??? 09/20/06 06:22 Modified: 09/20/06 06:26 Read: times |
#124643 - The way it works.. Responding to: ???'s previous message |
Basically each time the card is used the reader and card exchange a challenge/response in the form of pseudo random data encrypted probably with AES or triple des and because both the card and the reader know the secret key they can exchange the pseudo random data and because they both use the same pseudo random number generator they know what the next number in the seqence should be.
Only cards with the same secret key as the reader can generate the correct response to the readers challenge. Its protected from a replay attack where someone simply records the data transfers and plays them back at a later time with the use of timestamps embedded in the encrypted data. |
Topic | Author | Date |
Q2000-C | 01/01/70 00:00 | |
Reply | 01/01/70 00:00 | |
Q2000-C | 01/01/70 00:00 | |
RFID Door access control | 01/01/70 00:00 | |
The way it works.. | 01/01/70 00:00 | |
re: | 01/01/70 00:00 | |
Time control | 01/01/70 00:00 | |
re: | 01/01/70 00:00 | |
just a remark![]() | 01/01/70 00:00 | |
I don't believe it's encrypted | 01/01/70 00:00 | |
I wish i did | 01/01/70 00:00 | |
even if the code is fetched from internal? | 01/01/70 00:00 |