MIFARE products are embedded in
contactless and contact smart cards, smart paper tickets,
wearables and phones. The MIFARE brand name (derived from the term MIKRON FARE collection and created by the company
Mikron) covers four families of contactless cards: ; MIFARE Classic: Employs a proprietary protocol compliant with parts 1–3 of
ISO/IEC 14443 Type A, with an NXP proprietary security protocol for authentication and ciphering. Subtypes: MIFARE Classic EV1 (other subtypes are no longer in use). ; MIFARE Plus: Drop-in replacement for MIFARE Classic with certified
security level (AES-128 based) and is fully backwards compatible with MIFARE Classic. Subtypes: MIFARE Plus S, MIFARE Plus X, MIFARE Plus SE and MIFARE Plus EV2. ; MIFARE Ultralight: Low-cost ICs that are useful for high volume applications such as public transport, loyalty cards and event ticketing. Subtypes: MIFARE Ultralight C, MIFARE Ultralight EV1, MIFARE Ultralight Nano and MIFARE Ultralight AES. ; MIFARE DESFire: Contactless ICs that comply with parts 3 and 4 of ISO/IEC 14443-4 Type A with a mask-ROM operating system from NXP. The
DES in the name refers to the use of a DES, two-key
3DES, three-key 3DES and AES encryption; while
Fire is an acronym for
Fast, innovative, reliable, and enhanced. Subtypes: MIFARE DESFire EV1, MIFARE DESFire EV2, MIFARE DESFire EV3, MIFARE DESFire EV3C and MIFARE DESFire Light. ; MIFARE DUOX: Contactless ICs that implement an ISO/IEC 14443-4 file system and secure messaging similar to MIFARE DESFire EV2/EV3, but with added support for public-key authentication. Unlike DESFire, DUOX chips no longer support the deprecated DES algorithm. The supported authentication key types are 128-bit AES, 256-bit AES and 256-bit
elliptic-curve cryptography (ECC) with
X.509 public-key certificate handling. There is also the MIFARE SAM AV2 contact smart card. This can be used to handle the encryption in communicating with the contactless cards. The SAM (Secure Access Module) provides the secure storage of
cryptographic keys and cryptographic functions.
MIFARE Classic family The MIFARE Classic IC is a basic memory storage device, where the memory is divided into segments and blocks with simple security mechanisms for
access control. They are
ASIC-based and have limited computational power. Due to their reliability and low cost, those cards are widely used for electronic wallets, access control, corporate ID cards, transportation or stadium ticketing. It uses an NXP proprietary security protocol (
Crypto-1) for authentication and ciphering. MIFARE Classic encryption has been compromised; see
below for details.), the Google Nexus 4, Google Nexus 7 LTE and Nexus 10 (October 2013) can't read/write TecTile stickers.
MIFARE Plus family MIFARE Plus MIFARE Plus is a replacement IC solution for the MIFARE Classic. It is less flexible than a MIFARE DESFire EV1 contactless IC. MIFARE Plus was publicly announced in March 2008 with first samples in Q1 2009. MIFARE Plus, when used in older transportation systems that do not yet support AES on the reader side, still leaves an open door to attacks. Though it helps to mitigate threats from attacks that broke the
Crypto-1 cipher through the weak random number generator, it does not help against brute force attacks and crypto analytic attacks. During the transition period from MIFARE Classic to MIFARE Plus where only a few readers might support AES in the first place, it offers an optional AES authentication in Security Level 1 (which is in fact MIFARE Classic operation). This does not prevent the attacks mentioned above but enables a secure mutual authentication between the reader and the card to prove that the card belongs to the system and is not fake. In its highest security level SL3, using 128-bit AES encryption, MIFARE Plus is secured from attacks.
MIFARE Plus EV1 MIFARE Plus EV1 was announced in April 2016. New features compared to MIFARE Plus X include: ; Sector-wise security-level switching: The choice of crypto algorithm used in the authentication protocol can be set separately for each sector. This makes it possible to use the same card with both readers that can read MIFARE Classic products (with sectors protected by
48-bit CRYPTO1 keys, "Security Level 1") and readers that can read MIFARE Plus products (with sectors protected by 128-bit
AES keys, "Security Level 3"). This feature is intended to make it easier to gradually migrate existing MIFARE Classic product-based installations to MIFARE Plus, without having to replace all readers at the same time. ; ISO 7816-4 wrapping: The card can now be accessed in either the protocol for MIFARE (which is not compliant with the
ISO 7816-4
APDU format), or using a new protocol variant that runs on top of ISO 7816-4. This way the cards become compatible with NFC reader APIs that can only exchange messages in ISO 7816-4 APDU format, with a maximum transfer data buffer size of 256 bytes. ; Proximity check: While the protocol for MIFARE Classic tolerated message delays of several seconds, and was therefore vulnerable to relay attacks, MIFARE Plus EV1 now implements a basic "ISO compliant"
distance-bounding protocol. This puts tighter timing constraints on the permitted round-trip delay during authentication, to make it harder to forward messages to far-away cards or readers via computer networks. ; Secure end-2-end channel: Permits AES-protected over-the-air updates even to Crypto1 application sectors (SL1SL3 mix mode). ; Transaction MAC: The card can produce an additional
message-authentication code over a transaction that can be verified by a remote clearing service, independent of the keys used by the local reader during the transaction.
MIFARE Plus EV2 The MIFARE Plus EV2 was introduced to the market on 23 June 2020. It comes with an enhanced read performance and transaction speed compared to MIFARE Plus EV1. New features compared to MIFARE Plus EV1 include: ; Transaction Timer: To help mitigate man-in-the-middle attacks, the Transaction Timer feature, which is also available on NXP's MIFARE DESFire EV3 IC, makes it possible to set a maximum time per transaction, so it's harder for an attacker to interfere with the transaction.
MIFARE Ultralight family MIFARE Ultralight The MIFARE Ultralight has only 512 bits of memory (i.e. 64 bytes), without cryptographic security. The memory is provided in 16
pages of 4 bytes. Cards based on these chips are so inexpensive that they are often used for disposable tickets for events such as the
2006 FIFA World Cup. It provides only basic security features such as one-time-programmable (OTP) bits and a write-lock feature to prevent re-writing of memory pages but does not include cryptography as applied in other MIFARE product-based cards.
MIFARE Ultralight EV1 MIFARE Ultralight EV1 introduced in November 2012 the next generation of paper ticketing smart card ICs for limited-use applications for ticketing schemes and additional security options. It comes with several enhancements above the original MIFARE Ultralight: • 384 and 1024 bits user memory product variants • OTP, lock bits, configurable counters for improved security • Three independent 24-bit one-way counters to stop reloading • Protected data access through 32-bit password • ECC originality check. However, the purpose of it "during (pre-)personalization is to protect customer investments by identifying mass penetration of non-NXP originated MIFARE Ultralight AES ICs into an infrastructure. As individual signatures can still be copied, it does not completely prevent hardware copy or emulation of individual MIFARE Ultralight AES ICs."
MIFARE Ultralight C Introduced at the Cartes industry trade show in 2008, the MIFARE Ultralight C IC is part of NXP's low-cost MIFARE product offering (disposable ticket). With Triple DES, MIFARE Ultralight C uses a widely adopted standard, enabling easy integration in existing infrastructures. The integrated Triple DES authentication provides an effective countermeasure against cloning. Key applications for MIFARE Ultralight C are public transportation, event ticketing, loyalty and NFC Forum tag type 2.
MIFARE Ultralight AES It was introduced in 2022.
MIFARE DESFire family MIFARE DESFire The MIFARE DESFire (MF3ICD40) was introduced in 2002 and is based on a core similar to SmartMX, with more hardware and software security features than MIFARE Classic. It comes pre-programmed with the general-purpose MIFARE DESFire operating system which offers a simple directory structure and files. They are sold in four variants: One with Triple-DES only and 4 KiB of storage, and three with AES (2, 4, or 8 kiB; see MIFARE DESFire EV1). The AES variants have additional security features; e.g.,
CMAC. MIFARE DESFire uses a protocol compliant with ISO/IEC 14443-4. The contactless IC is based on an
8051 processor with 3DES/AES cryptographic accelerator, making very fast transactions possible. The maximal read/write distance between card and reader is , but the actual distance depends on the field power generated by the reader and its antenna size. In 2010, NXP announced the discontinuation of the MIFARE DESFire (MF3ICD40) after it had introduced its successor MIFARE DESFire EV1 (MF3ICD41) in late 2008. In October 2011 researchers of Ruhr University Bochum announced that they had broken the security of MIFARE DESFire (MF3ICD40), which was acknowledged by NXP (see
MIFARE DESFire security).
MIFARE DESFire EV1 First evolution of MIFARE DESFire contactless IC, broadly backwards compatible. Available with 2 KiB, 4 KiB, and 8 KiB non-volatile memory. Other features include: • Support for random ID • Support for 128-bit
AES • Hardware and operating system are
Common Criteria certified at level
EAL 4+ MIFARE DESFire EV1 was publicly announced in November 2006.
MIFARE DESFire EV2 The second evolution of the MIFARE DESFire contactless IC family, broadly backwards compatible. New features include: • MI smart App enabling to offer or sell memory space for additional applications of 3rd parties without the need to share secret keys • Transaction MAC to authenticate transactions by 3rd parties • Virtual Card Architecture for privacy protection • Proximity check against relay attacks MIFARE DESFire EV2 was publicly announced in March 2016 at the IT-TRANS event in Karlsruhe, Germany
MIFARE DESFire EV3 The latest evolution of the MIFARE DESFire contactless IC family, broadly backward compatible. New features include: • ISO/IEC 14443 A 1–4 and ISO/IEC 7816-4 compliant • Common Criteria EAL5+ certified for IC hardware and software • NFC Forum Tag Type 4 compliant • SUN message authentication for advanced data protection within standard NDEF read operation • Choice of open DES/2K3DES/3K3DES/AES crypto algorithms • Flexible file structure: hosts as many applications as the memory size supports • Proof of transaction with card generated
MAC • Transaction Timer mitigates risk of man-in-the-middle attacks MIFARE DESFire EV3 was publicly announced on 2 June 2020.
MIFARE 2GO A cloud-based platform that digitizes MIFARE product-based smart cards and makes them available on NFC-enabled smartphones and wearables. With this, new Smart City use cases such as mobile transit ticketing, mobile access and mobile micropayments are being enabled. ==Byte layout==