
Smart Cards Lab COMPGA12 University College London
because though the functionality implemented may seem the same, the se-
curity will usually be degraded in cloned products.
Interestingly, such authentication data available inside the smart card,
that can be protected against modification also by a hardware mechanism.
Then one card cannot be reprogrammed to simulate another card.
10.1 Further Identification and Trace-ability and Examples
For example Philips/NXP have in addition to their UID on 4 bytes, 11
extra bytes in the first block of the card, that cannot be changed. This
allows very easily for Philips NXP to identify counterfeit products, and for
example Fudan cloned cards from China have at this place a constant string
”08 04 00” followed by ”b c d e f g h i” in ASCII. They make it very clear
that these cards don’t come from Pilips/NXP.
Another example is the London Oyster card, where the block 4 can never
be modified AFTER the card issued, even if one knows all the secret keys
of the card. We ignore what data exactly are contained in this block but for
sure Oyster cards can be reliably traced.
c
Nicolas T. Courtois 2009-10
Comentarios a estos manuales