SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
EXTERNAL
NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V.
ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.
A U G U S T 4 T H 2 0 2 0
Florian Mikulik
Senior Product Support Engineer, NXP
Security Level
SL3 Capabilities
A MIFARE Plus® EV2 KEY FEATURE
VIDEO
1EXTERNAL
MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES
U P G R AD E Y O U R S Y S T EM S S E C U R I T Y
Authenticity,
Confidentiality and
Integrity
based on AES-128
Virtual Card
Concept to be used
in smartphone-
based installations
ISO7816 APDU
format support
• Security Level 3 offers support for AES-128 based secure messaging, to provide authenticity, confidentiality and integrity to every
transaction
• Once a MIFARE Plus EV2 product-based card is switched to SL3, it also offers support for the Virtual Card Architecture concept, which
helps to manage a MIFARE Plus EV2 product-based card in a multi-application environment, designed for e.g. mobile phones performing
contactless transactions, holding more than one “virtual card”
 MIFARE Plus EV2 product-based card acts as a single “virtual card”, but supports necessary command infrastructure to be
indistinguishable from a multi-VC mobile phone, maintaining privacy for card holder
• In SL3, the MIFARE Plus EV2 supports ISO7816-4 compliant VC selection (ISOSelect), compliant with Java Card and GlobalPlatform
standards
2EXTERNAL
MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES
S E C U RE M E S S AG I N G
• Security Level switch is done through an AuthenticateFirst command targeting Block 9003h (SL3SwitchKey)
• A switch to SL3 disables the use of CRYPTO-1 completely
− Data and memory architecture of the card does not change at all – Block/Sector based memory model stays the same
• Initial memory space for CRYPTO-1 keys can now be used as additional user memory (+11 byte per sector)
− AES keys are stored outside the User Memory
• Plain or encrypted data access can be defined per Block
• Transaction management with session keys is possible via AuthenticateFirst and AuthenticateNonFirst
• Several options for read commands
− MAC on command
− MAC on response
− Data encrypted or plain
• Several options for write/value commands
− MAC on command
− MAC on response
− Data is always encrypted
• Additional features (TMAC, Transaction Timer, multi-block read/write, VCA) can be used
3EXTERNAL
MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES
I S O / I E C 7 8 1 6 -4 V I R T U AL C AR D AR C H I T E C T UR E
• MIFARE Plus EV2 supports ISOSelect and is complaint with Java Card and Global Platform mechanisms
• Using MIFARE Plus EV2 in Security Level 3 and ISO/IEC 7816-4 wrapped communication frames supports mobile operations
VC concept using ISO/IEC 7816-4 compliant selection method
Enables smartphone support in infrastructures
Transit
Pass
Transit
Pass
4EXTERNAL
MORE INFORMATION ABOUT THE TRANSACTION TIMER FEATURE
Item Number Availability
Datasheet - MIFARE Plus EV2 DS5223 NXP DocStore (confidential)
Application Note - MIFARE Plus EV2 Features and Hints AN5762 NXP DocStore (confidential)
Application Note - MIFARE Plus EV2 personalization commands AN5763 NXP DocStore (confidential)
Application Note - Card coil design notes for MIFARE Plus EV2 AN5759 NXP DocStore (confidential)
Application Note - Comparison between MIFARE Plus EV2 and
previous types
AN5760 NXP DocStore (confidential)
Application Note – Originality Signature Validation AN5764 NXP DocStore (confidential)
RFID Discover Software SW1866 NXP DocStore (confidential)
NXP Reader Library (Windows based) SW1717 NXP DocStore (confidential)
NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.

More Related Content

PDF
Transaction Timer Feature
PDF
SL1SL3 MixMode Feature
PDF
Secure Dynamic Messaging Feature
PDF
Practical Trusted Platform Module (TPM2) Programming
PDF
LCU14 302- How to port OP-TEE to another platform
PDF
SFO15-503: Secure storage in OP-TEE
PDF
Secret of Intel Management Engine by Igor Skochinsky
PDF
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Transaction Timer Feature
SL1SL3 MixMode Feature
Secure Dynamic Messaging Feature
Practical Trusted Platform Module (TPM2) Programming
LCU14 302- How to port OP-TEE to another platform
SFO15-503: Secure storage in OP-TEE
Secret of Intel Management Engine by Igor Skochinsky
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE

What's hot (20)

PDF
DDR3 SDRAM : Notes
PDF
BUD17-400: Secure Data Path with OPTEE
PPTX
System verilog coverage
PDF
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
PDF
Secure storage updates - SFO17-309
PPTX
The trusted computing architecture
PPTX
Data flow model -Lecture-4
PPTX
DDR SDRAMs
ODP
Introduction to Optee (26 may 2016)
PDF
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
PPTX
Part-1 : Mastering microcontroller with embedded driver development
PDF
RISC-V-Day-Tokyo2018-suzaki
PDF
Creating a DMZ - pfSense Hangout January 2016
PDF
Intel DPDK Step by Step instructions
PDF
Concepts of Behavioral modelling in Verilog HDL
DOCX
Temperature Control Fan Using 8051 Microcontroller
DOCX
Códigos secretos para celulares
PPTX
Why TPM in Automotive?
PPT
microprocessor
PDF
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
DDR3 SDRAM : Notes
BUD17-400: Secure Data Path with OPTEE
System verilog coverage
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure storage updates - SFO17-309
The trusted computing architecture
Data flow model -Lecture-4
DDR SDRAMs
Introduction to Optee (26 may 2016)
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Part-1 : Mastering microcontroller with embedded driver development
RISC-V-Day-Tokyo2018-suzaki
Creating a DMZ - pfSense Hangout January 2016
Intel DPDK Step by Step instructions
Concepts of Behavioral modelling in Verilog HDL
Temperature Control Fan Using 8051 Microcontroller
Códigos secretos para celulares
Why TPM in Automotive?
microprocessor
2.5.1.2 packet tracer configure cisco routers for syslog, ntp, and ssh oper...
Ad

Similar to Security Level 3 (SL3) Capabilities (14)

PDF
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
PDF
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
PDF
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
PDF
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
PDF
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
PDF
Transaction MAC Feature
PDF
UFF Tech 2013 - NFC e o futuro da convergência - NXP
PDF
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
PDF
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
PPS
Cryptomach_En
PDF
2012 NagraID display cards - alternatywa dla tokenów
PPT
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
PPT
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
PPT
End-to-End Encryption for Credit Card Processing
NXP MIFARE Webinar: Introduce The Future In Your Today's System- How To Ensur...
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: How To Protect Contactless Systems Today And Tomorrow
NXP MIFARE Webinar: Secure Closed Loop Payments In An Open Environment
NXP MIFARE Webinar: Streamlined User Management For Multi-Vendor Installations
Transaction MAC Feature
UFF Tech 2013 - NFC e o futuro da convergência - NXP
NXP MIFARE Webinar: Added Value To Card Based Environments Through NFC And Cloud
NXP MIFARE Webinar: Enhanced User Experience Through Active Application Manag...
Cryptomach_En
2012 NagraID display cards - alternatywa dla tokenów
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
End-to-End Encryption for Credit Card Processing
Ad

Recently uploaded (20)

PPT
Hypersensitivity Namisha1111111111-WPS.ppt
PPTX
Clauses_Part1.hshshpjzjxnznxnxnndndndndndndndnndptx
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PPTX
Prograce_Present.....ggation_Simple.pptx
PDF
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
PPTX
unit1d-communitypharmacy-240815170017-d032dce8.pptx
PDF
Dozuki_Solution-hardware minimalization.
PPTX
Fundamentals of Computer.pptx Computer BSC
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PDF
Printing Presentation to show beginners.
DOCX
Edukasi kultural untuk kita semua maka c
PPTX
AIR BAG SYStYEM mechanical enginweering.pptx
PPTX
A Clear View_ Interpreting Scope Numbers and Features
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PDF
ICT grade for 8. MATATAG curriculum .P2.pdf
PDF
Topic-1-Main-Features-of-Data-Processing.pdf
PPTX
AI_ML_Internship_WReport_Template_v2.pptx
PDF
SAHIL PROdhdjejss yo yo pdf TOCOL PPT.pdf
PPTX
rorakshsjppaksvsjsndjdkndjdbdidndjdbdjom.pptx
PPTX
Wireless and Mobile Backhaul Market.pptx
Hypersensitivity Namisha1111111111-WPS.ppt
Clauses_Part1.hshshpjzjxnznxnxnndndndndndndndnndptx
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
Prograce_Present.....ggation_Simple.pptx
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
unit1d-communitypharmacy-240815170017-d032dce8.pptx
Dozuki_Solution-hardware minimalization.
Fundamentals of Computer.pptx Computer BSC
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
Printing Presentation to show beginners.
Edukasi kultural untuk kita semua maka c
AIR BAG SYStYEM mechanical enginweering.pptx
A Clear View_ Interpreting Scope Numbers and Features
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
ICT grade for 8. MATATAG curriculum .P2.pdf
Topic-1-Main-Features-of-Data-Processing.pdf
AI_ML_Internship_WReport_Template_v2.pptx
SAHIL PROdhdjejss yo yo pdf TOCOL PPT.pdf
rorakshsjppaksvsjsndjdkndjdbdidndjdbdjom.pptx
Wireless and Mobile Backhaul Market.pptx

Security Level 3 (SL3) Capabilities

  • 1. EXTERNAL NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V. A U G U S T 4 T H 2 0 2 0 Florian Mikulik Senior Product Support Engineer, NXP Security Level SL3 Capabilities A MIFARE Plus® EV2 KEY FEATURE VIDEO
  • 2. 1EXTERNAL MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES U P G R AD E Y O U R S Y S T EM S S E C U R I T Y Authenticity, Confidentiality and Integrity based on AES-128 Virtual Card Concept to be used in smartphone- based installations ISO7816 APDU format support • Security Level 3 offers support for AES-128 based secure messaging, to provide authenticity, confidentiality and integrity to every transaction • Once a MIFARE Plus EV2 product-based card is switched to SL3, it also offers support for the Virtual Card Architecture concept, which helps to manage a MIFARE Plus EV2 product-based card in a multi-application environment, designed for e.g. mobile phones performing contactless transactions, holding more than one “virtual card”  MIFARE Plus EV2 product-based card acts as a single “virtual card”, but supports necessary command infrastructure to be indistinguishable from a multi-VC mobile phone, maintaining privacy for card holder • In SL3, the MIFARE Plus EV2 supports ISO7816-4 compliant VC selection (ISOSelect), compliant with Java Card and GlobalPlatform standards
  • 3. 2EXTERNAL MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES S E C U RE M E S S AG I N G • Security Level switch is done through an AuthenticateFirst command targeting Block 9003h (SL3SwitchKey) • A switch to SL3 disables the use of CRYPTO-1 completely − Data and memory architecture of the card does not change at all – Block/Sector based memory model stays the same • Initial memory space for CRYPTO-1 keys can now be used as additional user memory (+11 byte per sector) − AES keys are stored outside the User Memory • Plain or encrypted data access can be defined per Block • Transaction management with session keys is possible via AuthenticateFirst and AuthenticateNonFirst • Several options for read commands − MAC on command − MAC on response − Data encrypted or plain • Several options for write/value commands − MAC on command − MAC on response − Data is always encrypted • Additional features (TMAC, Transaction Timer, multi-block read/write, VCA) can be used
  • 4. 3EXTERNAL MIFARE Plus EV2 – SECURITY LEVEL 3 CAPABILITIES I S O / I E C 7 8 1 6 -4 V I R T U AL C AR D AR C H I T E C T UR E • MIFARE Plus EV2 supports ISOSelect and is complaint with Java Card and Global Platform mechanisms • Using MIFARE Plus EV2 in Security Level 3 and ISO/IEC 7816-4 wrapped communication frames supports mobile operations VC concept using ISO/IEC 7816-4 compliant selection method Enables smartphone support in infrastructures Transit Pass Transit Pass
  • 5. 4EXTERNAL MORE INFORMATION ABOUT THE TRANSACTION TIMER FEATURE Item Number Availability Datasheet - MIFARE Plus EV2 DS5223 NXP DocStore (confidential) Application Note - MIFARE Plus EV2 Features and Hints AN5762 NXP DocStore (confidential) Application Note - MIFARE Plus EV2 personalization commands AN5763 NXP DocStore (confidential) Application Note - Card coil design notes for MIFARE Plus EV2 AN5759 NXP DocStore (confidential) Application Note - Comparison between MIFARE Plus EV2 and previous types AN5760 NXP DocStore (confidential) Application Note – Originality Signature Validation AN5764 NXP DocStore (confidential) RFID Discover Software SW1866 NXP DocStore (confidential) NXP Reader Library (Windows based) SW1717 NXP DocStore (confidential)
  • 6. NXP, THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V. ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS. © 2020 NXP B.V.