Hi,
I'm running r94. I've been trying with two different readers now (ACL122U and
SCL3711) and three different series of cards. The basic symptom is that the
random generator in the card is still weak, but the attack doesn't progress
nevertheless; it seems MFCUK never gets to the point where it gets the 1/256
guess right and gets the NACK back. Example:
-----------------------------------------------------
Let me entertain you!
uid: <removed>
type: 08
key: 000000000000
block: 03
diff Nt: 144
auths: 92264
-----------------------------------------------------
With 92k auths and only 144 different Nts, every Nt should have _at least_ 638
attempts on it (in reality probably much more, as some Nt values are much more
common than others), which is above 256, and the attack should have succeeded
long ago as I understand it.
MFOC succeeds for the card where I have a known key, so the basics of my NFC
setup appears to be okay.
Has anyone seen this before?
Original issue reported on code.google.com by
sgunder...@bigfoot.comon 5 Jun 2014 at 8:31