![](bg5.png)
ror code. However, we get a speed up because our
implementation uses only 95 registers per thread of
the GPU, compared to 154 registers of the attack of
Section 3.1. This way we can call 512 threads per
block of GPU to get better occupancy, compared to
256 threads used in the other attack. During these ex-
periments, although our GTX970 GPU has a proces-
sor clock of 1253 MHz, it was clocked to 1329 MHz
due to its GPU Boost technology.
4 CONCLUSIONS
MIFARE Classic is the most widely deployed contact-
less smartcard on the market and many vulnerabili-
ties are provided in the literature. Offline attacks on
these cards are possible due to the short key, parity
bit vulnerability, and keystream leakage through er-
ror vulnerability. In this work, we optimized these
brute force attacks on GPUs using a bitsliced imple-
mentation and observed that it takes less than only 5
hours to perform the attack of (Garcia et al., 2009) on
a single GTX970 GPU when we have the keystream
leakage through error vulnerability. Hardened cards
do not have this vulnerability and we showed that the
brute force attack of (Meijer and Verdult, 2015) for
these cards takes around 7 hours to perform it on a
single GTX970 GPU. Thus, we show that these brute
force attacks to clone MIFARE Classic cards are way
more practical than it was assumed.
ACKNOWLEDGEMENTS
This work was supported by The Scientific
and Technological Research Council of Turkey
(T
¨
UB
˙
ITAK) under the grant 115E447 titled ”Quasi-
Differential Factors and Time Complexity of Block
Cipher Attacks”.
REFERENCES
Biham, E. (1997). A fast new DES implementation in soft-
ware. In Biham, E., editor, Fast Software Encryption,
4th International Workshop, FSE ’97, Haifa, Israel,
January 20-22, 1997, Proceedings, volume 1267 of
Lecture Notes in Computer Science, pages 260–272.
Springer.
Chih, M.-Y., Shih, J.-R., Yang, B.-Y., Ding, J., and Cheng,
C.-M. (2010). MIFARE Classic: Practical attacks and
defenses. In Proceedings of the 19th Cryptology and
Information Security Conference (CISC 2010), Hsin-
chu, Taiwan.
Chiu, Y., Hong, W., Chou, L., Ding, J., Yang, B., and
Cheng, C. (2013). A practical attack on patched MI-
FARE classic. In Lin, D., Xu, S., and Yung, M., edi-
tors, Information Security and Cryptology - 9th In-
ternational Conference, Inscrypt 2013, Guangzhou,
China, November 27-30, 2013, Revised Selected Pa-
pers, volume 8567 of Lecture Notes in Computer
Science, pages 150–164. Springer.
Courtois, N. (2009). The dark side of security by obscurity
- and cloning mifare classic rail and building passes,
anywhere, anytime. In Fern
´
andez-Medina, E., Ma-
lek, M., and Hernando, J., editors, SECRYPT 2009,
Proceedings of the International Conference on Secu-
rity and Cryptography, Milan, Italy, July 7-10, 2009,
SECRYPT is part of ICETE - The International Joint
Conference on e-Business and Telecommunications,
pages 331–338. INSTICC Press.
de Koning Gans, G., Hoepman, J., and Garcia, F. D.
(2008). A practical attack on the MIFARE classic.
In Grimaud, G. and Standaert, F., editors, Smart Card
Research and Advanced Applications, 8th IFIP WG
8.8/11.2 International Conference, CARDIS 2008,
London, UK, September 8-11, 2008. Proceedings, vo-
lume 5189 of Lecture Notes in Computer Science, pa-
ges 267–282. Springer.
Garcia, F. D., de Koning Gans, G., Muijrers, R., van Ros-
sum, P., Verdult, R., Schreur, R. W., and Jacobs, B.
(2008). Dismantling MIFARE classic. In Jajodia,
S. and L
´
opez, J., editors, Computer Security - ESO-
RICS 2008, 13th European Symposium on Research
in Computer Security, M
´
alaga, Spain, October 6-8,
2008. Proceedings, volume 5283 of Lecture Notes in
Computer Science, pages 97–114. Springer.
Garcia, F. D., van Rossum, P., Verdult, R., and Schreur,
R. W. (2009). Wirelessly pickpocketing a mifare clas-
sic card. In 30th IEEE Symposium on Security and
Privacy (S&P 2009), 17-20 May 2009, Oakland, Ca-
lifornia, USA, pages 3–15. IEEE Computer Society.
Meijer, C. and Verdult, R. (2015). Ciphertext-only crypta-
nalysis on hardened mifare classic cards. In Ray, I., Li,
N., and Kruegel, C., editors, Proceedings of the 22nd
ACM SIGSAC Conference on Computer and Commu-
nications Security, Denver, CO, USA, October 12-6,
2015, pages 18–30. ACM.
Nohl, K., Evans, D., Starbug, and Pl
¨
otz, H. (2008). Reverse-
engineering a cryptographic RFID tag. In van Oor-
schot, P. C., editor, Proceedings of the 17th USE-
NIX Security Symposium, July 28-August 1, 2008, San
Jose, CA, USA, pages 185–194. USENIX Association.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
528