RFID / NFC

From building access and transit cards to smart posters and contactless pairing, RFID and NFC are everywhere. This page covers fundamentals, research workflows, and practical hardening tips—used only with permission.

Quick-start checklist

  1. Authorization: Only assess tags/readers you own or for which you have explicit written permission.
  2. Identify frequency: Determine LF (125/134.2 kHz) vs HF (13.56 MHz). LF is common in legacy access badges; HF covers NFC (Type 1–5, MIFARE, etc.).
  3. Determine tag type: Simple ID-only (EM4100, HID Prox) vs. secure memory (MIFARE DESFire EVx, iCLASS SE, etc.).
  4. Plan tests: Start with non-invasive reads and metadata; log UIDs/ATQA/SAK/tech lists; avoid writing until you understand memory layout and access control.
  5. Environment: Avoid reading random people’s cards or causing denial-of-service at doors/turnstiles. Keep it to your lab.

RFID/NFC primer

RFID and NFC use inductive coupling between a reader and a passive tag. The reader energizes the tag, which responds with modulated data. Systems vary in frequency, encoding, and security features.

Common families:
  • LF (125/134.2 kHz): EM4100/EM41xx, HID Prox, FDX-B (animal ID). Usually UID-only and unauthenticated.
  • HF (13.56 MHz): ISO14443 A/B (MIFARE Classic, Ultralight/NTAG, DESFire), ISO15693 (iCode, Tag-it), NFC Forum Types 1–5.
Reader Field energizes tag Tag Backscatter modulates data Energize & command UID/data response
Reader powers tag; tag backscatters data. Security varies by tag family.

UIDs & anti-collision: Many systems identify tags by a unique identifier (UID). Readers use anti-collision to select one tag in a field of many. Secure HF tags additionally support authenticated sessions, encrypted files, and fine-grained access keys.

Common research workflows

1) Non-invasive inventory (what is this tag?)

2) Read & emulate (lab with authorized tags)

3) Secure tag assessment (authorized)

4) Reader-side behavior & migration planning

5) NFC app interactions (UX & safety)

Important: Avoid cloning/emulating real production credentials or payments. Keep work to lab tags/test badges that you control, with written authorization for any enterprise system.

Hardening & defense notes

Troubleshooting

FAQ

Is NFC the same as RFID?

NFC is a subset of HF RFID with standardized device roles and data formats (NDEF). All NFC is RFID, but not all RFID is NFC.

Can I “clone any card”?

No. Some legacy LF/HF tags without crypto can be trivially copied, but secure HF families (e.g., DESFire EVx) use strong cryptography and per-application keys. Always follow the law and your engagement scope.

Do UIDs guarantee uniqueness and security?

UIDs help identify tags but don’t imply security. Some tags use random or changeable UIDs; some readers accept any UID. Security depends on cryptographic protocols and reader/backend checks.

What about payments or transit systems?

These often involve additional cryptography, backend risk controls, and legal restrictions. Do not attempt to assess such systems without explicit authorization and a formal scope.

Devices for RFID/NFC

Useful references

Legal & ethics: See Ethics for permission boundaries and safe lab guidelines.