{"id":"https://openalex.org/W2599119644","doi":"https://doi.org/10.5220/0006262705240528","title":"Brute Force Cryptanalysis of MIFARE Classic Cards on GPU","display_name":"Brute Force Cryptanalysis of MIFARE Classic Cards on GPU","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2599119644","doi":"https://doi.org/10.5220/0006262705240528","mag":"2599119644"},"language":"en","primary_location":{"id":"doi:10.5220/0006262705240528","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006262705240528","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0006262705240528","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014408445","display_name":"Cihangir Tezcan","orcid":"https://orcid.org/0000-0002-9041-1932"},"institutions":[{"id":"https://openalex.org/I201799495","display_name":"Middle East Technical University","ror":"https://ror.org/014weej12","country_code":"TR","type":"education","lineage":["https://openalex.org/I201799495"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Cihangir Tezcan","raw_affiliation_strings":["Middle East Technical University, Turkey"],"affiliations":[{"raw_affiliation_string":"Middle East Technical University, Turkey","institution_ids":["https://openalex.org/I201799495"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5014408445"],"corresponding_institution_ids":["https://openalex.org/I201799495"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.02417801,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"524","last_page":"528"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9706000089645386,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9703999757766724,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7343564033508301},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6533360481262207},{"id":"https://openalex.org/keywords/brute-force","display_name":"Brute force","score":0.588744580745697},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.5546466708183289},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4283186197280884},{"id":"https://openalex.org/keywords/cuda","display_name":"CUDA","score":0.4244776964187622},{"id":"https://openalex.org/keywords/computer-graphics","display_name":"Computer graphics (images)","score":0.34313470125198364},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.322763592004776},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24077251553535461}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7343564033508301},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6533360481262207},{"id":"https://openalex.org/C2986801135","wikidata":"https://www.wikidata.org/wiki/Q1209494","display_name":"Brute force","level":2,"score":0.588744580745697},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.5546466708183289},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4283186197280884},{"id":"https://openalex.org/C2778119891","wikidata":"https://www.wikidata.org/wiki/Q477690","display_name":"CUDA","level":2,"score":0.4244776964187622},{"id":"https://openalex.org/C121684516","wikidata":"https://www.wikidata.org/wiki/Q7600677","display_name":"Computer graphics (images)","level":1,"score":0.34313470125198364},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.322763592004776},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24077251553535461}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0006262705240528","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006262705240528","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:open.metu.edu.tr:11511/32343","is_oa":true,"landing_page_url":"https://hdl.handle.net/11511/32343","pdf_url":null,"source":{"id":"https://openalex.org/S4306402495","display_name":"OpenMETU (Middle East Technical University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I201799495","host_organization_name":"Middle East Technical University","host_organization_lineage":["https://openalex.org/I201799495"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Paper"}],"best_oa_location":{"id":"doi:10.5220/0006262705240528","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0006262705240528","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.49000000953674316,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3188902280","https://openalex.org/W3213381848","https://openalex.org/W2005148983","https://openalex.org/W2017587301","https://openalex.org/W2012954338","https://openalex.org/W2096672917","https://openalex.org/W2392023973","https://openalex.org/W2939411666","https://openalex.org/W1973046741","https://openalex.org/W1834680620"],"abstract_inverted_index":{"MIFARE":[0,146],"Classic":[1,147],"is":[2,46,53,141,169],"the":[3,10,34,41,56,61,153,158,173],"most":[4],"widely":[5],"deployed":[6],"contactless":[7],"smartcard":[8],"on":[9,100,111,126,207,223],"market.":[11],"However,":[12],"many":[13],"active":[14],"and":[15,40,69,86,119,157,193],"passive":[16],"attacks":[17],"are":[18],"provided":[19],"after":[20,48],"its":[21],"proprietary":[22],"stream":[23],"cipher":[24],"CRYPTO1":[25,35],"was":[26,93,200],"reverse":[27],"engineered.":[28],"The":[29],"short":[30,154],"48-bit":[31],"key":[32,155,168],"of":[33,215],"cipher,":[36],"leaked":[37,159],"parity":[38,160],"bits":[39,161],"encrypted":[42],"error":[43],"code":[44],"that":[45,121],"sent":[47],"a":[49,79,84,88,101,122,127,149,166,186,191,195,208,224],"failed":[50],"authentication":[51],"(which":[52],"corrected":[54],"in":[55,133],"hardened":[57,145],"new":[58],"cards)":[59],"allow":[60],"adversary":[62],"to":[63,95,144,202],"perform":[64],"offline":[65],"brute":[66,89,108,123,196],"force":[67,90,109,124,197],"attack":[68,74,91,110,125,140,151,181,198,217],"avoid":[70],"detection.":[71],"Such":[72,179],"an":[73,180],"requires":[75,182],"wireless":[76,183],"interaction":[77,184],"with":[78,185],"card":[80,187],"for":[81,176,188],"less":[82,134,189,219],"than":[83,135,190,220],"second":[85,192],"then":[87,194],"which":[92,199],"shown":[94,201],"take":[96,203],"around":[97],"9":[98],"days":[99],"single":[102,167,209],"GTX280":[103],"GPU.":[104,211,226],"We":[105],"optimized":[106],"this":[107,139,216],"modern":[112],"GPUs":[113],"by":[114],"using":[115,152,172],"bitsliced":[116,213],"implementation":[117,214],"technique":[118],"observed":[120],"GTX970":[128,225],"GPU":[129],"can":[130,162],"be":[131,163],"performed":[132,164],"5":[136],"hours.":[137],"Although":[138],"not":[142],"applicable":[143],"cards,":[148],"similar":[150],"length":[156],"when":[165],"known,":[170],"possibly":[171],"default":[174],"keys":[175],"unused":[177],"sectors.":[178],"approximately":[204],"one":[205],"month":[206],"GTX460":[210],"Our":[212],"takes":[218],"7":[221],"hours":[222]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
