P5DF081 MIFARE secure access module SAM AV2 Rev. 3.2 -- 17 December 2013 191732 Product short data sheet COMPANY PUBLIC 1. General description The NXP MIFARE SAM AV2 hardware solution is the ideal add-on for reader devices offering additional security services. Supporting TDEA, AES and RSA capabilities, it offers secure storage and secure communication in a variety of infrastructures. Unlike other products in the field, MIFARE SAM AV2 has proven interoperability with all of NXP's broad card portfolio, (MIFARE Ultralight, MIFARE Ultralight C, MIFARE 1K, MIFARE 4K, MIFARE Plus, MIFARE DESFire, MIFARE DESFire EV1 and SmartMX solutions), making it the most versatile and secure SAM solution on the market today. Secured communication When used in combination with a reader IC supporting innovative "X" features, MIFARE SAM AV2 provides a significant boost in performance to the reader along with faster communication between reader and module. The "X" feature is a new way to use the SAM in a system, with SAM connected to the microcontroller and the reader IC simultaneously. The one variant, identified with T1AD2060, can be connected to RC52X contactless reader ICs, the other variant, identified T1AR1070, can be connected to RC663 using the X-feature. Apart from the difference in the interface, both variants have the same functionality. The connection between the SAM and the reader is performed using security protocols based on either symmetric cryptography (TDEA and AES) or PKI RSA asymmetric cryptography. The protocols comply with the state-of-art standards and thereby ensure data confidentiality and integrity. 2. Features and benefits 2.1 Cryptography Supports MIFARE Crypto1, TDEA (Triple DES encryption algorithm), RSA and AES cryptography Supports MIFARE Ultralight, MIFARE Ultralight C, MIFARE 1K, MIFARE 4K, MIFARE Plus, MIFARE DESFire, MIFARE DESFire EV1 Secure storage and updating of keys (key usage counters) 128 key entries for symmetric cryptography and 3 RSA key entries for asymmetric cryptography TDEA and AES based key diversification Offline cryptography P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 2.2 Communication Up to four logical channels; simultaneous multiple card support Support for DESFire and MIFARE Plus authentication (with related secure messaging and session key generation) Secure Host to SAM and back end to SAM communication with symmetric cryptography 3 pass authentication for confidentiality and integrity Support high speed baud rates up to 1.5 Mbit/s Secure Host to SAM and back end to SAM communication with RSA based cryptography Support ISO/IEC 7816 baud rates True random number generator (TRNG) 2.3 Delivery types Available in wafer, PCM 1.1 module, or HVQFN package 3. Applications Access management Public transport Loyalty programs Micro payment 4. Quick reference data Table 1. Quick reference data VDD; VSS = 0 V; Tamb = 25 C to +85 C Symbol Parameter Conditions Min Typ Max Unit VDD supply voltage Class A: 5 V range 4.5 5.0 5.5 V Class B: 3 V range 2.7 3.0 3.3 V 5. Ordering information Table 2. Ordering information Type number Package Name Description Version PCM1.1 contact chip card module (super 35 mm tape format, 8 contact), minimum order quantity: 10.000 SOT658-1 P5DF081X0/T1AD2060S PCM1.1 contact chip card module (super 35 mm tape format, 8 contact), minimum order quantity: 1.000 SOT658-1 P5DF081X0/T1AD2060 P5DF081HN/T1AD2060 HVQFN32 plastic thermal enhanced very thin quad flat package; no SOT617-3 leads; 32 terminals; body 5 x 5 x 0.85 mm P5DF081UA/T1AD2060 FCC sawn wafer 150 mm on film frame carrier - P5DF081X0/T1AR1070 PCM1.1 contact chip card module (super 35 mm tape format, 8 contact), minimum order quantity: 10.000 SOT658-1 P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 2 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 2. Ordering information ...continued Type number Package Name P5DF081X0/T1AR1070S PCM1.1 Description Version contact chip card module (super 35 mm tape format, 8 contact), minimum order quantity: 1.000 SOT658-1 P5DF081HN/T1AR1070 HVQFN32 plastic thermal enhanced very thin quad flat package; no SOT617-3 leads; 32 terminals; body 5 x 5 x 0.85 mm P5DF081UA/T1AR1070 FCC P5DF081_SDS Product short data sheet COMPANY PUBLIC sawn wafer 150 mm on film frame carrier All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 - (c) NXP B.V. 2013. All rights reserved. 3 of 37 xxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxx x x x xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxx xx xx xxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxx xxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxx x x xxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxx xxx NXP Semiconductors P5DF081_SDS Product short data sheet COMPANY PUBLIC 6. Block diagram IO1 IO2 PROGRAMMABLE IO1, IO2, IO3 ROM EEPROM RAM 264 kB PROGRAM MEMORY 80 kB DATA AND PROGRAM MEMORY 7680 B DATA MEMORY UART ISO 7816 ENHANCED PUBLIC KEY COPROCESSOR e.g. RSA MEMORY MANAGEMENT UNIT (MMU) CLK RST_N CLOCK FILTER CLOCK GENERATION CPU TRIPLE-DES COPROCESSOR TIMERS SECURITY SENSORS RESET GENERATION CRC16 16-bit 16-bit T0 T1 AES COPROCESSOR FAST RNG VOLTAGE REGULATOR Fig 1. Block diagram VSS 001aal646 P5DF081 4 of 37 (c) NXP B.V. 2013. All rights reserved. VDD MIFARE secure access module SAM AV2 Rev. 3.2 -- 17 December 2013 191732 All information provided in this document is subject to legal disclaimers. IO3 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 7. Pinning information 7.1 Pinning VCC C1 C5 GND RST_N C2 C6 IO3 CLK_N C3 C7 IO1 n.c. C4 C8 IO2 001aam116 Fig 2. Pin configuration PCM1.1 25 n.c. 26 n.c. 27 n.c. 28 n.c. 29 n.c. 30 n.c. 32 n.c. terminal 1 index area 31 n.c. 7.2 Pinning VSS 1 24 VCC n.c. 2 23 LA IO3 3 22 RSTN n.c. 4 21 n.c. P5DF081 18 CLK DM 8 17 DP n.c. n.c. 16 7 n.c. 15 IO2 n.c. 14 19 n.c. n.c. 13 6 n.c. 12 LB n.c. 11 20 n.c. n.c. 10 5 9 IO1 Transparent top view aaa-005250 Remark: Central pad is isolated. Fig 3. Pin configuration HVQFN32 7.3 Pin description Table 3. P5DF081_SDS Product short data sheet COMPANY PUBLIC Pin description PCM 1.1 MIFARE SAM AV2 ISO/IEC 7816 MIFARE SAM AV2 Pad Symbol Symbol Pad Description C1 VCC VCC C1 power supply voltage input C2 RST RST_N C2 reset input, active LOW C3 CLK CLK_N C3 clock input C4 reserved n.c. C4 n.c. All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 5 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 3. ISO/IEC 7816 MIFARE SAM AV2 Pad Symbol Symbol Pad Description C5 GND GND C5 ground (reference voltage) input C6 VPP IO3 C6 used for I2C communication to RC52x or RC663 (SCLK) C7 IO1 IO1 C7 input/output for serial data (host communication) C8 reserved IO2 C8 used for I2C communication to RC52x or RC663 Table 4. P5DF081_SDS Product short data sheet COMPANY PUBLIC Pin description PCM 1.1 MIFARE SAM AV2 ...continued Pin description HVQFN32 MIFARE SAM AV2 HVQFN32 MIFARE SAM AV2 Pad Symbol Symbol Pad Description 1 VSS GND 1 ground (reference voltage) input 2 n.c. n.c. 2 not connected 3 IO3 IO3 3 used for I2C communication to RC 4 n.c. n.c. 4 not connected 5 IO1 IO1 5 input/output for serial data (host communication) 6 LB n/a 6 not used 7 IO2 IO2 7 used for I2C communication to RC (SDATA) 8 DM n/a 8 not used 9 n.c. n.c. 9 not connected 10 n.c. n.c. 10 not connected 11 n.c. n.c. 11 not connected 12 n.c. n.c. 12 not connected 13 n.c. n.c. 13 not connected 14 n.c. n.c. 14 not connected 15 n.c. n.c. 15 not connected 16 n.c. n.c. 16 not connected 17 DP n/a 17 not used 18 CLK CLK_N 18 clock input 19 n.c. n.c. 19 not connected 20 n.c. n.c. 20 not connected 21 n.c. n.c. 21 not connected 22 RSTN RST_N 22 reset input, active LOW 23 LA n/a 23 not used 24 VCC VCC 24 power supply voltage input All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 6 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8. Functional specification 8.1 Hardware interface 8.1.1 Contact interface The pad assignment and the electrical characteristics are fully compliant with ISO/IEC 7816 (part 2 and part 3). The MIFARE SAM AV2 operates with Class A and Class B interface devices. An internal charge pump provides the EEPROM programming voltage. Note that pad C6 is not a programming voltage input but is an output line for the clock signal for I2C communication to the RC52x or RC663 reader chip. Pad C8 is used as data line to the reader chip. These two pads for connection to the RC52x or RC663 are the only ones deviating from the ISO standard pin assignment. 8.1.2 External clock frequency and bit rates The basic operation frequency of the MIFARE SAM AV2 is 3.5712 MHz. With this frequency the following standard bit rates can be reached using ISO/IEC 7816 transmission factors F and D. The MIFARE SAM AV2 supports significantly higher transmission speeds. The maximum specified bit rate in any case is 1.5 Mbit/s. 8.1.3 Card operation procedures All card operation procedures (activation, cold reset, warm reset and deactivation) are fully compliant with Ref. 19, Chapter 5. 8.2 Transmission procedure and communication 8.2.1 Protocol activation sequence All subsequently described operations are compliant with ISO/IEC 7816-3. 8.2.1.1 Answer To Reset (ATR) The MIFARE SAM AV2 offers two modes of operation identified by different ATRs. A negotiable mode where the bit rate has to be adjusted via a PPS request and a specific mode where the MIFARE SAM AV2 switches automatically to F = 128 and D = 32 (highest possible speed) after sending the ATR. Starting with the negotiable mode, the mode of operation is switched after every warm reset. After a cold reset, the card sends the following ATR to the terminal. Table 5. P5DF081_SDS Product short data sheet COMPANY PUBLIC ATR after cold reset Character Value Meaning TS 3Bh initial character; setting up direct convention T0 DFh TA(1), TC(1), TD(1) are present; number of historical characters is 15 TA(1) 18h F = 372; D = 12 TC(1) FFh no extra guard time needed; N = 255 TD(1) 81h TD(2) is present; protocol T = 1 All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 7 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 5. ATR after cold reset ...continued Character Value Meaning TD(2) F1h TA(3), TB(3), TC(3) and TD(3) are present; protocol T=1 TA(3) FEh Information field size of the card = 254 TB(3) 43h BWT indicator = 4; CWT indicator = 3 TC(3) 00h error detection code = LRC TD(3) 3Fh TA and TB for T = 15 is present; protocol T = 15 (qualifies global interface bytes) TA(after T = 15) 03h clock stop not supported; Class A, Class B TB(after T = 15) 83h Proprietary use of C6 (IO3, reception of serial data from RC52x or RC663) Historical bytes 4Dh, 49h, 46h, 41h, 52h, 45h, 20h, 50h, 6Ch, 75h, 73h, 20h, 53h, 41h, 4Dh ASCII value of "MIFARE Plus SAM" TCK 3B check character After this ATR, the card is in the negotiable mode and waits for a PPS request. If a warm reset is issued, the MIFARE SAM AV2 switches the mode of operation, enters the specific mode and sends the following ATR. Table 6. ATR after warm reset Character Value Meaning TS 3Bh initial character; setting up direct convention T0 DFh TA(1), TC(1) and TD(1) are present; number of historical characters is 15 TA(1) 18h F = 128 and D = 32 TC(1) FFh no extra guard time needed; N = 255 TD(1) 81h TA(2) and TD(2) are present; protocol T = 1 TA(2) F1h specific mode byte: capable of changing the mode of operation; parameters defined by interface bytes; protocol T = 1 TD(2) FEh TA(3), TB(3), TC(3), TD(3) are present; protocol T=1 TA(3) 43h information field size of the card = 254 TB(3) 00h BWT indicator = 4; CWT indicator = 3 TC(3) 3Fh error detection code = LRC TD(3) 07h TA and TB for T = 15 is present, protocol T = 15 (qualifies global interface bytes) TA(after T = 15) 83h clock stop not supported, Class A and Class B TB(after T = 15) 18h Proprietary use of C6 (IO3, reception of serial data from RC52x or RC663) Historical bytes 4Dh, 49h, 46h, 41h, 52h, 45h, 20h, 50h, 6Ch, 75h, 73h, 20h, 53h, 41h, 4Dh ASCII value of "MIFARE Plus SAM" TCK 98h check character After every future warm reset, the mode of operation and therefore also the ATR is toggled with the ATR after cold reset. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 8 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.2.1.2 Protocol and Parameter Selection (PPS exchange) The PPS command allows to individually select the transmission factors and the communication protocol. The PPS was successful if the response exactly echoes the request. 8.2.2 Protocol T = 1 The MIFARE SAM AV2 offers a T = 1 protocol which is fully compliant with ISO/IEC 7816-3, Chapter 9. For details on how to calculate the resulting time-outs, refer to ISO/IEC 7816-3, Chapter 9.5. 8.2.3 APDU structure All instructions sent to the MIFARE SAM AV2 have to be coded into an APDU structure according to ISO/IEC 7816-4 and inserted into the information field of one or more I-Blocks. The commands do not belong to the inter-industry class. The coding of the command and response pairs is proprietary, only the structure is compliant with ISO/IEC 7816-4. 8.2.4 UID/serial number The MIFARE SAM AV2 IC features a 7 byte unique serial number that is programmed into a locked part of the non-volatile memory that is reserved for the manufacturer. This UID is fixed and cannot be changed. 8.3 MIFARE SAM AV1 compatibility mode vs. MIFARE SAM AV2 mode Unless stated explicitly otherwise, all information in this document refer to both the MIFARE SAM AV1 compatibility mode and to the pure MIFARE SAM AV2 mode. Commands only available in pure MIFARE SAM AV2 mode are flagged as "AV2 only". Differences for commands different in SAM AV2 with respect to their corresponding SAM AV1 compatibility version are listed explicitly as well. The main differences between the AV1 compatibility mode and the AV2 mode are the following: * PKI commands are only available in AV2 mode * AV2 mode introduces key classes: Host Keys, PICC keys, OfflineChange keys and OfflineCrypto keys. All symmetric key entries are classified into one of them, restricting the possible usage of the key entry. * AV2 mode improves the SAM access protection by replacing the AV1 compatibility Host Authentication protocols with more secure variants. * AV2 mode improves the SAM-Host communication protection by replacing the AV1 compatibility increased security mode (based on CMACing) by three modes of secure messaging after a host authentication (Plain, MAC Protection and Full Protection). * AV2 mode replaces and adds some key entry configuration options, offering more flexibility in securing the SAM (e.g. regarding key dumping). P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 9 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.4 Cryptography and key handling 8.4.1 Cryptography AV1 compatibility mode supports symmetric key cryptographic algorithms while MIFARE SAM AV2 mode supports both symmetric and asymmetric cryptography. 8.4.1.1 Symmetric key cryptography MIFARE SAM AV2 offers support in several commands for various symmetric key cryptographic algorithms. DES and TDEA DES keys (56 bit) and 2TDEA keys (112 bit) are stored in 16 byte strings. 3TDEA keys (168 bits) are stored in 24 byte strings. DES keys (56 bit) are stored in the same format as the 2TDEA keys: the DES key is stored twice to form a 2 key TDEA key where the 2 keys are identical. AES AES keys are stored in strings of 16 bytes or 24 bytes depending on whether it is an AES 128-bit key or an AES 192-bit key. AES always operates on 16 bytes. Therefore data streams are always padded to a length of multiples of 16 bytes. For details of the AES standard please refer to publicly available standard (Ref. 31). AES MACing MIFARE SAM AV2 supports standard CMAC [ref. 15] for AES. Padding is done according to the standard. By default, the CMAC is truncated to 8 bytes, except if requested explicitly otherwise by the user (SAM_Generate_MAC and SAM_Verify_MAC commands). An alternate MAC truncation scheme is used for MIFARE Plus commands for the AV2 mode SAM-Host communication protection and possible via SAM_Generate_MAC and SAM_Verify_MAC commands. MIFARE Classic MIFARE SAM AV2 supports MIFARE Classic Crypto-1 authentication and encryption. 8.4.1.2 Asymmetric key cryptography (MIFARE SAM AV2 mode only) MIFARE SAM AV2 supports RSA encryption, decryption, signature generation and signature verification according to Ref. 16. These algorithms are available in AV2 mode via the PKI commands. RSA encryption and decryption: The PKI functionalities of the MIFARE SAM AV2 support RSA decryption. It is used by the PKI_UpdateKeyEntries command. The supported algorithm is RSAES-OAEP Ref. 16 The OAEP padding requires a hashing function and a Mask Generation Function (MGF). For the MGF, the SAM supports SHA-1, SHA-224 and SHA-256 for hashing (see Ref. 9 for the various SHA variants); the MGF used is the one specified by (Ref. 17 B.2.1). P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 10 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 RSA signature generation and verification: The PKI functionalities of MIFARE SAM AV2 support RSA signature handling. It is used by the PKI_GenerateSignature, PKI_VerifySignatures and PKI_UpdateKeyEntries commands. The supported algorithm is RSASSA-PSS (see Ref. 16). The PKI_GenerateSignature and PKI_VerifySignatures commands expect the already hashed message mHash as input. The initial hash operation (Step 1 and 2 of EMSA-PSS-Encode and EMSA-PSS-Verify, Ref. 16) is not calculated by this function. Hashing algorithms (MIFARE SAM AV2 only): MIFARE SAM AV2 supports SHA-1, SHA-224 and SHA-256 for hashing according to Ref. 17. These hashing algorithms are available in AV2 mode via the PKI_GenerateHash command. 8.4.2 Key diversification MIFARE SAM AV2 provides several key diversification methods. In both AV1 compatibility mode and in MIFARE SAM AV2 mode, the MIFARE SAM AV1 key diversification methods and new MIFARE SAM AV2 key diversification methods are available; however for AV2 only commands (i.e. MFP commands and the ULC_AuthenticatePICC) only the new MIFARE SAM AV2 diversification methods are available. 8.4.3 Key Storage (MIFARE SAM AV1 compatibility mode) MIFARE SAM AV2 in AV1 compatibility mode can only store symmetric keys. MIFARE SAM AV2 can store up to 128 symmetric keys in up to 3 versions (only 2 versions possible for 3TDEA keys and AES-192 keys). 8.4.3.1 Symmetric keys The MIFARE SAM AV2 uses a Key Storage Table (KST) in order to store and manage keys and attributes related to keys. The KST holds 128 entries. Every entry contains positions to store three DES, three 2TDEA, two 3TDEA, three AES128, two AES192 or six MIFARE keys plus their attributes. Every key entry is referred to by its index, the KeyNo. Key reference number: KeyNo is the index of the entry in the KST and can have the value 00h to 7Fh. Key reference number of change entry key: The 1-byte field holds the KeyNo that is necessary for authentication to run a SAM_ChangeKeyEntry command. The value FEh disables the need for authentication for key load. The value FFh irreversibly locks the entire key entry. Key version of change entry key: The 1-byte field holds the key version within the key entry specified for the change entry key. The key version has to be in the range of 00h to FFh. Reference number of key usage counter: The 1-byte field holds the reference number of the key usage counter entry which is automatically incremented each time this key entry is used for authentication, see Section 8.4.6. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 11 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.4.4 Key Storage (MIFARE SAM AV2 mode) MIFARE SAM AV2 in MIFARE SAM AV2 mode can store both symmetric and asymmetric keys. 8.4.4.1 Symmetric keys MIFARE SAM AV2 can store up to 128 symmetric keys in up to 3 versions (only 2 versions possible for 3TDEA keys and AES-192 keys) There only difference in the content of a key entry compared to AV1 compatibility mode is the addition of an ExtSET byte with extended configuration settings, as can be seen in Table 14. Storage and configuration options: Next to the addition of the ExtSET byte, part of the SET configuration settings got redefined when comparing AV2 mode to the AV1 compatibility mode. Four classes of keys are distinguished which restrict the possible usage of a key entry to part of the SAM functionality: 1. Host Keys: used for protecting the SAM-Host communication (see Section 8.5) These keys are restricted to the AES key types. 2. PICC Keys: used for the card communication; depending on the key type they can be used for authenticating and communicating with a MIFARE Plus, DESFire, MIFARE Classic and/or MIFARE Ultralight C card 3. OfflineChange Keys: used for some key management commands, to allow offline preparation of the cryptograms for these commands (compared to when the key management is done with Host Keys) These keys are restricted to the AES key types. 4. OfflineCrypto Keys: used for offline crypto operations: e.g. for communication with the backend or for writing encrypted data on a MIFARE Plus Slim or MIFARE Ultralight (C) card. Note that the key classes are mutual exclusive: one key cannot belong to more than 1 of these classes. KST reset when activating MIFARE SAM AV2 mode: From MIFARE SAM AV2 mode on, the keys stored in the KST are identified as Host, PICC, OfflineChange or OfflineCrypto Keys. For this reason the KST is reset when activating MIFARE SAM AV2 mode, as it is not clear how to assign the existing keys to one of the classes automatically. 8.4.4.2 Asymmetric keys MIFARE SAM AV2 can store 2 RSA public key pairs and one RSA public key.MIFARE SAM AV2 supports RSA keys with a modulus with a size from 256 bit (i.e. 32 bytes) up to 2048 bit (i.e. 256 bytes). PKI Key Storage Table: MIFARE SAM AV2 uses a PKI Key Storage Table (PKI_KST) in order to store and manage RSA asymmetric key pairs (i.e. private and public keys) and the attributes related to keys. The PKI_KST holds 3 entries. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 12 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.4.5 Key versioning The MIFARE SAM AV2 reserves three bytes in a key entry to store the version of the three available keys in the entry. This version byte contains the key version for all kinds of keys (DES, TDEA, AES and MIFARE). The version information must be included separately in every key entry of type AES or MIFARE when it is updated by the ChangeKeyEntry command. 8.4.6 Key usage counters In order to count and limit the number of authentications a key entry can be used for, MIFARE SAM AV2 stores a table of 16 key usage counter entries, 00h to 0Fh, which are automatically incremented each time a defined key entry is used for authentication. Multiple key entries can use the same counter. 8.4.6.1 Reference number The property RefNoKUC codes the reference number of the key usage counter. RefNoKUC is the index of the entry in the table and can have the value 00h to 0Fh, therefore 16 key usage counters can be stored. 8.4.6.2 Limit This field stores the current limit for this key usage counter. It is only possible to use a key that is linked to this counter for authentication if the current value (see below) is smaller than the current limit. As soon as the current value is equal to, or higher than, the current limit, the usage of all key entries linked to this counter is prohibited. 8.4.6.3 Key reference number to change the current KUC entry In order to change the KUC, a successful authentication by the host application of the MIFARE SAM AV2 is necessary. The KeyNoCKUC defines the reference number of the KST which is used for this. 8.4.6.4 Key version to change the current KUC entry The 1-byte field holds the key version within the key entry specified to change the KUC entry. The key version has to be in the range of 00h to FFh. The MIFARE SAM AV2 will automatically select the appropriate key from one of three positions in the entry that has the specified version number. 8.4.6.5 Current value The CurVal field stores the current value of this key usage counter. It is possible to use all keys referring to this counter for authentication only if the current value is smaller than the current limit. 8.5 SAM - Host communication 8.5.1 General principles for SAM-Host protection MIFARE SAM AV2 supports two different modes: AV1 compatibility mode and MIFARE SAM AV2 mode. A MIFARE SAM AV2 is initially in MIFARE SAM AV1 compatibility mode. It can be switched to the MIFARE SAM AV2 by executing a host authentication with the SAM Master Key using the SAM_LockUnlock command. Note that MIFARE SAM AV2 mode activation is thus only possible if the SAM Master Key is configured as an AES128 P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 13 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 or AES192 key. During this activation authentication, the maximal message size under command chaining (MaxChainBlocks) is set. Once switched to MIFARE SAM AV2 mode there is no mean to switch back. When the MIFARE SAM AV2 mode is activated, the Key Storage Table (except the SAM Master Key) gets reset. 8.5.2 MIFARE SAM AV1 compatibility mode SAM-Host protection In AV1 compatibility mode, SAM access and SAM-Host communication is protected by the increased security mode exactly like for the MIFARE SAM AV1. The protection mechanism is explained in the following subsection. 8.5.2.1 Increased security - CMAC calculation The MIFARE SAM AV2 offers the possibility to send each command on a higher security level by applying a CMAC. If activated, the MIFARE SAM AV2 requires a logical channel with an active host authentication to be defined for CMAC calculation to accept any command. The CMAC is calculated and padded according to the NIST Special Publication 800-38B, which gives a recommendation for block cipher modes of operation. The following commands of the MIFARE SAM AV2 do not apply the explained CMAC mechanism: * SAM_AuthenticateHost * SAM_GetChallenge, SAM_InternalAuthenticate and SAM_ExternalAuthenticate Commands already protected by encryption apply the explained CMAC mechanism only for the direction which is not protected: * * * * SAM_ChangeKeyEntry for the command APDU SAM_ChangeKUCEntry for the command APDU SAM_DumpSessionKey for the response APDU SAM_ChangeKeyMIFARE for the response APDU 8.5.3 MIFARE SAM AV2 mode SAM-Host protection Two kinds of host authentication can be distinguished. The first is used for locking and unlocking the SAM. The second kind is used to get the access rights to execute certain commands. It only affects the SAM status for the LC it is executed over and can be used to set up a SAC over this LC if preferred by the host. Once authenticated, three different protection modes on the LC are foreseen: plain, MAC Protection and Full Protection (i.e. by MACs and encryption). This host authentication is executed by using the SAM_AuthenticateHost command. Note that whether and when host authentications (be it for unlocking or for gaining access rights) are required depends on the SAM configuration and is explained in Ref. 1. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 14 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6 MIFARE SAM AV2 command set For better readability of the following command descriptions, the logical channel number of the CLA byte is set to default 00b. 8.6.1 SAM security and configuration commands Table 7. SAM security and configuration commands Command Description SAM_DisableCrypto This command allows the permanent and irreversible disabling of the cryptographic functionality of the MIFARE SAM AV2. Successful host authentication with one of the three keys stored in KeyNo 00h is required to send this command. SAM_LockUnlock The command SAM_LockUnlock (INS = 10h) is used to run a mutual authentication between the SAM and host system. The host authentication consists of three parts. Such an authentication proves that both the SAM and the host contain the same secret, namely the AES key Kx. The terminology, notations and state descriptions for SAM_LockUnlock are provided in Ref. 1. SAM_AuthenticateHost AV1 compatibility mode: The command SAM_AuthenticateHost is used to run a mutual 3-pass authentication between the MIFARE SAM AV2 and host system. Such an authentication proves that both the MIFARE SAM AV2 and the host contain the same secret, namely a DES, TDEA or AES key and generates a session key for further cryptographic operations. A host authentication is required to: * * * Load or update keys into the MIFARE SAM AV2 Modify key usage counter limits Activate the MIFARE SAM AV2 after reset (if configured accordingly in the configuration settings (SET) of KeyNo 00h) SAM_ActivateOfflineKey SAM_ActivateOfflineKey is to be used in AV2 mode to activate both OfflineCrypto and OfflineChange keys. SAM_LoadInitVector The command SAM_LoadInitVector is used to load an init vector for the next cryptographic operation into the MIFARE SAM AV2. The loaded init vector will be applied in the next cryptographic operation independent from the `Keep IV' setting of the key entry except for the authentication commands where the init vector is reset to zero. SAM_KillAuthentication AV1 compatibility mode: Invalidates any kind of authentication in the logical channel the command is issued. SAM_SelectApplication The command SAM_SelectApplication is the equivalent of the SelectApplication command of DESFire. The MIFARE SAM AV2 generates a list of available keys linked to the specified Application ID as defined in the key entry property `DF_AID'. The MIFARE SAM AV2 generates a list of available keys per DESFire AID and DESFire key number. For every key number, up to 6 key versions can be stored in the list (so it can read the keys from maximum two key entries per DESFire AID and DESFire key number). This list is filled starting with key entry zero. If the KST contains more than 6 key versions per DESFire AID and DESFIRE key number, only the first 6 versions will be listed. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 15 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 7. SAM security and configuration commands ...continued Command Description SAM_IsoGetChallenge/ SAM_GetRandom AV1 compatibility mode In AV1 compatibility mode, this is the first part of an ISO compliant authentication sequence returning a random number. The command can obviously also be used for simply generating a random number but it has to be taken into account that the MIFARE SAM AV2 internally is set into a state indicating that an authentication procedure is ongoing, if the requested random number length is 8 byte or 16 byte. Consequently, the command called after getting the random number will be aborted (except SAM_IsoExternalAuthenticate). After this abortion the MIFARE SAM AV2 resets its state and returns to normal operation. For a complete and valid authentication procedure, the three commands SAM_IsoGetChallenge, SAM_IsoExternalAuthenticate and SAM_IsoInternalAuthenticate have to be called in sequence without interrupting the sequence by another command. AV2 mode In AV2 mode, this command is only available to get random numbers. In this case, there are no special constraints on the expected length for the challenge. SAM_IsoExternalAuthen This command is part of an ISO compliant authentication procedure consisting of ticate SAM_IsoGetChallenge, SAM_IsoExternalAuthenticate and SAM_IsoInternalAuthenticate. It can be used by a host for authenticating the MIFARE SAM AV2. Note that this command is only available in AV1 compatibility mode. Such an authentication proves that both the MIFARE SAM AV2 and the host contain the same secret, namely a DES, TDEA or AES key, and generates a session key for further cryptographic operations. SAM_IsoInternalAuthent This command is part of an ISO compliant authentication procedure consisting of icate SAM_IsoGetChallenge, SAM_IsoExternalAuthenticate and SAM_IsoInternalAuthenticate. It can be used by a host for authenticating the MIFARE SAM AV2. Note that this command is only available in AV1 compatibility mode. Such an authentication proves that both the MIFARE SAM AV2 and the host contain the same secret, namely a DES, TDEA or AES key, and generates a session key for further cryptographic operations. SAM_GetVersion The SAM_GetVersion command returns manufacturing related data of the MIFARE SAM AV2. The SAM_GetVersion command can be used to detect whether a SAM has been switched to the MIFARE SAM AV2 mode. SAM_Sleep Will force the MIFARE SAM AV2 to put a connected RC52x or RC663 into sleep mode and itself into idle mode to reduce power consumption. The MIFARE SAM AV2 will answer the command and afterwards switch to idle mode. The MIFARE SAM AV2 will automatically return to normal operation after receiving the first character of the next command. The RC52x or RC663 will stay in sleep mode until a command is issued which utilizes the reader IC. Then the MIFARE SAM AV2 automatically carries out the wake-up sequence before starting the requested operation. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 16 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.2 SAM key management commands Table 8. SAM key management commands Command Description AV1 compatibility mode SAM_ChangeKeyEntry This command updates any key entry of the KST. The complete data set of the full key entry must always be sent, and it will be programmed to the non-volatile memory of the MIFARE SAM AV2 as defined in the non-volatile ProMas. SAM_GetKeyEntry The SAM_GetKeyEntry command allows reading the contents of the key entry specified in the parameter KeyNo. Instead of the full keys on positions a, b and c, only their key version will be returned, each packed in one byte. This command can be issued without valid (host) authentication. SAM_ChangeKUCEntry This command updates any key usage counter entry stored in the MIFARE SAM AV2. Always limit, KeyNoCKUC and KeyVCKUC have to be sent; the parameter ProMas defines which properties are programmed into the MIFARE SAM AV2 non-volatile memory. Successful host authentication with the key specified in KeyNoCKUC of the current KUC entry is required. SAM_GetKUCEntry The SAM_GetKUCEntry command allows reading the data of the key usage counter entry specified within the Parameter RefNoKUC. This command can be issued without valid (host) authentication. SAM_DumpSessionKey The command SAM_DumpSessionKey can be used to retrieve the session key generated by the MIFARE SAM AV2. The session key could be retrieved either in plain or encrypted with the session key of any logical channel. A CRC is appended before encryption as usual. This feature is necessary if cryptographic operations like en-/decipher should be handled by the terminal microcontroller instead of the MIFARE SAM AV2. As this feature can be seen as a potential security risk if not used in the correct way, it can be en-/disabled using the configuration settings of every key entry. SAM_DisableKeyEntry The SAM_DisableKeyEntry command disables a key entry. After executing this command, the corresponding disable flag in the key entry is set and the key entry cannot be used anymore for authentication and key change procedures. The key entry can still be read by a SAM_GetKeyEntry command. To reactivate the entry, a SAM_ChangeKeyEntry command has to be issued. All fields in the key entry can still be changed by this command even if the entry has been disabled. AV2 Mode The following rows give an outlook of the changes compared to the AV1 compatibility mode. All commands except SAM_GetKUCEntry got partially or completely redefined for the AV2 mode. For more information see Ref. 1. SAM_ChangeKeyEntry and SAM_ChangeKUCEntry In the AV1 version, there are two possibilities for changing key and KUC entries via the SAM_ChangeKeyEntry and SAM_ChangeKUCEntry respectively. Which possibility is used, depends on whether the "allow crypto with secret key" of the change key, i.e. the key referenced by KeyNoCEK or KeyNoCKUC respectively, was set. If set, this allowed for offline preparation of the key/KUC changing cryptogram. In the new MIFARE SAM AV2 mode, these two possibilities are still supported, but which possibility is used depends on the key class of the change key. Change keys are either Host Keys or OfflineChange Keys. The second class will allow offline command generation. SAM_GetKeyEntry The SAM_GetKeyEntry command allows reading the contents of the key entry specified in the parameter KeyNo. Instead of the full keys on positions a, b and c, only their key version will be returned, each packed in one byte. This command can be issued without valid (host) authentication. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 17 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 8. SAM key management commands ...continued Command Description SAM_DumpSessionKey The command SAM_DumpSessionKey can only be used to retrieve the session key of an established authentication with a DESFire or MIFARE Plus PICC. So an active PICC authentication (for these card types) is required. The session key can be retrieved in plain or encrypted, depending on the SAM-Host protection mode of the logical channel. In Plain and MAC Protection mode, the dump is done in plain; in Full Protection the key is encrypted (as any other response data field). Under MAC Protection, the response data field can optionally be encrypted if requested via setting bit 0 of P1. This command cannot be used for secret key dumping. SAM_DumpSecretKey SAM_DumpSecretKey allows dumping any of the PICC keys (except MIFARE Classic keys) or OfflineCrypto keys. SAM_DisableKeyEntry In AV2 mode, two possibilities are supported, similar to the SAM_ChangeKeyEntry command. Which possibility is used depends on the key class of the change key. Change keys are either Host Keys or OfflineChange Keys. The second class will allow offline command generation. 8.6.3 Data processing commands Table 9. Data processing commands Command Description AV1 compatibility mode SAM_Verify_MAC The SAM_Verify_MAC command verifies the MAC which was sent by the DESFire PICC or any other system based on the given MACed plain text data and the currently valid cryptographic key. The applied MAC algorithm depends on the key typ. The command can also be used for verifying only a part of a MAC. The number of MAC bytes to be verified is defined by parameter P2. SAM_Generate_MAC The SAM_Generate_MAC command creates a MAC which is meant to be sent to the DESFire PICC or any other system based on the given plain text data and the currently valid cryptographic key. The applied MAC algorithm depends on the key type. SAM_Decipher_Data The SAM_Decipher_Data command deciphers data packages sent by a DESFire PICC, any other system or a MIFARE card based on the currently valid cryptographic key and returns plain data to the PCD. SAM_Encipher_Data The SAM_Encipher_Data command creates data packages which are meant to be sent to a DESFire PICC or any other system based on the given plain text data and the currently valid cryptographic key. To do so, the plain data is en-ciphered in cipher block chaining send mode. CRC and padding bytes are appended automatically. AV2 Mode The MIFARE SAM AV1 supported the execution of cryptographic operations (MACing, encryption) using the SAM data processing commands with a key that allowed "Crypto with secret key". So the same primitives as used for the DESFire communication are also accessible for so-called offline cryptographic operations (i.e. crypto operations that are not part of the SAM-Host or SAM-PICC communication protocols). For the MIFARE SAM AV2 this kind of functionality is still supported. The "Crypto with secret key" operation is replaced by a separate key class, called OfflineCrypto Keys. The existing SAM data processing commands are extended to support full length MAC generation and verification; also new commands for executing standard CBC encryption and decryption are provided. The existing SAM data processing commands (SAM_Generate_MAC, SAM_Verify_MAC, SAM_Encipher_Data and SAM_Decipher_Data) can still be used to support DESFire communication, by issuing them in an LC with an active PICC authentication (SAM_AuthenticatePICC). These commands and the new SAM_EncipherOffline_Data and SAM_DecipherOffline_Data can be used with OfflineCrypto Keys if issued in an LC with an active OfflineCrypto key. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 18 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 9. Data processing commands ...continued Command Description SAM_Verify_MAC The SAM_Verify_MAC command verifies the MAC which was sent by the DESFire PICC or any other system based on the given MACed plain text data and the currently valid cryptographic key. The valid key has been activated using a valid PICC authentication (SAM_AuthenticatePICC, SAM_ISOAuthenticatePICC) in case of a PICC Key or using a valid key activation (SAM_ActivateOfflineKey) in case of an OfflineCrypto Key. The applied MAC algorithm depends on the key type. In case of the AES key types and the (3)DES key types 3 and 6, the standard CMAC algorithm is applied. SAM_Generate_MAC The SAM_Generate_MAC command creates a MAC which is meant to be sent to the DESFire PICC or any other system based on the given plain text data and the currently valid cryptographic key. The valid key has been activated using a valid PICC authentication (SAM_AuthenticatePICC, SAM_ISOAuthenticatePICC) in case of a PICC Key or using a valid key activation (SAM_ActivateOfflineKey) in case of an OfflineCrypto Key. The applied MAC algorithm depends on the key type. In case of the AES key types and the (3)DES key types 3 and 6, the standard CMAC algorithm is applied. SAM_Decipher_Data Same operation as in MIFARE SAM AV1 compatibility mode performed with either a valid PICC authentication (SAM_AuthenticatePICC, SAM_ISOAuthenticatePICC or SAM_AuthenticateMIFARE) in case of a PICC Key or a valid key activation (SAM_ActivateOfflineKey) in case of an OfflineCrypto Key. SAM_Encipher_Data Same operation as in AV1 compatibility mode and same description. SAM_DecipherOffline_ The new SAM_DecipherOffline_Data command decrypts data received from any other system Data based on the given cipher text data and the currently valid cryptographic OfflineCrypto Key. The valid key has been activated using a valid key activation (SAM_ActivateOfflineKey). The applied decryption is the block cipher algorithm depending on the key type in CBC mode. The IV needs to be loaded via the SAM_LoadInitVector command before issuing this command. If no IV was loaded, the zero byte IV is applied. No padding is removed from the decrypted plain text, so the output length equals the input length. The total input size must be a multiple of the block size of the underlying block cipher (depending on the key type). In case of command chaining, the SAM immediately starts returning decrypted data for the received blocks. The new SAM_EncipherOffline_Data command encrypts data received from any other system based on the given cipher text data and the currently valid cryptographic OfflineCrypto Key. The valid key has been activated using a valid key activation (SAM_ActivateOfflineKey). The applied decryption is the block cipher algorithm depending on the key type in CBC mode. The IV needs to be loaded via the SAM_LoadInitVector command before issuing this command. If no IV was loaded, the zero byte IV is applied. No padding is added to the plain text, so the output length equals the input length. As a consequence, the total input size must be a multiple of the block size of the underlying block cipher (depending on the key type). In case of command chaining, the SAM immediately starts returning encrypted data for the received blocks. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 19 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.4 Public Key Infrastructure (PKI) commands PKI commands are available to generate public key pairs, to import public keys or key pairs, to export public keys or key pairs, to generate and to validate signatures, to compute hashes suitable for signature operations and to manage the symmetric Key Storage Table. PKI commands are only available in AV2 mode. Table 10. Public Key Infrastructure (PKI) commands Command Description PKI_GenerateKeyPair The PKI command PKI_GenerateKeyPair creates a pair of a public and a private key. MIFARE SAM AV2 only supports the CRT format. A successful host authentication in the LC using SAM_AuthenticateHost with a Host Key is required to execute the PKI_GenerateKeyPair command. PKI_ImportKey The PKI command PKI_ImportKey imports an RSA key. This can be either a public key or a full key pair (including a private key). When a change key (see Ref. 1) is specified, a successful host authentication in the LC using SAM_AuthenticateHost with a Host Key is required to execute the PKI_ImportKey command. PKI_ExportPrivateKey The PKI command PKI_ExportPrivateKey exports a full RSA key entry (i.e including the private key if present). The key pair is exported in CRT format. This command is intended for private key backup after having it created with MIFARE SAM AV2. For this reason, this command will only be accepted if the key entry includes a private key and private key export is allowed by the PKI SET configuration of the addressed key. The command is part of the restricted command set and requires protection with a Host Key change key. PKI_ExportPublicKey The PKI command PKI_ExportPublicKey exports the public key part of a RSA key pair. The command is part of the general command set, so its protection depends on the general SAM-Host communication protection. PKI_UpdateKeyEntries The PKI_UpdateKeyEntries command can be used to change key entries of the symmetric key storage (KST). Executing this command does not require any protection coming from the change key of the key entries (e.g. a Host Authentication in case of a Host Key). Instead the command's execution is protected by asymmetric techniques using the PKI support of the SAM. The command is protected by encrypting the key entries using the RSA encryption. On top a digital signature is added using the RSA signature algorithm. This allows offline preparation of the cryptogram. The same hashing algorithm is to be used for both MGFs and for the digital signature handling (as indicated by the P1 byte). PKI_GenerateHash The PKI command PKI_GererateHash computes the hash on a data string. The algorithm to be used to compute the hash is selected through P1. PKI_GenerateSignature The PKI command PKI_GenerateSignature generates a signature on a hash given as input using one of the two private keys stored in the PKI Key Storage Table. PKI_SendSignature The PKI command PKI_SendSignature returns a pre-computed signature. The returned signature is protected according to the SAM-Host protection in place on the corresponding logical channel. PKI_VerifySignature The PKI command PKI_VerifySignature verifies the correctness of a signature. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 20 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.5 MIFARE Plus in non-X-mode commands This section describes the SAM commands that can be used to prepare MIFARE Plus commands. The SAM maintains the MIFARE Plus state (e.g. the read and write counters). Table 11. MIFARE Plus in non-X mode commands Command Description SAM_AuthenticateMFP SAM_AuthenticateMFP can be used for all MIFARE Plus authentications (e.g. SL1, SL2, SL3, originality keys, SL2 re-authentication). The choice of whether a first or following authentication is to be performed is indicated in the parameters of the command. Also the user has to indicate which session key derivation needs to be used afterwards: no session keys needed (SL1 card authentication, originality keys authentication), key derivation to continue with SAM_AuthenticateMIFARE (SL2) or session key derivation to continue with normal MIFARE Plus transaction (SL3). SAM_AuthenticateMFP only supports the 2-part version of the MIFARE Plus Authentication. SAM_CombinedReadMFP SAM_CombinedReadMFP handles either a MIFARE Plus Read command, a MIFARE Plus Read Response or both. SAM_CombinedWriteMFP SAM_CombinedWriteMFP handles either a MIFARE Plus write command (Write, Increment, Decrement, Transfer, Restore, Increment Transfer or Decrement Transfer) or a MIFARE Plus write response. Bit 0 of P1 indicates whether it is a command or a response. SAM_ChangeKeyMFP SAM_ChangeKeyMFP computes the command required to replace a MIFARE Plus key with one of the keys stored in the SAM. SAM_VirtualCardSupportMFP SAM_VirtualCardSupportMFP handles the MIFARE Plus VCS and VCSL commands. One SAM_VirtualCardSupport can handle up to 5 command sets. A command set covers a block of VCS commands and one concluding VCSL command. SAM_SelectVirtualCardMFP SAM_SelectVirtualCardMFP handles the MIFARE Plus SVC command. SAM_ProximityCheckMFP SAM_ProximityCheckMFP is performed in two steps. In the first step, given the data collected during the execution of the proximity check protocol with the MIFARE Plus PICC, the SAM computes the MAC needed for the final proximity check command. In the second step, the SAM verifies the MAC received from the MIFARE Plus PICC. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 21 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.6 MIFARE Classic in non-X-mode commands The commands in this section can both be used to execute a transaction with a MIFARE Classic card and with a MIFARE Plus card in SL2. In the second case, SAM_AuthenticateMIFARE is to be used after SAM_AuthenticateMFP to complete a MFP SL2 authentication. In both cases, after the authentication, the other SAM_xxxMIFARE commands and the data processing commands SAM_Decipher_Data and SAM_Encipher_Data can be used for further processing. Table 12. MIFARE Classic in non-X-mode commands Command Description SAM_Authenticate MIFARE n this procedure, both the MIFARE card as well as the MIFARE SAM AV2 device show in an encrypted way that they posses the same secret which especially means the same key. SAM_ChangeKey MIFARE AV1 compatibility mode This command is intended to change a key in a MIFARE card. The command offers the possibility to prepare an encrypted stream to be written to a MIFARE 1k or MIFARE 4k card containing the desired keys and the given access conditions on the one hand and reading out a single MIFARE key to be used for any kind of MIFARE transaction in a host system directly on the other hand. In the latter case, the key can be retrieved encrypted from the MIFARE SAM AV2 using the current available session key of the channel (host authentication required). The first case requires an active MIFARE authentication for producing the stream to be sent to the card.AV2 mode (used for key retrieval) In MIFARE SAM AV2 mode, the existing command, SAM_ChangeKeyMIFARE (used for key retrieval), can still be used to retrieve a PICC Key of key type 010, i.e. a MIFARE Classic key. The use of this command to change keys on MIFARE Classic cards is the same as the one described for the AV1 compatibility mode. The only difference with AV1 is that whether the secret key is retrieved in plain or encrypted depends on the SAM-Host protection mode of the logical channel. 8.6.7 DESFire and ULC in non-X-mode commands Table 13. DESFire and ULC in non-X-mode commands Command Description SAM_AuthenticatePICC In this procedure both the PICC as well as the MIFARE SAM AV2 device show in an encrypted way that they posses the same secret which especially means the same key. This procedure not only confirms that both entities are permitted to do operations on each other but also creates a session key which can be used to keep the further communication path secure. As the name `session key' implicitly indicates, each time a new authentication procedure is successfully completed a new key for further cryptographic operations is obtained. SAM_IsoAuthenticatePICC The ISO authentication procedure is intended to authenticate with a card using the standard ISO commands GetChallenge, ExternalAuthenticate and InternalAuthenticate. This authentication procedure can be used to authenticate a DESFire PICC but also another MIFARE SAM AV2. However, the MIFARE SAM AV2 will treat the authentication procedure as a PICC authentication, which means that commands requiring a host authentication will not be available. SAM_ChangeKeyPICC P5DF081_SDS Product short data sheet COMPANY PUBLIC This command generates the cryptogram that has to be sent to the PICC in order to change any key stored in the PICC. Both the current and the new key need to be stored in the KST to execute this command. This means a new PICC key needs to be loaded into the MIFARE SAM AV2, prior to issuing this command. All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 22 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.8 RC52x or RC663 configuration commands Table 14. RC522x or RC663 configuration commands Command Description RC_ReadRegister Read the content of one or more register(s) of the connected reader chip. The command allows reading 255 registers with one command. If a register address is listed more than once in the data field, the content of this register will be re-read every time. RC_WriteRegister Write the content of one or more register(s) of the connected reader chip. The command allows writing 127 registers with one command. If a register address with its related content is listed more than once in the data field, the content of this register will be re-written every time. RC_RFControl This command allows the radio frequency field to be turned off and on. The basic behavior is the reset functionality where the controller turns off the field for the time given in the data field. If a zero value is passed, the field is totally turned off. After turning off the field, to turn it on again, the command can be issued with any value other than zero. Take into account that the passed time value also in this case will force the MIFARE SAM AV2 to wait this additional time until turning on the field again. RC_Init Establishes the serial connection between MIFARE SAM AV2 and RC52x or RC663 and initializes the reader chip with the register values stored in the selected register value set. RC_LoadRegister ValueSet Stores a customer defined register value set for the RC52x or RC663 in the non-volatile memory of the MIFARE SAM AV2. This set can then be used for initializing the reader chip with the RC_Init command. The address of and the related value for the register have to be placed consecutively in the command data field of the APDU. 8.6.9 ISO14443 commands Table 15. ISO14443 commands Command Description ISO14443-3_Request_Wakeup Issue a request or wake-up command. ISO14443-3_Anticollision_Select Perform bit-wise anticollision and select. The anticollision and the following select are performed according to the select code in the data field. ISO14443-3_ActivateIdle Carries out one or several request - anticollision - select sequences and returns the SAK and the UID of the selected card(s). The ATQA is returned for every request issued, this means for every newly activated card. Due to the fact that the resulting ATQA is the OR-function of all ATQAs, the value may change frequently. ISO14443-3_ActivateWakeup The command reactivates and selects a card that has previously been set to Halt state. The command takes the UID of the card to reactivate. ISO14443-3_HaltA The command puts a selected card into Halt state. ISO14443-3_TransparentExchange Exchange bytes/bits transparently. The MIFARE SAM AV2 will take the user data and send it without changing, inserting or appending any content to the contactless card. Appending of a CRC, time-out settings, etc. have to be configured by directly writing the RC52x or RC663 registers. Take into account that switching settings of the reader chip influence all subsequent MIFARE SAM AV2 commands proposing the correct reader chip settings, i.e. ISO14443- 4_Exchange. ISO14443-4_RATS_PPS Execute a combined RATS and PPS sequence to prepare a card for T=CL data exchange. The CID assigned to the card will be assigned to the current logical channel. This means, every further ISO14443-4 command issued in this logical channel will be executed using this CID automatically. ISO14443-4_Init Initialize the T = CL protocol. The intent of this command is to configure the protocol for data exchanges. This is necessary if a card was already activated and configured for doing data exchanges without using the ISO14443-4_RATS_PPS command. ISO14443-4_Exchange Exchange bytes according to ISO/IEC 14443-4 T = CL protocol. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 23 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 15. ISO14443 commands ...continued Command Description ISO14443-4_PresenceCheck Check if an activated card is still in the field. ISO14443-4_Deselect Deselect an activated card. The CID is freed by this command. If the deselect fails, the CID will not be freed and cannot be used for activating another card. This behavior might be overridden by setting a flag in the P1 byte. CIDs can also be freed using the ISO14443-4_FreeCID command. ISO14443-4_FreeCID Free one, more, or all currently assigned CIDs. This command might be necessary if several deselect commands failed and the CIDs were not forced to be freed but the card is deactivated or no longer available in the field. 8.6.10 MIFARE Classic in X-mode commands The commands in this section can both be used to execute a transaction with a MIFARE Classic card and with a MIFARE Plus card in SL2. In the second case, MF_Authenticate, MF_AuthenticatedRead or MF_AuthenticatedWrite is to be used after MFP_Authenticate to complete a MFP SL2 authentication. Afterwards, the other MF_xxx commands can be used for further processing. Table 16. MIFARE Classic in X-mode commands Command Description MF_Authenticate Performs an authentication with a MIFARE card. The MIFARE key has to be stored in the MIFARE SAM AV2 and is referenced by a parameter in the command data field. The key can be diversified if necessary. MF_Read Read one or several blocks of a MIFARE card and return the data. If more than one block is read, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. The order of the returned data is the same as the order of addresses in the data field. MF_Write Write one or several blocks of a MIFARE card. If more than one block is written, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. The command supports writing of 16 bytes encrypted for MIFARE 1k and MIFARE 4k cards as well as writing 16 bytes or 4 bytes plain for MIFARE Ultralight cards. The length can be selected by bit 0 of parameter byte P2. If 16 bytes block write is selected, the MIFARE SAM AV2 decides whether encryption shall be used by checking the authentication state. If a MIFARE authentication has been completed, the data is encrypted. Encrypted writing of 4 byte blocks is not supported. MF_ValueWrite Write one or several value blocks of a MIFARE card. If more than one block is written, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. Since a MIFARE card uses 12 bytes for storing a four-byte value, the address to write in the last four bytes has to be specified by the user ('address' parameter). MF_Increment Increment one or several value blocks on a MIFARE card. Every increment is confirmed automatically by sending the transfer command directly afterwards. The user has to define the source address of the value block to be incremented and the destination address of the value block to store the result. If more than one block is incremented, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. MF_Decrement Decrement one or several value blocks on a MIFARE card. Every decrement is confirmed automatically by sending the Transfer command directly afterwards. The user has to define the source address of the value block to be decremented and the destination address of the value block to store the result. If more than one block is decremented, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. MF_Restore Copy one or several value blocks on a MIFARE card. If more than one block is copied, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. The order of the status code is the same as the order of addresses in the data field. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 24 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 16. MIFARE Classic in X-mode commands ...continued Command Description MF_Authenticated Performs an authentication with subsequent reading of blocks on a MIFARE card. The command allows Read authenticating and reading several different blocks on the card within one command. Several blocks can be read without re-authenticating, but also several blocks with different authentications. For each block address needing a new authentication, the key to authenticate with and whether it shall be diversified has to be specified. If a key is used for accessing different blocks but a new authentication is necessary, these blocks have to be listed consecutively in the data field and the re-use to be indicated by a flag. If more than one block is read, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. The order of the returned data is the same as the order of addresses in the data field. MF_Authenticated Performs an authentication with subsequent writing of blocks on a MIFARE card. The command allows Write authenticating and writing several different blocks on the card within one command. Several blocks can be written without re-authenticating, but also several blocks with different authentications. For each block address needing a new authentication, the key to authenticate with and whether it shall be diversified has to be specified. If a key is used for accessing different blocks, these blocks have to be listed consecutively in the data field and the re-use to be indicated by a flag. If more than one block is written, the MIFARE SAM AV2 accesses the blocks in the same order as addresses listed in the command data field. MF_ChangeKey This command is intended to change a key in a MIFARE card. The command offers the possibility to prepare and write an encrypted data stream to a MIFARE 1k or MIFARE 4k card containing the desired keys and the given access conditions. The first case requires an active MIFARE authentication for producing the stream to be sent to the card. This command is able to generate a diversified MIFARE standard key, based on a MIFARE key stored in the MIFARE SAM AV2, a TDEA key stored in the MIFARE SAM AV2, the UID of the MIFARE standard PICC and the block address on the MIFARE standard card. The TDEA key applied for the diversification is referenced in the MIFARE key entry. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 25 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.11 MIFARE Plus in X-mode commands This chapter describes the commands for the MIFARE Plus PICC's when the MIFARE SAM AV2 is used in MIFARE SAM AV2 mode. When a MIFARE Plus communication is established between the SAM and a MIFARE Plus PICC, the corresponding SAM logical channel maintains the state (e.g. the read and write counters) required to manage the secure messaging with the MIFARE Plus PICC. Table 17. MIFARE Plus in X-mode commands Command Description MFP_WritePerso MFP_WritePerso is a multi-block write command. It performs up to 13 MFP WritePerso commands. If more than 13 values are to be updated, several MFP_WritePerso are to be issued. There is no command chaining for this command. MFP_Authenticate MFP_Authenticate performs all MIFARE Plus authentications (e.g. SL1, SL2, SL3, originality keys...). The choice of whether a first or following authentication is to be performed is indicated in the parameters of the command. Also the user has to indicate which session key derivation needs to be used afterwards: no session keys needed (SL1 card authentication, originality keys authentication), key derivation to continue with MF_Authenticate (SL2) or session key derivation to continue with normal MIFARE Plus transaction (SL3). MFP_CombinedRead MFP_CombinedRead performs one MIFARE Plus read command. MFP_CombinedWrite MFP_CombinedWrite performs a MIFARE Plus write command where a write command can be a MIFARE Plus Write, Increment, Decrement, Transfer, Restore, Increment Transfer or Decrement Transfer command. Each MFP_CombinedWrite command is restricted to one MIFARE Plus write command. MFP_ChangeKey MFP_ChangeKey replaces one of the MIFARE Plus PICC keys by one of the keys stored in the SAM. MFP_ProximityCheck MFP_ProximityCheck performs the complete MIFARE Plus proximity check between MIFARE SAM AV2 and the MIFARE Plus PICC. It performs the PPC, the one or more PC's and the VPC command. As this is the X-mode command, the proximity time measurement is handled by a MFRC52X reader IC time-out. The reader IC will use the ISO14443-3 minimal frame delay time, as a time-out value for the PICC response to the MIFARE Plus Proximity Check command(s) sent. In case the proximity check is executed with an MFP authentication, the MAC session key of this authentication will be used for the MIFARE Plus Verify Proximity Check (VPC). The command also foresees random VPC processing as recommended in some cases for privacy reasons. MFP_VirtualCardSupport MFP_VirtualCardSupport sends as many MIFARE Plus VCS and VCSL commands to the MIFARE Plus PICC as specified in the command. MFP_VirtualCardSupport accepts up to 5 command sets. MFP_VirtualCardSupport returns the MIFARE Plus PICC responses to the corresponding VCSL commands. A command set is made of commands. For each command the key duo is specified (i.e. the SAM key to be used for MAC and the SAM key to be used for ENC) together with the VCIID to be advertised by the SAM to the MIFARE Plus PICC. Given a command set, sizeof(command set)-1 VCS commands are sent with one concluding VCSL command. MFP_SelectVirtualCard MFP_SelectVirtualCard sends a MIFARE Plus SVC command to the MIFARE Plus PICC. If no successful entry for this IID can be found (from MFP_VirtualCardSupport processing), the SAM will still send an SVC command (with random MAC) to the card. On successful execution (both valid and invalid IID), the internal VC table is invalidated. Note that MIFARE SAM AV2 does not support multiple VC selection protocols to be executed in parallel. The user needs to ensure the VC selection is completed before starting another on any of the LCs, as starting VC selection with SAM_VirtualCardSupportMFP or MFP_VirtualCardSupport will also invalidate the existing internal VC table (if any). P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 26 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 8.6.12 DESFire and ULC in X-mode commands Table 18. DESFire and ULC in X-mode commands Command Description DESFire_AuthenticatePICC In this procedure both the PICC as well as the MIFARE SAM AV2 device, show in an encrypted way that they posses the same secret which especially means the same key. This procedure not only confirms that both entities are permitted to do operations on each other but also creates a session key which can be used to keep the communication path secure. As the name `session key' implicitly indicates, each time a new authentication procedure is successfully completed a new key for further cryptographic operations is obtained. DESFire_ChangeKeyPICC This command generates the cryptogram that has to be sent to the PICC in order to change any key stored in the PICC. Both the current and the new key need to be stored in the KST to execute this command. This means a new PICC key needs to be loaded into the MIFARE SAM AV2, prior to issuing this command. DESFire_WriteX Write data encrypted or MACed on a DESFire PICC. This command shall be used to issue the ChangeKeySettings, WriteData, Credit, Debit, LimitedCredit or WriteRecord command. It takes the data to be sent to the DESFire and applies the encryption or MACing mechanism starting from an indicated index. The user is responsible for providing the correct command frame including the command code, the parameter bytes and the plain data as specified for the DESFire PICC. The indication from which position on the crypto mechanism shall be applied will normally be the first data byte of the command frame. The MIFARE SAM AV2 will automatically adapt the amount of bytes to send to the PICC after encryption of data or adding the MAC, respectively. DESFire_ReadX Read encrypted or MACed data from the DESFire PICC. This command shall be used to issue the ReadData, GetValue, or ReadRecords command. It takes the data to be sent to the DESFire and applies the decryption and MAC verification mechanism to the received data. Afterwards the MIFARE SAM AV2 returns the decrypted or verified plain data. The user is responsible for providing the correct command frame including the command code and the parameter bytes as specified for the DESFire PICC. This command frame will be sent directly to the DESFire. This is also the case for commands applying application chaining. ULC_ AuthenticatePICC The ULC_AuthenticatePICC command is needed to authenticate to a MIFARE Ultralight C card. P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 27 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 9. Limiting values Table 19. Limiting values [1] In accordance with the Absolute Maximum Rating System (IEC 60134). Voltages are referenced to VSS (ground = 0 V). Symbol Parameter VDD supply voltage Conditions Min Max Unit 0.5 +6.0 V VI input voltage on any signal pad 0.5 VDD +0.5 V II input current on pads IO1, IO2 or IO3 - 15.0 mA IO output current Ilu latch-up current VESD Ptot(pack) - 100 mA on pads VDD, VSS, CLK, RST, IO1, IO2, IO3 [2] - 4.0 kV on pads LA, LB [2] - 2.0 kV [3] - 1 W VI < 0 or VI > VDD electrostatic discharge voltage total power dissipation per package [1] Stresses beyond those listed may cause permanent damage to the device. These are stress ratings only and functional operation of the device at these or any other conditions beyond those indicated under "recommended operating conditions" is not implied. Exposure to absolute-maximum-rated conditions for extended periods may affect device reliability. [2] MIL Standard 883-D method 3015; Human body model; C = 100 pF, R = 1.5 k; Tamb = 25 C to +85 C. [3] Depending on appropriate thermal resistance of the package. 10. Characteristics Table 20. Recommended operating conditions Symbol Parameter Conditions Min Typ Max Unit VDD supply voltage 5 V operation 4.5 5.0 5.5 V 3 V operation 2.7 3.0 3.3 V on digital inputs and digital I/O pads 0 - VDD V 25 - +85 C VI input voltage Tamb ambient temperature Table 21. Electrical characteristics of IC supply voltage VDD; VSS = 0 V; Tamb = 25 C to +85 C Symbol Parameter VDD supply voltage P5DF081_SDS Product short data sheet COMPANY PUBLIC Conditions Min Typ Max Unit Class A: 5 V range 4.5 5.0 5.5 V Class B: 3 V range 2.7 3.0 3.3 V All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 28 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 11. Abbreviations Table 22. P5DF081_SDS Product short data sheet COMPANY PUBLIC Abbreviations Acronym Description 2TDEA 2 Key TDEA 3TDEA 3 Key TDEA AES Advanced Encryption Standard AID Application IDentifier APDU Application Protocol Data Unit AppData Application Data ATQA Answer To reQuest (Type A) ATR Answer To Reset ATS Answer To Select Auth mode Authentication Mode Authent Authentication CBC Cipher Block Chaining (a block cipher mode) CID Card IDentifier CLA CLAss CMAC Ciphered-based MAC CmdCode Command Code CmdSettings Command Settings CRC Cyclic Redundancy Check CRC16 16 bit CRC CRC32 32 bit CRC CRT Chinese Remainder Theorem CurVal Current Value of key usage counter CWT Character Waiting Time DES Data Encryption Standard DF_AID DESFire AID DF_KeyNo DESFire Key Number DFKeyNo DESFire Key Number Div Diversification DivInp Diversification Input DRI Divisor Receive Integer DSI Divisor Send Integer EEPROM Electrically Erasable Programmable Read Only Memory ek(x) Encrypted 'x' ekNo(x) Encrypted Number 'x' FIFO First In First Out FIPS Federal Information Processing Standard FSC Frame Size for Card FSCI Frame Size for Card Integer FSD Frame Size for Device All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 29 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 22. P5DF081_SDS Product short data sheet COMPANY PUBLIC Abbreviations ...continued Acronym Description FSDI Frame Size for Device Integer FWI Frame Waiting time Integer INS INStruction code ISO International Organization for Standardization IV Initial Vector (input parameter to some block cipher modes) KeyCompMeth Key Compilation Method KeyNo Key Reference Number KeyNoCEK Key Reference Number of Change Entry Key KeyNoCKUC Key Reference Number to change the current KUC Entry KeyNoM Key Reference Number of MIFARE Key KeyV Key Version KeyVa Key (Version a) KeyVb Key (Version b) KeyVc Key (Version c) KeyVCEK Key Version of Change Entry Key KeyVCKUC Key Version to change the current KUC Entry KeyVM Key Version of MIFARE Key KST Key Storage Table (the place where the SAM stores the symmetric keys and their configuration) KST Key Storage Table KUC Key Usage Counter LC Logical Channel (the ISO-7816 concept) LFI Last Frame Indicator LoadReg Number of Register Value Set to be loaded LRC Longitudinal Redundancy Check LSB Least Significant Byte MAC Message Authentication Code MAD MIFARE Application Directory MFP MIFARE Plus MGF Mask Generation Function MSB Most Significant Byte NumCards Number of Cards OAEP Optimal Asymmetric Encryption Padding PCD Proximity Coupling Device PICC Proximity Integrated Circuit Card PKI Public Key Infrastructure PKI_KST The asymmetric counterpart of the KST: for storage of the PKI keys and their configuration. PPS Protocol and Parameter Selection ProMas Programming Mask PSS Probabilistic Signature Scheme All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 30 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Table 22. P5DF081_SDS Product short data sheet COMPANY PUBLIC Abbreviations ...continued Acronym Description RATS Request for Answer To Select RefNoKUC Reference Number of Key Usage Counter RegAddress Register Address RegContent Register Content REQA Request Command, Type A RFU Reserved for Future Use RndA Random Number A RndA' Random Number A rotated left over 1 byte RndB Random Number B RndB' Random Number B rotated left over 1 byte RSA asymmetric cryptography RSAES-OAEP improved encryption/decryption scheme; based on the Optimal Asymmetric Encryption Padding scheme RSA-OAEP Asymmetric cryptography based on Optimal Asymmetric Encryption Padding for key agreement RSASSA-PSS improved probabilistic Signature Scheme with Appendix; based on the Probabilistic Signature Scheme SAC Secure Authenticated Channel SAK Select AcKnowledge SAM Secure Application Module MIFARE SAM AV2 One of the SAM use mode SEL Select Code SET Configuration Settings for KST Entry SHA- 256 Secure hash algorithm SHA-1 Secure hash algorithm SHA-224 Secure hash algorithm SL3 MIFARE Plus Security Level 3 SN Serial Number StoreReg Number of Register Value Set to be stored SW Status Word TDEA Triple Data Encryption Algorithm TRNG True random number generator UID Unique IDentifier Va Version of Key a Vb Version of Key b Vc Version of Key c WUPA Wake-Up Command, Type A XOR Exclusive OR All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 31 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 12. References [1] Data sheet -- P5DF081 MIFARE SAM AV2 BU-ID Doc. No. 1645** [2] Application Note -- MIFARE DESFire; Implementation hints and example, BU-ID Doc. No. 0945** [3] ISO 14443-3 -- ISO/IEC14443-3:2008 [4] ISO 14443-4 -- ISO/IEC14443-4:2008 [5] Data sheet -- MF1PLUSx0y1 Mainstream contactless smart card IC for fast and easy solution development, BL-ID Doc. No. 1637**1 [6] Data sheet -- MF1ICS50 Functional Specification, BU-ID Doc. No. 0010** [7] Data sheet -- MF1ICS20 Functional Specification, BU-ID Doc. No. 1322** [8] Data sheet -- MF1ICS70 Functional Specification, BU-ID Doc. No. 0435** [9] Data sheet -- MF3ICD81 MIFARE DESFire Functional Specification, BU-ID Doc. No. 1340** [10] Data sheet -- MF0ICU1 Functional Specification, BU-ID Doc. No. 0286** [11] Data sheet -- MF0ICU2 Functional Specification, BU-ID Doc. No. 1376** [12] DES -- Data Encryption Standard (DES), NIST FIPS PUB 46-3, October1999, http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf [13] User manual -- MF3ICD81 Guidance, Delivery and Operation Manual, BU-ID Doc No. 1469** [14] Wafer specification -- P5CD016/021/041 and P5Cx081 family, BU-ID Doc No. 1561** [15] PKCS1 -- PKCS #1 v2.1: RSA Cryptography Standard, RSA Laboratories, June 2002 [16] SHA -- FIPS 180-2: Secure Hash Standard (SHS) - Current version of the Secure Hash Standard (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512), 1 August 2002, amended 25 February 2004, FIPS Publication [17] ISO7816-2 -- ISO/IEC 7816-2:2002 [18] ISO7816-3 -- ISO/IEC 7816-3:2002 [19] ISO7816-4 -- ISO/IEC 7816-4:2004 [20] AES -- FIPS197 [21] ISO 10116 -- ISO/IEC 10116 block cipher [22] CMAC -- Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38B, May 2005, http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf [23] CMAC Errata -- Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, NIST Special Publication 800-38B, Errata, http://csrc.nist.gov/publications/nistpubs/800-38B/Updated_CMAC_Examples.pdf 1. ** ... document version number P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 32 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 [24] BC-Methods -- Recommendation for Block Cipher Modes of Operation - Methods and Techniques, NIST Special Publication 800-38A, December 2001, http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf [25] NIST Special Publication 800-38A -- Recommendation for Block Cipher Modes of Operation: Methods and Techniques, 2001. [26] NIST Special Publication 800-38B -- Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication [27] ISO/IEC Standard -- ISO/IEC 14443 Identification cards - Contactless integrated circuit cards - Proximity cards [28] Recommendation for Block Cipher Modes of Operation: Methods and Techniques -- FIPS PUB 197 ADVANCED ENCRYPTION STANDARD [29] ISO/IEC Standard -- ISO/IEC 9797-1 Information technology -- Security techniques - Message Authentication Codes (MACs) - Part 1: Mechanisms using a block cipher [30] AES -- Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, NIST Special Publication 800-67, May 2008, http://csrc.nist.gov/publications/nistpubs/800-67/SP800-67.pdf 13. Revision history Table 23: Revision history Document ID Release date Data sheet status Change notice Supersedes P5DF081_SDS v.3.2 20131217 Product short data sheet - P5DF081_SDS v.3.1 Modifications: P5DF081_SDS v.3.1 Modifications: P5DF081_SDS v.3.0 Modifications: P5DF081_SDS v.1.0 P5DF081_SDS Product short data sheet COMPANY PUBLIC * * Figure 3 "Pin configuration HVQFN32": Remark added Section 12 "References": updated 20121001 * - P5DF081_SDS v.3.0 - P5DF081_SDS v.1.0 Section 7.1 "Pinning": updated 20111018 * * * Product short data sheet Product short data sheet Section 1 "General description" and Section 5 "Ordering information": updated "RC522" updated with "RC52x or RC663" Data sheet status changed into "Product short data sheet" 20100812 Objective short data sheet - All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 - (c) NXP B.V. 2013. All rights reserved. 33 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 14. Legal information 14.1 Data sheet status Document status[1][2] Product status[3] Definition Objective [short] data sheet Development This document contains data from the objective specification for product development. Preliminary [short] data sheet Qualification This document contains data from the preliminary specification. Product [short] data sheet Production This document contains the product specification. [1] Please consult the most recently issued document before initiating or completing a design. [2] The term `short data sheet' is explained in section "Definitions". [3] The product status of device(s) described in this document may have changed since this document was published and may differ in case of multiple devices. The latest product status information is available on the Internet at URL http://www.nxp.com. 14.2 Definitions Draft -- The document is a draft version only. The content is still under internal review and subject to formal approval, which may result in modifications or additions. NXP Semiconductors does not give any representations or warranties as to the accuracy or completeness of information included herein and shall have no liability for the consequences of use of such information. Short data sheet -- A short data sheet is an extract from a full data sheet with the same product type number(s) and title. A short data sheet is intended for quick reference only and should not be relied upon to contain detailed and full information. For detailed and full information see the relevant full data sheet, which is available on request via the local NXP Semiconductors sales office. In case of any inconsistency or conflict with the short data sheet, the full data sheet shall prevail. Product specification -- The information and data provided in a Product data sheet shall define the specification of the product as agreed between NXP Semiconductors and its customer, unless NXP Semiconductors and customer have explicitly agreed otherwise in writing. In no event however, shall an agreement be valid in which the NXP Semiconductors product is deemed to offer functions and qualities beyond those described in the Product data sheet. 14.3 Disclaimers Limited warranty and liability -- Information in this document is believed to be accurate and reliable. However, NXP Semiconductors does not give any representations or warranties, expressed or implied, as to the accuracy or completeness of such information and shall have no liability for the consequences of use of such information. NXP Semiconductors takes no responsibility for the content in this document if provided by an information source outside of NXP Semiconductors. In no event shall NXP Semiconductors be liable for any indirect, incidental, punitive, special or consequential damages (including - without limitation - lost profits, lost savings, business interruption, costs related to the removal or replacement of any products or rework charges) whether or not such damages are based on tort (including negligence), warranty, breach of contract or any other legal theory. Notwithstanding any damages that customer might incur for any reason whatsoever, NXP Semiconductors' aggregate and cumulative liability towards customer for the products described herein shall be limited in accordance with the Terms and conditions of commercial sale of NXP Semiconductors. Right to make changes -- NXP Semiconductors reserves the right to make changes to information published in this document, including without limitation specifications and product descriptions, at any time and without notice. This document supersedes and replaces all information supplied prior to the publication hereof. P5DF081_SDS Product short data sheet COMPANY PUBLIC Suitability for use -- NXP Semiconductors products are not designed, authorized or warranted to be suitable for use in life support, life-critical or safety-critical systems or equipment, nor in applications where failure or malfunction of an NXP Semiconductors product can reasonably be expected to result in personal injury, death or severe property or environmental damage. NXP Semiconductors and its suppliers accept no liability for inclusion and/or use of NXP Semiconductors products in such equipment or applications and therefore such inclusion and/or use is at the customer's own risk. Applications -- Applications that are described herein for any of these products are for illustrative purposes only. NXP Semiconductors makes no representation or warranty that such applications will be suitable for the specified use without further testing or modification. Customers are responsible for the design and operation of their applications and products using NXP Semiconductors products, and NXP Semiconductors accepts no liability for any assistance with applications or customer product design. It is customer's sole responsibility to determine whether the NXP Semiconductors product is suitable and fit for the customer's applications and products planned, as well as for the planned application and use of customer's third party customer(s). Customers should provide appropriate design and operating safeguards to minimize the risks associated with their applications and products. NXP Semiconductors does not accept any liability related to any default, damage, costs or problem which is based on any weakness or default in the customer's applications or products, or the application or use by customer's third party customer(s). Customer is responsible for doing all necessary testing for the customer's applications and products using NXP Semiconductors products in order to avoid a default of the applications and the products or of the application or use by customer's third party customer(s). NXP does not accept any liability in this respect. Limiting values -- Stress above one or more limiting values (as defined in the Absolute Maximum Ratings System of IEC 60134) will cause permanent damage to the device. Limiting values are stress ratings only and (proper) operation of the device at these or any other conditions above those given in the Recommended operating conditions section (if present) or the Characteristics sections of this document is not warranted. Constant or repeated exposure to limiting values will permanently and irreversibly affect the quality and reliability of the device. Terms and conditions of commercial sale -- NXP Semiconductors products are sold subject to the general terms and conditions of commercial sale, as published at http://www.nxp.com/profile/terms, unless otherwise agreed in a valid written individual agreement. In case an individual agreement is concluded only the terms and conditions of the respective agreement shall apply. NXP Semiconductors hereby expressly objects to applying the customer's general terms and conditions with regard to the purchase of NXP Semiconductors products by customer. No offer to sell or license -- Nothing in this document may be interpreted or construed as an offer to sell products that is open for acceptance or the grant, conveyance or implication of any license under any copyrights, patents or other industrial or intellectual property rights. All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 34 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 Export control -- This document as well as the item(s) described herein may be subject to export control regulations. Export might require a prior authorization from competent authorities. Quick reference data -- The Quick reference data is an extract of the product data given in the Limiting values and Characteristics sections of this document, and as such is not complete, exhaustive or legally binding. 14.4 Licenses ICs with DPA Countermeasures functionality NXP ICs containing functionality implementing countermeasures to Differential Power Analysis and Simple Power Analysis are produced and sold under applicable license from Cryptography Research, Inc. Non-automotive qualified products -- Unless this data sheet expressly states that this specific NXP Semiconductors product is automotive qualified, the product is not suitable for automotive use. It is neither qualified nor tested in accordance with automotive testing or application requirements. NXP Semiconductors accepts no liability for inclusion and/or use of non-automotive qualified products in automotive equipment or applications. In the event that customer uses the product for design-in and use in automotive applications to automotive specifications and standards, customer (a) shall use the product without NXP Semiconductors' warranty of the product for such automotive applications, use and specifications, and (b) whenever customer uses the product for automotive applications beyond NXP Semiconductors' specifications such use shall be solely at customer's own risk, and (c) customer fully indemnifies NXP Semiconductors for any liability, damages or failed product claims resulting from customer design and use of the product for automotive applications beyond NXP Semiconductors' standard warranty and NXP Semiconductors' product specifications. 14.5 Trademarks Notice: All referenced brands, product names, service names and trademarks are the property of their respective owners. MIFARE -- is a trademark of NXP B.V. MIFARE Plus -- is a trademark of NXP B.V. MIFARE Ultralight -- is a trademark of NXP B.V. DESFire -- is a trademark of NXP B.V. SmartMX -- is a trademark of NXP B.V. 15. Contact information For more information, please visit: http://www.nxp.com For sales office addresses, please send an email to: salesaddresses@nxp.com P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 35 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 16. Tables Table 1. Table 2. Table 3. Table 4. Table 5. Table 6. Table 7. Table 8. Table 9. Table 10. Table 11. Table 12. Quick reference data . . . . . . . . . . . . . . . . . . . . .2 Ordering information . . . . . . . . . . . . . . . . . . . . .2 Pin description PCM 1.1 MIFARE SAM AV2 . . .5 Pin description HVQFN32 MIFARE SAM AV2 . .6 ATR after cold reset . . . . . . . . . . . . . . . . . . . . . .7 ATR after warm reset . . . . . . . . . . . . . . . . . . . . .8 SAM security and configuration commands . .15 SAM key management commands . . . . . . . . .17 Data processing commands . . . . . . . . . . . . . .18 Public Key Infrastructure (PKI) commands. . . .20 MIFARE Plus in non-X mode commands . . . . .21 MIFARE Classic in non-X-mode commands. . .22 Table 13. Table 14. Table 15. Table 16. Table 17. Table 18. Table 19. Table 20. Table 21. Table 22. Table 23: DESFire and ULC in non-X-mode commands . 22 RC522x or RC663 configuration commands . . 23 ISO14443 commands . . . . . . . . . . . . . . . . . . . 23 MIFARE Classic in X-mode commands . . . . . 24 MIFARE Plus in X-mode commands . . . . . . . . 26 DESFire and ULC in X-mode commands . . . . 27 Limiting values [1] . . . . . . . . . . . . . . . . . . . . . . . 28 Recommended operating conditions . . . . . . . 28 Electrical characteristics of IC supply voltage . 28 Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . 29 Revision history . . . . . . . . . . . . . . . . . . . . . . . . 33 17. Figures Fig 1. Fig 2. Fig 3. Block diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 Pin configuration PCM1.1 . . . . . . . . . . . . . . . . . . .5 Pin configuration HVQFN32 . . . . . . . . . . . . . . . . .5 P5DF081_SDS Product short data sheet COMPANY PUBLIC All information provided in this document is subject to legal disclaimers. Rev. 3.2 -- 17 December 2013 191732 (c) NXP B.V. 2013. All rights reserved. 36 of 37 P5DF081 NXP Semiconductors MIFARE secure access module SAM AV2 18. Contents 1 2 2.1 2.2 2.3 3 4 5 6 7 7.1 7.2 7.3 8 8.1 8.1.1 8.1.2 8.1.3 8.2 8.2.1 8.2.1.1 8.2.1.2 8.2.2 8.2.3 8.2.4 8.3 8.4 8.4.1 8.4.1.1 8.4.1.2 8.4.2 8.4.3 8.4.3.1 8.4.4 8.4.4.1 8.4.4.2 8.4.5 8.4.6 General description . . . . . . . . . . . . . . . . . . . . . . 1 Features and benefits . . . . . . . . . . . . . . . . . . . . 1 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Communication. . . . . . . . . . . . . . . . . . . . . . . . . 2 Delivery types . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Quick reference data . . . . . . . . . . . . . . . . . . . . . 2 Ordering information . . . . . . . . . . . . . . . . . . . . . 2 Block diagram . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Pinning information . . . . . . . . . . . . . . . . . . . . . . 5 Pinning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Pinning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Pin description . . . . . . . . . . . . . . . . . . . . . . . . . 5 Functional specification . . . . . . . . . . . . . . . . . . 7 Hardware interface . . . . . . . . . . . . . . . . . . . . . . 7 Contact interface. . . . . . . . . . . . . . . . . . . . . . . . 7 External clock frequency and bit rates . . . . . . . 7 Card operation procedures . . . . . . . . . . . . . . . . 7 Transmission procedure and communication . . 7 Protocol activation sequence . . . . . . . . . . . . . . 7 Answer To Reset (ATR) . . . . . . . . . . . . . . . . . . 7 Protocol and Parameter Selection (PPS exchange) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Protocol T = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . 9 APDU structure. . . . . . . . . . . . . . . . . . . . . . . . . 9 UID/serial number. . . . . . . . . . . . . . . . . . . . . . . 9 MIFARE SAM AV1 compatibility mode vs. MIFARE SAM AV2 mode . . . . . . . . . . . . . . . . . 9 Cryptography and key handling . . . . . . . . . . . 10 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . 10 Symmetric key cryptography . . . . . . . . . . . . . 10 DES and TDEA. . . . . . . . . . . . . . . . . . . . . . . . .10 AES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 AES MACing. . . . . . . . . . . . . . . . . . . . . . . . . . .10 MIFARE Classic . . . . . . . . . . . . . . . . . . . . . . . .10 Asymmetric key cryptography (MIFARE SAM AV2 mode only) . . . . . . . . . . . . . . . . . . . 10 Key diversification. . . . . . . . . . . . . . . . . . . . . . 11 Key Storage (MIFARE SAM AV1 compatibility mode) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Symmetric keys . . . . . . . . . . . . . . . . . . . . . . . 11 Key Storage (MIFARE SAM AV2 mode) . . . . . 12 Symmetric keys . . . . . . . . . . . . . . . . . . . . . . . 12 Asymmetric keys . . . . . . . . . . . . . . . . . . . . . . 12 Key versioning . . . . . . . . . . . . . . . . . . . . . . . . 13 Key usage counters . . . . . . . . . . . . . . . . . . . . 13 8.4.6.1 8.4.6.2 8.4.6.3 Reference number . . . . . . . . . . . . . . . . . . . . . Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Key reference number to change the current KUC entry . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.4.6.4 Key version to change the current KUC entry 8.4.6.5 Current value . . . . . . . . . . . . . . . . . . . . . . . . . 8.5 SAM - Host communication . . . . . . . . . . . . . . 8.5.1 General principles for SAM-Host protection. . 8.5.2 MIFARE SAM AV1 compatibility mode SAM-Host protection . . . . . . . . . . . . . . . . . . . 8.5.2.1 Increased security - CMAC calculation . . . . . 8.5.3 MIFARE SAM AV2 mode SAM-Host protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.6 MIFARE SAM AV2 command set. . . . . . . . . . 8.6.1 SAM security and configuration commands. . 8.6.2 SAM key management commands . . . . . . . . 8.6.3 Data processing commands . . . . . . . . . . . . . 8.6.4 Public Key Infrastructure (PKI) commands . . 8.6.5 MIFARE Plus in non-X-mode commands . . . 8.6.6 MIFARE Classic in non-X-mode commands . 8.6.7 DESFire and ULC in non-X-mode commands 8.6.8 RC52x or RC663 configuration commands . . 8.6.9 ISO14443 commands . . . . . . . . . . . . . . . . . . 8.6.10 MIFARE Classic in X-mode commands . . . . . 8.6.11 MIFARE Plus in X-mode commands . . . . . . . 8.6.12 DESFire and ULC in X-mode commands . . . 9 Limiting values . . . . . . . . . . . . . . . . . . . . . . . . 10 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . 11 Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . 12 References. . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Revision history . . . . . . . . . . . . . . . . . . . . . . . 14 Legal information . . . . . . . . . . . . . . . . . . . . . . 14.1 Data sheet status . . . . . . . . . . . . . . . . . . . . . . 14.2 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.3 Disclaimers . . . . . . . . . . . . . . . . . . . . . . . . . . 14.4 Licenses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14.5 Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contact information . . . . . . . . . . . . . . . . . . . . 16 Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 13 13 13 13 13 13 14 14 14 15 15 17 18 20 21 22 22 23 23 24 26 27 28 28 29 32 33 34 34 34 34 35 35 35 36 36 37 Please be aware that important notices concerning this document and the product(s) described herein, have been included in section `Legal information'. (c) NXP B.V. 2013. All rights reserved. For more information, please visit: http://www.nxp.com For sales office addresses, please send an email to: salesaddresses@nxp.com Date of release: 17 December 2013 191732