MF1PLUS6001DUD/02, NXP Semiconductors, MF1PLUS6001DUD/02, Datasheet - Page 11

RFID Modules & Development Tools MF1PLUS6001DUD/UNCASED/FOIL//0

MF1PLUS6001DUD/02,

Manufacturer Part Number
MF1PLUS6001DUD/02,
Description
RFID Modules & Development Tools MF1PLUS6001DUD/UNCASED/FOIL//0
Manufacturer
NXP Semiconductors
Datasheet

Specifications of MF1PLUS6001DUD/02,

Security
MIFARE CRYPTO1, AES
Product
Smart Card
Data Rate
848 Kbps
Antenna
On-Board
NXP Semiconductors
9. Look-up tables
MF1PLUSX0Y1_SDS_31
Product short data sheet
PUBLIC
9.1 Security level 0, 1, 2, 3: ISO/IEC 14443-3
These two session keys are used to secure the data which is exchanged on the interface
between the card and reader. One of the two keys is used to ensure the confidentiality of
the command and the response while the other key ensures the integrity of the command
and the response.
The reader can decide which security needs to be used in the communication between
PICC and reader. In the simplest case, all commands are secured by a MAC, such that
the PICC will only accept commands from the authenticated reader. Any message
tampering is detected by verifying the MAC. All responses are appended by a MAC to
prove to the reader that neither the command nor the response have been compromised.
If performance is the highest priority, the card can be configured to omit the MAC for read
commands. The card then accepts read commands without knowing whether they are
authentic. However, there is a mechanism to prove to the reader that the read response is
resulting from the unmodified read command that it sent.
Other commands, like write commands, always need to have a MAC appended to ensure
that no memory changes are carried out without proving the authenticity of the command.
The reader can decide for each command whether a MAC is included in the response.
When the appropriate MAC is received, due to linked MACs the reader knows that the
command and commands before it were properly executed.
All commands between two consecutive First Authenticate commands belong to one
transaction and the MACing mechanism assures integrity of the whole transaction.
If the MAC on read responses is omitted, the integrity of all read responses within one
session can still be verified by including a MAC on one read response before issuing the
next First or Following Authenticate command.
If performance matters more than confidentiality of the transaction, each data block in a
sector can be configured to allow or disallow sending/receiving plain data.
Table 4.
Command
REQA
WUPA
ANTICOLLISION/SELECT
cascade level 1
ANTICOLLISION/SELECT
cascade level 2 for 7 byte
UID version
HALT
ISO/IEC 14443-3
All information provided in this document is subject to legal disclaimers.
Rev. 3.1 — 19 April 2010
Description
the REQA and ATQA commands are fully implemented according to
ISO/IEC 14443-3
the WAKE-UP command is fully implemented according to
ISO/IEC 14443-3
the ANTICOLLISION and SELECT commands are fully implemented
according to ISO/IEC 14443-3. The response is part 1 of the UID.
the ANTICOLLISION and SELECT commands are fully implemented
according to ISO/IEC 14443-3. The response is part 2 of the UID.
the HALT command is fully implemented according to
ISO/IEC 14443-3
163531
Mainstream contactless smart card IC
MF1PLUSx0y1
© NXP B.V. 2010. All rights reserved.
11 of 20

Related parts for MF1PLUS6001DUD/02,