+86-755-36991787

What is the authentication process of MIFARE?

Apr 12, 2023

The authentication process of MIFARE involves verifying the authenticity of the card and ensuring that the cardholder has the right to access the information or resources stored on the card. Here are the basic steps of the authentication process for MIFARE Classic and MIFARE DESFire cards:

MIFARE Classic Authentication Process:

  1. The card reader sends a request to the MIFARE Classic card to initiate communication.
  2. The card responds with its unique 4-byte serial number (UID).
  3. The reader sends a challenge to the card, which is a random number that will be used to authenticate the card.
  4. The card uses a secret key stored on the card to encrypt the challenge and sends the encrypted result back to the reader.
  5. The reader uses the same secret key to decrypt the response and compare it to the expected result. If the two match, the card is authenticated and can proceed with the desired action (such as access control or data transfer).

    MIFARE classic Authentication Process

     

MIFARE DESFire Authentication Process:

  1. The card reader sends a request to the MIFARE DESFire card to initiate communication.
  2. The card responds with its unique identifier (UID) and the list of supported commands.
  3. The reader sends a request to authenticate the card using a specific key, such as a master key or application key.
  4. The card responds with a random number (challenge) encrypted using the specified key.
  5. The reader decrypts the challenge using the same key and sends the result back to the card.
  6. The card verifies the response and, if successful, sends an authentication status back to the reader.
  7. The reader can now send commands to the card to perform specific tasks, such as reading or writing data.

Note that the authentication process may vary depending on the specific implementation of MIFARE technology and the security requirements of the application. Additionally, newer MIFARE cards may use more advanced encryption algorithms and authentication methods to enhance security.

Send Inquiry