Website: security.stackexchange.com
Rank: 200 / 1500
7 selected articles
Bank cards - chips vs mag stripe security - Information ...
up vote 9 down vote accepted
RFID is a technology for contactless cards. A basic smart card is not RFID-able; for decades, payment smart cards were not RFID; to talk to the chip you had to plug to it (that's what happens in a payment terminal).
In recent years, a number of banks have begun to promote some extra "electronic cash" systems. With such a system, an RFID-able chip is added into a...
Related topics : credit card smart chip vs rfid / rfid chip smart card / contactless smart card vs rfid / rfid and contactless smart card / smart card reader vs rfid
Are keys or RFID tags more secure access control solutions?
Are higher-security RFID tokens susceptible to power analysis attacks? As for "cloning keys from space", that's funny :) - Deer Hunter Jul 18 '13 at 5:35
1
@DeerHunter a power analysis attack would be against a specific installation or implementation, not against the underlying technology itself. Perhaps, for example, model X123 would be vulnerable if installed according to figure 3...
Related topics : rfid based security and access control system / rfid key tag / rfid security tag reader / rfid tag security issues / rfid tag reader system
Are keys or RFID tags more secure access control solutions?
1
@DeerHunter a power analysis attack would be against a specific installation or implementation, not against the underlying technology itself. Perhaps, for example, model X123 would be vulnerable if installed according to figure 3 in...
Related topics : rfid based security and access control system / rfid key tag / rfid security tag reader / rfid tag security issues / rfid tag reader system
How can RFID/NFC tags not be cloned when they are passive ...
48
I like how this answer also explains the low-level stuff like how the card actually gets powered and talks to the reader. - André Borie Aug 2 '16 at 2:48
34
I forgot i wasn't on the electronics stackexchange for a second.. good answer. - James Trotter Aug 2 '16 at 7:35
3
Disagree on the part of impossible to "clone" or "copy" . Anything that store digitally can be clone, just...
Related topics : rfid chip card reader / nfc rfid card reader / radio frequency card reader / rf card reader circuit / rfid card reader system
User authentication with smart cards or RFID on Mac (OS X ...
I am developing a software that handles privacy sensitive data in a local network environment, using Mac computers, to which only a select group of people may have access.
I need to understand how I can provide secure and personalized access to the (same) data by each authorized person.
The data is stored in a SQL database (currently Sqlite but eventually probably Postgresql) and shall be...
Related topics : rfid based smart card security system / rfid based smart card reader / rfid card reader software mac / rfid based smart card / usb rfid card reader software
Is there a reason why Android blocks emulating a RFID tag ...
The reader sends a random number, 2. the tag encrypts that number with its private key and sends the result back, 3. the reader verifies it with the tag's public...
Related topics : rfid tag reader android / rfid tag emulator android / rfid tag id number / rfid tag and reader working / rfid tag and reader
physical - Using RFID-only on door lock to house ...
4
I like this answer. I recently was in a conversation about bike locks, which although made of pretty hard steel, are often easy to crack with bump keys. I recommended the usage of $20-flea-market-bikes in areas where it is likely that bikes get stolen instead of buying a $100 lock that can't protect your $1000 bike... Of course this doesn't apply to houses where naturally most of your stuff...
Related topics : rfid security door locks / rfid house door lock / rfid door lock system / rfid door locks / rfid security door system
7 Resources