Page 11 - Read Online
P. 11

Page 112                                            Calderoni et al. J Surveill Secur Saf 2020;1:106-18  I  http://dx.doi.org/10.20517/jsss.2019.01






















               Figure 3. The complete communication trace concerning the GetVerison command. UID: unique tag identifier; DF: dedicated file


















               Figure 4. The complete communication trace concerning the commands performed against the capability container file. EF: elementary
               file; SDM: secure dynamic messaging

               studied. The complete communication trace is provided in Figure 3. According to the returned data, the
               tag was produced during the 39th week of 2018 by NXP. The most important information included in the
               answer is the tag ID: as the tag studied is not configured with the random ID setting, the third response
               includes the real 7-byte UID. This condition may lead to a privacy breach and will be further discussed in
               the “Discussion” section.

               The following step consists in the selection of the CC file. The application checks the file settings through
               the GetFileSettings command and subsequently reads the full file content using the standard ISOReadBinary
               command. The communication trace involved is provided in Figure 4. The information returned by the
               GetFileSettings command shows that the SDM is not enabled for this file. Again, the CC file has a size of
               20:00:00, which means it is composed of 32 bytes, as it should be interpreted with least significant byte
               encoding. Concerning the access rights to the file, the response shows that the E103 file is subject to the
               00:E0 access policy. According to NXP specifications, it means that this file is free to read (E), while other
               operations (write and change file permissions) need to be preceded by authentication through the key
               number 0x00 (the App Master Key). ISOReadBinary asks the tag for 32 bytes from the aforementioned
               file. The answer states that the CC effectively occupies 23 bytes only (00:17). Here, we may see that the file
               system comprises two more files, named E104 and E105. The first one occupies 256 bytes and may be read
               and written without any authentication (00:00). Note that this access notation differs from the one returned
               by the GetFileSettings command as it is intended to be in accordance with the NFC Forum specifications.
               The latter file occupies 128 bytes. The access conditions for this file are set to 82:83. These numbers fall in
               the proprietary range, concerning NFC Forum access policies. Specifically, it means that read operations
               need to be preceded by authentication with the application key number 0x02. The same applies to write
               operations, with key number 0x03.
   6   7   8   9   10   11   12   13   14   15   16