24C3: Mifare (Little security, despite obscurity)Speakers: Karsten Nohl | Henryk PlötzMifare are the most widely deployed brand of secure RFID chips, but their security relies on proprietary and secret cryptographic primitives. We analyzed the hardware of the Mifare tags and found weaknesses in several parts of the cipher.Watch this video on YouTubeViewsLikesSource: Chaos Computer ClubSource: Christiaan008Main categoryCommunicationSubcategoryWirelessMain categoryInformation security & security managementSubcategoryEncryptionBe surprisedVideo wallI know what I'm looking forVideos by categoryRelated videosAllEncryptionOtherWireless Toying with barcodes Rootkits: What they are, and how to find them How NOT to Store Passwords! Building the DEF CON Network 28C3: Towards a single secure European cyberspace? 29C3 GSM: Cell phone network review RFID hacking DeepSec 2013: Mobile Fail: Cracking open “secure” Android containers NOTACON 3: Network printer hacking OWASP AppSecUSA 2011:How NOT to implement cryptography for the OWASP Top 10 (Reloaded) 24C3: Mifare (Little security, despite obscurity) DeepSec 2009: Building the next generation IDS engine DEF CON 14: US-VISIT: Raping personal privacy since 2004 DEF CON 17: Hijacking web 2.0 sites with SSLstrip DEF CON 19: Hacking and forensicating an Oracle database server SOURCE Boston 2009: Splunk Hacking WPA2 key: Evil Twin method OWASP AppSecUSA 2011: Simplifying threat modelling DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network ShmooCon 2014: ISP’s unauthenticated SOAP service DeepSec 2013: Uncovering your trails Remote hack on Damn Vulnerable Linux