No product in cart
Toll Free : 1-800-537-1708
Office : 281-344-2001
MIFARE Plus® X 2K Key Fob: MIFARE Plus® provides end-user solution providers with a seamless upgrade of existing infrastructure and services with low-cost procedures. This new MIFARE® product has been developed and supported by card and reader manufacturers and solution developers. and is the only MIFARE® Classic-compatible mainstream smart card IC. Featuring pre-issuance of cards prior to infrastructure changes. Migrate classic contactless smart card systems to the next security level! MIFARE Plus® brings benchmark security to mainstream contactless smart card applications. It is the only mainstream IC compatible. MIFARE Classic 1K®. (MF1ICS50) and MIFARE Classic® 4K (MF1ICS70) which offers an upgrade path for existing infrastructure. After the security upgrade. MIFARE Plus® uses AES-128. (Advanced Encryption Standard) for authentication. data integrity and encryption. MIFARE Plus® is based on open global standards for both air interface and cryptographic methods at the highest security level. MIFARE Plus® is available in two versions: MIFARE Plus® X and MIFARE Plus® S. Migrate contactless smart card systems to the next security level - MIFARE Plus X 2K brings your existing system up to benchmark AES security with Common Criteria Certification EAL4+. After personalization, MIFARE Plus uses its “backward compatible mode” to behave like MIFARE Classic, giving you enough time to make your existing system AES ready.
#Code Products: PLUS-X-2K-KEY-FOB
MIFARE Plus ® X 2K Card
The MIFARE Plus® X (MF1PLUSx0y1. described in this data sheet). offers more flexibility to optimize the command flow for speed and confidentiality. It offers a rich feature set including proximity checks against relay attacks.
The operation in security level 3 is solely based on the ISO/IEC 14443-4 protocol layer. The usage of the backwards compatibility protocol is not possible. In security level 3, a mandatory AES authentication between PICC and reader is conducted, where two keys are generated as a function of the random numbers from the PICC and the reader as well as of the shared key. These two session keys are used to secure the data which is exchanged on the interface between the card and reader. One of the two keys is used to ensure the confidentiality of the command and the response while the other key ensures the integrity of the command and the response. All commands carry a MAC, such that the PICC will only accept commands from the reader with which it is authenticated. Tampering of operands and messages is detected by checking the MAC. Also all responses contain a MAC, so that the reader on each response knows that neither the command nor the response has been tampered with. Each response carries a MAC. When the appropriate MAC is received, due to linking of MACs, the reader knows that the command and commands before it was properly executed. All commands between two consecutive first authenticate commands belong to one transaction and the MACing mechanism assures integrity of the whole transaction.
Weight | N/A |
---|---|
Dimensions | N/A |
Qty | 25, 50, 100 |
Toll Free : 1-800-537-1708
Office : 281-344-2001