SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
EXTERNAL
NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V.
ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.
A U G U S T 4 T H 2 0 2 0
Florian Mikulik
Senior Product Support Engineer, NXP
Security Level
SL3 Capabilities
A MIFARE Plus® EV2 KEY FEATURE
VIDEO
1EXTERNAL
MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES
U P G R AD E Y O U R S Y S T EM S S E C U R I T Y
Authenticity,
Confidentiality and
Integrity
based on AES-128
Virtual Card
Concept to be used
in smartphone-
based installations
ISO7816 APDU
format support
• Security Level 3 offers support for AES-128 based secure messaging, to provide authenticity, confidentiality and integrity to every
transaction
• Once a MIFARE Plus EV2 product-based card is switched to SL3, it also offers support for the Virtual Card Architecture concept, which
helps to manage a MIFARE Plus EV2 product-based card in a multi-application environment, designed for e.g. mobile phones performing
contactless transactions, holding more than one “virtual card”
 MIFARE Plus EV2 product-based card acts as a single “virtual card”, but supports necessary command infrastructure to be
indistinguishable from a multi-VC mobile phone, maintaining privacy for card holder
• In SL3, the MIFARE Plus EV2 supports ISO7816-4 compliant VC selection (ISOSelect), compliant with Java Card and GlobalPlatform
standards
2EXTERNAL
MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES
S E C U RE M E S S AG I N G
• Security Level switch is done through an AuthenticateFirst command targeting Block 9003h (SL3SwitchKey)
• A switch to SL3 disables the use of CRYPTO-1 completely
− Data and memory architecture of the card does not change at all – Block/Sector based memory model stays the same
• Initial memory space for CRYPTO-1 keys can now be used as additional user memory (+11 byte per sector)
− AES keys are stored outside the User Memory
• Plain or encrypted data access can be defined per Block
• Transaction management with session keys is possible via AuthenticateFirst and AuthenticateNonFirst
• Several options for read commands
− MAC on command
− MAC on response
− Data encrypted or plain
• Several options for write/value commands
− MAC on command
− MAC on response
− Data is always encrypted
• Additional features (TMAC, Transaction Timer, multi-block read/write, VCA) can be used
3EXTERNAL
MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES
I S O / I E C 7 8 1 6 -4 V I R T U AL C AR D AR C H I T E C T UR E
• MIFARE Plus EV2 supports ISOSelect and is complaint with Java Card and Global Platform mechanisms
• Using MIFARE Plus EV2 in Security Level 3 and ISO/IEC 7816-4 wrapped communication frames supports mobile operations
VC concept using ISO/IEC 7816-4 compliant selection method
Enables smartphone support in infrastructures
Transit
Pass
Transit
Pass
4EXTERNAL
MORE INFORMATION ABOUT THE TRANSACTION TIMER FEATURE
Item Number Availability
Datasheet - MIFARE Plus EV2 DS5223 NXP DocStore (confidential)
Application Note - MIFARE Plus EV2 Features and Hints AN5762 NXP DocStore (confidential)
Application Note - MIFARE Plus EV2 personalization commands AN5763 NXP DocStore (confidential)
Application Note - Card coil design notes for MIFARE Plus EV2 AN5759 NXP DocStore (confidential)
Application Note - Comparison between MIFARE Plus EV2 and
previous types
AN5760 NXP DocStore (confidential)
Application Note – Originality Signature Validation AN5764 NXP DocStore (confidential)
RFID Discover Software SW1866 NXP DocStore (confidential)
NXP Reader Library (Windows based) SW1717 NXP DocStore (confidential)
NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.

Mais conteúdo relacionado

Mais procurados

Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceNetcetera
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksShreeya Shah
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature StandardSou Jana
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyMd. Shafiul Alam Sagor
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudVeloCloud Networks, Inc.
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)deepak171991
 
Attendance System using RFID
Attendance System using RFIDAttendance System using RFID
Attendance System using RFIDnazuranajmi916
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)mahima28
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)Ryuichi Yasunaga
 
Mpls hacking security Myth
Mpls hacking security MythMpls hacking security Myth
Mpls hacking security Mythidsecconf
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingajithc0003
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technologyAnkur Sharma
 

Mais procurados (20)

Ch9
Ch9Ch9
Ch9
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
Digital Signature Standard
Digital Signature StandardDigital Signature Standard
Digital Signature Standard
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloudMaximizing SD-WAN Architecture with Service Chaining - VeloCloud
Maximizing SD-WAN Architecture with Service Chaining - VeloCloud
 
Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
Attendance System using RFID
Attendance System using RFIDAttendance System using RFID
Attendance System using RFID
 
Near field communication ppt
Near field communication pptNear field communication ppt
Near field communication ppt
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
3GPP 5G SA Detailed explanation 2(5G Network Slice Call Flow)
 
Mpls hacking security Myth
Mpls hacking security MythMpls hacking security Myth
Mpls hacking security Myth
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Watermark
WatermarkWatermark
Watermark
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 

Semelhante a Security Level 3 (SL3) Capabilities

Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionSenetas
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of SystemsJamal Jamali
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Sailaja Tennati
 
pacs-iclass-se-reader-family-ds-en.pdf
pacs-iclass-se-reader-family-ds-en.pdfpacs-iclass-se-reader-family-ds-en.pdf
pacs-iclass-se-reader-family-ds-en.pdfAngelaperez519150
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud ADVA
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriElmarkPlusTurkiye
 
Keri Training ADI Presentation
Keri Training ADI PresentationKeri Training ADI Presentation
Keri Training ADI Presentationkeriwebmaster
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substationsRyan O'Mara
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...Mikael Falkvidd
 
Squire Technologies: Signalling Gateway
Squire Technologies: Signalling GatewaySquire Technologies: Signalling Gateway
Squire Technologies: Signalling GatewaySquire Technologies
 
Switch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdf
Switch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdfSwitch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdf
Switch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdfGUSTAVOQUISPEQUISPE2
 

Semelhante a Security Level 3 (SL3) Capabilities (20)

SL1SL3 MixMode Feature
SL1SL3 MixMode FeatureSL1SL3 MixMode Feature
SL1SL3 MixMode Feature
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
SlingSecure USB Eng
SlingSecure USB EngSlingSecure USB Eng
SlingSecure USB Eng
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
s2000nano
s2000nanos2000nano
s2000nano
 
Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance Testing Network Routers for Extreme Scale and Performance
Testing Network Routers for Extreme Scale and Performance
 
pacs-iclass-se-reader-family-ds-en.pdf
pacs-iclass-se-reader-family-ds-en.pdfpacs-iclass-se-reader-family-ds-en.pdf
pacs-iclass-se-reader-family-ds-en.pdf
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
Endüstriyel Router Çözümleri
Endüstriyel Router ÇözümleriEndüstriyel Router Çözümleri
Endüstriyel Router Çözümleri
 
Keri Training ADI Presentation
Keri Training ADI PresentationKeri Training ADI Presentation
Keri Training ADI Presentation
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substations
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
IoT LPWAN network security: Sigfox and LoRaWAN (Mikael Falkvidd @ Knowit secu...
 
Squire Technologies: Signalling Gateway
Squire Technologies: Signalling GatewaySquire Technologies: Signalling Gateway
Squire Technologies: Signalling Gateway
 
Switch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdf
Switch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdfSwitch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdf
Switch administrable - D Link - DGS 1210 - SERIE F2.pdf.pdf
 

Mais de NXP MIFARE Team

NTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNXP MIFARE Team
 
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Team
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Team
 
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Team
 
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Team
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Team
 
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Team
 
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Team
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Team
 

Mais de NXP MIFARE Team (9)

NTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking CostsNTA's Leap Card - Expanding Ticketing while Shrinking Costs
NTA's Leap Card - Expanding Ticketing while Shrinking Costs
 
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And WearablesNXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
NXP MIFARE Webinar: Complement Use Cases With Mobiles And Wearables
 
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And CloudNXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
 
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
 
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
 
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
 
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
 
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And TomorrowNXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
 

Último

Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfShahdAbdElsamea2
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...Amil Baba Dawood bangali
 
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekpavan402055
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作ss846v0c
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Amil baba
 
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作rpb5qxou
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作f3774p8b
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin68 Club
 

Último (9)

Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
 
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
 
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
 

Security Level 3 (SL3) Capabilities

  • 1. EXTERNAL NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V. A U G U S T 4 T H 2 0 2 0 Florian Mikulik Senior Product Support Engineer, NXP Security Level SL3 Capabilities A MIFARE Plus® EV2 KEY FEATURE VIDEO
  • 2. 1EXTERNAL MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES U P G R AD E Y O U R S Y S T EM S S E C U R I T Y Authenticity, Confidentiality and Integrity based on AES-128 Virtual Card Concept to be used in smartphone- based installations ISO7816 APDU format support • Security Level 3 offers support for AES-128 based secure messaging, to provide authenticity, confidentiality and integrity to every transaction • Once a MIFARE Plus EV2 product-based card is switched to SL3, it also offers support for the Virtual Card Architecture concept, which helps to manage a MIFARE Plus EV2 product-based card in a multi-application environment, designed for e.g. mobile phones performing contactless transactions, holding more than one “virtual card”  MIFARE Plus EV2 product-based card acts as a single “virtual card”, but supports necessary command infrastructure to be indistinguishable from a multi-VC mobile phone, maintaining privacy for card holder • In SL3, the MIFARE Plus EV2 supports ISO7816-4 compliant VC selection (ISOSelect), compliant with Java Card and GlobalPlatform standards
  • 3. 2EXTERNAL MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES S E C U RE M E S S AG I N G • Security Level switch is done through an AuthenticateFirst command targeting Block 9003h (SL3SwitchKey) • A switch to SL3 disables the use of CRYPTO-1 completely − Data and memory architecture of the card does not change at all – Block/Sector based memory model stays the same • Initial memory space for CRYPTO-1 keys can now be used as additional user memory (+11 byte per sector) − AES keys are stored outside the User Memory • Plain or encrypted data access can be defined per Block • Transaction management with session keys is possible via AuthenticateFirst and AuthenticateNonFirst • Several options for read commands − MAC on command − MAC on response − Data encrypted or plain • Several options for write/value commands − MAC on command − MAC on response − Data is always encrypted • Additional features (TMAC, Transaction Timer, multi-block read/write, VCA) can be used
  • 4. 3EXTERNAL MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES I S O / I E C 7 8 1 6 -4 V I R T U AL C AR D AR C H I T E C T UR E • MIFARE Plus EV2 supports ISOSelect and is complaint with Java Card and Global Platform mechanisms • Using MIFARE Plus EV2 in Security Level 3 and ISO/IEC 7816-4 wrapped communication frames supports mobile operations VC concept using ISO/IEC 7816-4 compliant selection method Enables smartphone support in infrastructures Transit Pass Transit Pass
  • 5. 4EXTERNAL MORE INFORMATION ABOUT THE TRANSACTION TIMER FEATURE Item Number Availability Datasheet - MIFARE Plus EV2 DS5223 NXP DocStore (confidential) Application Note - MIFARE Plus EV2 Features and Hints AN5762 NXP DocStore (confidential) Application Note - MIFARE Plus EV2 personalization commands AN5763 NXP DocStore (confidential) Application Note - Card coil design notes for MIFARE Plus EV2 AN5759 NXP DocStore (confidential) Application Note - Comparison between MIFARE Plus EV2 and previous types AN5760 NXP DocStore (confidential) Application Note – Originality Signature Validation AN5764 NXP DocStore (confidential) RFID Discover Software SW1866 NXP DocStore (confidential) NXP Reader Library (Windows based) SW1717 NXP DocStore (confidential)
  • 6. NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.