LIS Links

First and Largest Academic Social Network of LIS Professionals in India

Latest Activity

Archanagita Saikia is attending Md Nasm Akhtar's event

Online workshop on KOHA at Online

June 1, 2025 from 10am to 1pm
yesterday
Md Nasm Akhtar shared their event on Facebook
yesterday
Sumit Chakraborty updated their profile
yesterday
Sumit Chakraborty might attend Sourav Debnath's event
Thumbnail

Online National workshop on Library Management using Open Source Software at Dhanbad

June 16, 2025 at 10am to June 20, 2025 at 5pm
yesterday
Dr. U. PRAMANATHAN posted blog posts
Friday
Dr. U. PRAMANATHAN posted discussions
Friday
Md Nasm Akhtar posted an event

Online workshop on KOHA at Online

June 1, 2025 from 10am to 1pm
Friday
B.VERMA updated their profile
Friday
Md Nasm Akhtar posted a status
"Online workshop on KOHA"
Thursday
Md Nasm Akhtar posted a status
"workshop on koha"
Thursday
shradhashesh posted discussions
Thursday
Hima Bindu posted a discussion
Thursday
Sourav Debnath posted a discussion
Thursday
Sunita Pareek posted an event
Thursday
Hemanta Kumar Biswal posted an event

International Seminar on Futuristic Vision : Cutting Edge Issues in Teacher Education and Research (ISFV–CETER) at Satyapriya Roy College of Education AA-287, Sector - 1, Salt Lake, Kolkata - 700 064

June 7, 2025 at 9am to June 8, 2025 at 6pm
Thursday
RAMESH posted an event
Thursday
Sourav Debnath posted an event
Thumbnail

Online National workshop on Library Management using Open Source Software at Dhanbad

June 16, 2025 at 10am to June 20, 2025 at 5pm
Thursday
Dr. U. PRAMANATHAN posted an event

ICSSR, New Delhi Sponsored Ten Days ‘Research Methodology Course for M.Phil./Ph.D./PDF Women Research Scholars in Social Sciences’ (21st to 30th July 2025) at Department of Studies and Research in Library and Information Science and Karnataka State Open University Library, Mukthagangothri, Mysuru, Karnataka – 570 006.

July 21, 2025 at 9am to July 30, 2025 at 5pm
Thursday
Dr. U. PRAMANATHAN posted blog posts
Thursday
Dr. B. L. Sharma updated their profile
Wednesday

German researchers crack RFID smartcard encryption

 

German researchers have cracked the encryption used to protect a type of smartcard whose functions range from restricting access to buildings to processing public transit system payments.

The team demonstrated a hack that can duplicate the magnetic security card and break a previous version of contactless ID cards from Mifare in 2008.

"The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated measurements of electricity consumption during encryption and decryption. This can be determined by measuring the magnetic field close to the card," The Hacker News said.

It was this same team that broke a previous version of contactless-ID cards from Mifare in 2008.

At the time, the intrusion prompted Mifare to upgrade its security to create a card able to be programmed only once.

The upgrade also contained a unique identifying number that could be checked against the programmed content on the card for extra security.

A separate article on IT World identified the researchers who worked on both cracks as David Oswald and Christof Paar at Ruhr University in Germany.

In their cracks, the team used a probe and oscilloscope to record the card's broadcasts while it's being read by and RFID reader.

The researchers needed about seven hours to crack the security on one card and get its 112-bit encryption key, the IT World article said.

However, they said it only works if one spent months profiling the card's architecture, behavior and responses.

They also noted the weak point for the MF31CD40 – and many of NXD's other cards, which were the ones cracked – is that it does little or nothing to resist being recorded, prodded and poked by crackers.

The EV1 upgrade to that card has an on-chip backup management systems, an authentication mechanism that uses three separate authentication methods, encryption based on the 3DES hardware encryption that meets security requirements for most U.S. government agencies, but is compatible with existing systems designed to read the card using Near Field Communications (NFC) radio systems.

Views: 164

Reply to This

© 2025   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

Koha Workshop