Just a couple of photos of the Roulettes from Riverfire last night...more photos of fireworks, boats, etc to be posted once I've edited them.
Also, there is a set of 14 photos of the Roulettes if you click here.
Posted by David J at 8:32 pm 0 comments
Posted by David J at 8:31 pm 0 comments
We are investigating protection scenarios for systems using MIFARE Classic, as in some systems insufficient mechanisms to detect fraudulent cards may have been implemented. Mindful of the above, we urgently ask you to contact your system integrator for an assessment of your systems. Extensive additional protection mechanisms are recommended [emphasis added], both on how the data on the card is used as well as deploying additional security layers separate from the card.
Depending on the specific situation in existing MIFARE Classic access management infrastructures, in many cases the usage of more sophisticated card ICs may be recommendable. DESFire EV1 and MIFARE Plus (available in Q4 2008) are our recommended solution for new access management implementations where a strong level of security is required.
MIFARE Classic provides a benchmark in cost competitiveness, while the recently announced MIFARE Plus enables an optimal future-proof migration path when necessary. Both, MIFARE Plus and our new high-end product MIFARE DESFire EV1 offer strong AES encryption and are targeted to receive the internationally recognized Common Criteria certification.
In a statement last week, Queensland Transport said it was pursuing security concerns with Cubic, the Australian operator of the go card system."Cubic has provided advice that the go card ticketing system is not at risk from the most recent claims raised regarding the Mifare Classic smart card," the statement said.
A Queensland Transport spokesman said it was Cubic's responsibility to provide a ticketing system "fit for purpose", including appropriate security systems.
"TransLink has received further advice from Cubic in March 2008 regarding the need for an ongoing security review due to technology advances as a normal and prudent approach to managing a smart card ticketing system," the spokesman said.
"TransLink has commenced and will continue assessing its responses to ensure system security remains paramount."
However, Mr Nohl [a member of one of the groups that cracked the cards] said he believed operators would be confident of the system's security until faced with an actual attack on its integrity.
"I'm sure they are very confident of it [the system] until someone comes around and cracks it," he said.
"The Mifare system was marketed as having advanced levels of protection, proved security and that's what people thought they had a few months ago and now our research has shown them quite the opposite."
NXP Semiconductors regrets to inform you on the decision of the court in Arnhem from July 18th to allow the publication by the IT security specialists from the Radboud University Nijmegen, which includes attacks on MIFARE Classic systems. The University intends to present the publication during a conference on October 6th, with information on how the protocol and algorithm were reverse engineered, the description of the protocol and algorithm and the description of some practical attacks which can be carried out with limited means.
This report from the Radboud University Nijmegen will reduce the barrier to carry-out actual attacks on infrastructures using MIFARE Classic, which prompted our request for a delay in its publication in order to allow for a reasonable time for appropriate system security upgrades.
As we were not successful in our request, you may want to address your interests directly with the University of Nijmegen, in relation to the disclosure of security risks to your systems in the aforementioned publication.
"Damage to NXP is not the result of the publication of the article but of the production and sale of a chip that appears to have shortcomings."
Posted by David J at 2:03 pm 2 comments
Posted by David J at 7:41 pm 0 comments