Quickcool Radio modules KEYFOB-MF1K-02PVC-WHEP Data Sheet
Product codes
KEYFOB-MF1K-02PVC-WHEP
MF1S50YYX
All information provided in this document is subject to legal disclaimers.
© NXP B.V. 2011. All rights reserved.
Product data sheet
COMPANY PUBLIC
COMPANY PUBLIC
Rev. 3.0 — 2 May 2011
196330
7 of 39
NXP Semiconductors
MF1S50yyX
MIFARE Classic 1K - Mainstream contactless smart card IC
8.2.5 Memory operations
After authentication any of the following operations may be performed:
•
Read block
•
Write block
•
Decrement: Decrements the contents of a block and stores the result in an internal
data-register
data-register
•
Increment: Increments the contents of a block and stores the result in an internal
data-register
data-register
•
Restore: Moves the contents of a block into an internal data-register
•
Transfer: Writes the contents of the temporary internal data-register to a value block
8.3 Data integrity
Following mechanisms are implemented in the contactless communication link between
reader and card to ensure very reliable data transmission:
reader and card to ensure very reliable data transmission:
•
16 bits CRC per block
•
Parity bits for each byte
•
Bit count checking
•
Bit coding to distinguish between “1”, “0” and “no information”
•
Channel monitoring (protocol sequence and bit stream analysis)
8.4 Three pass authentication sequence
1. The reader specifies the sector to be accessed and chooses key A or B.
2. The card reads the secret key and the access conditions from the sector trailer. Then
the card sends a number as the challenge to the reader (pass one).
3. The reader calculates the response using the secret key and additional input. The
response, together with a random challenge from the reader, is then transmitted to the
card (pass two).
card (pass two).
4. The card verifies the response of the reader by comparing it with its own challenge
and then it calculates the response to the challenge and transmits it (pass three).
5. The reader verifies the response of the card by comparing it to its own challenge.
After transmission of the first random challenge the communication between card and
reader is encrypted.
reader is encrypted.