Resource mgmt. • Payment • Parking • IT Services Hospitality Access to facilities and services including • Room Access • Leisure facilities • Parking • Vending Education Access to campus facilities and services including • Access mgmt. • Logical Access • Attendance ctrl. • Payment • IT Services • Library services Residential Access to residential buildings • House • Appartment building • Residential complex Leisure Access to leisure activities such as • Theme park • Fitness studio • Stadium • Event ticketing • Waterpark and Spa • Ski resorts June 1, 2016
  • 6. Access Management Security requirement 6. Single Use Low Value Limited Use Limited Value Long-term Use High Value Security means Password protection Authentication MAC Full enciphered communication ApplicationsProtected value Product recommendation June 1, 2016
  • 7. • Address current security demands • Appropriate security mechanisms for individual situation • Support of existing legacy applications • Updateability to comply with new security needs • Possibility to adopt to new security demands • Long term maintainability of protection mechanisms • Reliable and secure concepts for in-field updates • Application independent work flow • Individual migration depending on application requirements • Smooth migration path for cost efficiency Sustainable system security Demands for long-term protection of assets and value streams 7. June 1, 2016
  • 8. • Latest innovations in MIFARE portfolio simplify sustainable system security • MIFARE Plus EV1 Selective system security upgrades • MIFARE DESFire EV2 In-field key update procedure • Independent security validation according Common Criteria EAL5+ • Functional backwards compatibility MIFARE – Evolutionary enhancements Protecting contactless systems today and tomorrow! 8. June 1, 2016
  • 9. MIFARE Plus® generation benefits MIFARE Plus® EV1 MIFARE Plus S MIFARE Plus SE MIFARE Plus X MIFARE Plus EV1 RF Interface P rotocol UID – unique identifier Communication speed M emory size [Byte] 2KB 1KB 2KB 2KB 4KB 4KB 4KB M emory M odel Crypto Key Length Authentication Communication, S ecurity T ransaction M AC yes P roximity Check yes V irtual Card S elect CC Certification EAL4+ no EAL4+ EAL5+ IS O 7816-4 AP DU yes NFC compliance T arget applications Input capacitance 17pF 17pF 17pF 17pF or 70pF S ecure NFC channel in SL1& SL3 M ulti applications yes NFC capabilities in SL3 Public transport / Campus cards / Access management Compact, Sectors & 16- byte block Crypto- 1, AES 48- bit crypto- 1, 128- bit AES 3- pass mutual CMACed MIFARE Plus ISO/IEC 14443- 2, type A ISO/IEC 14443- 3&4 7- byte UID, 4- byte NUID, RID 106- 848 Kbps in SL3 level Supported via MAD no no no 1994 MIFARE Classic 2009 MIFARE Plus 06/2015 MIFARE Plus SE 04/2016 MIFARE Plus EV1 June 1, 20169.
  • 10. MIFARE Plus® EV1 Key Features 10. Functional backwards compatible to MIFARE Classic – Seamless upgrade path Functional backwards compatible to MIFARE Plus EV0 – Easy replacement Upgrade security relevant applications to AES only – Enable AES system security upgrades Leave non-security relevant applications in Crypto1 – Reduce system upgrade cost Performance Secureend-end comm. Sector-wiseSL switching SL1SL3 Mix Mode– Enabling fast security update for critical applications Transaction MAC – Fraudulent Transaction Claim Protection Fully ISO compliant Proximity Check – Relay Attack Protection Virtual Card Architecture – Privacy Protection Optimum transaction speed vs security – Fast & Reliable Transactions High-cap versions available – More Operating Range
  • 11. Features & Benefits 11. Sector-wise security level switching Optional AES secure channel in SL1 Extending the application scope for existing customers  Switching only necessary infrastructure to AES security  keep and operate non-security relevant Crypto1 infrastructure  Switching system integrators as soon as implementation is finished Enabling security update for critical applications  Introduce secure services into legacy systems  Fast enhancement of security critical use cases June 1, 2016
  • 12. Nutshell Security Concept for Physical Access Control Sector-wise Security Level Switching  Different security layers possible  Reduce system upgrade effort and complexity  Reduce system upgrade cost AES AES June 1, 201612.
  • 13. Optional security in legacy mode for critical use cases Optional AES secure channel in SL1 13. All applications use the same protocol  Seamless integration into existing infrastructure  Fast update of security in critical infrastructure  Reduce system upgrade cost June 1, 2016
  • 14. MIFARE DESFire® generation benefits MIFARE DESFire® EV2 14. 2002 MIFARE DESFire 2008 MIFARE DESFire EV1 2015 MIFARE DESFire EV1 256B 2016 MIFARE DESFire EV2 MIFARE DESFire EV1 MIFARE DESFire EV2 ISO/IEC 14443 A 1-4   ISO/IEC 7816-4 support extended extended EEPROM data memory 2/4/8KB 2/4/8KB Flexible file structure   NFC Forum Tag Type 4   Secure, high-speed cmd   Unique ID 7BUID or 4B RID 7BUID or 4B RID Number of applications 28 unlimited Number of files per app 32 32 High data rates support up to 848 Kbit/s up to 848 Kbit/s Crypto algorithms support DES/2K3DES/ 3K3DES/AES DES/2K3DES/ 3K3DES/AES CC certification (HW + SW) EAL 4+ EAL 5+ MIsmartApp feature -  Transaction MAC per app -  Multiple keysets per app - Up to 16 keysets Multiple file access rights - Up to 8 keys Inter-app files sharing -  Virtual Card Architecture -  Proximity Check -  Delivery types Wafer, MOA4 & MOA8 Wafer, MOA4 & MOB6June 1, 2016
  • 15. MIFARE DESFire® EV2 Key Features 15.
  • 16. Features & Benefits 16. Multiple Rolling Keysets • Simplified key changing procedure for deployed cards • Rolling to the next keyset can be done in a secure and reliable way in the field • Increase system security by rolling keyset regularly to limit its exposure in the field • A self-healing mechanism in the event of current keyset being compromised • Enabling current MIFARE DESFire installations to migrate to AES or 3K3DES crypto progressively Application n Std. Data File BackUp Data File Cyclic Record File Linear Record File Value File Application Keys Keyset 16 Keyset 2 … Active Keyset Keyset 2 Up to 16 keysets per applicationRollKey command June 1, 2016
  • 17. • Verify backwards compatibility of new products in existing components • Update key management procedures • Extend credential key management to extended features • Define system key deployment • Introduction of new platforms • Extended feature set for new and existing systems Integration Enabling in-field security updates 17. June 1, 2016
  • 18. Thank you Visit us at http://MIFARE.net Follow us: https://twitter.com/nxp_mifare https://at.linkedin.com/in/nxpmifarewww.youtube.com/user/nxpsemiconductorshttp://blog.nxp.com/ https://www.facebook.com/nxpsemi
  • 19. Q&A
  • 20. Webinar Series Outlook Date Title May 24th 2016 MIFARE Innovation Roadmap – present improved, future inside June 1st 2016 How to protect contactless systems today and tomorrow June 8th 2016 Enhanced user experience through active application management June 15th 2016 Streamlined user management for multi-vendor installations June 22nd 2016 Secure closed loop payments in an open environment June 29th 2016 Introduce the future in your today’s system – how to ensure smooth system upgrades July 6th 2016 Added value to card based environments through NFC and cloud – when IoT becomes reality July 13th 2016 Complement use cases with mobiles and wearables