Member Discussion

Are There iCLASS Security Issues? If So, Where And How Bad?

Was perusing around the Internet to learn a little more about iClass and came across some articles about iClass credentials being cloned and sniffed similar to how older 125khz prox is. Came across this one particular site discussing it indepth.

It seems the problem in this case was the way HID stored master encryption keys on their readers. The information though seems older, so I was wondering is this still an issue, or as serious an issue as the insecurity of 125khz prox when iClass is supposed to be much more secure. Are 3rd part iClass readers (non-HID) supposed to be more secure? Granted, nothing can or should be considered impenetrable.

iClass has been 'cracked'. There is another group claiming to have a method of extracting even a facility-specific key from a reader, and then using that to crack a card which they can then spoof.

Interestingly, and this is a periodic point brought up by certain members, MiFARE DESFire uses 256 bit encryption compared to iClass' 128 bit. There are 'non-HID' smartcard formats that are 'more secure', meaning they haven't been cracked... yet.

I also watched a demo where someone reverse engineered the salted raw hex off an iClass card, and using a technique they called "Monkeys banging on a Keyboard" (not joking) use brute force to mimic valid hex. Supposedly they can 'guess' good codes this way.

There is a Youtube link somewhere by the guy who is wearing a Guy Fawkes mask the whole time. I can't find it right now! But it's just so absurd, it's entertaining.