Citat:
Contactless smart cards are used in access control and pay-
ment systems. This paper illustrates an attack which effectively al
lows an attacker to ‘borrow’ the victim’s card for a short period without req
uiring physical access to the victim’s card. As a result the legitimat
e owner will remain unaware of the attack. We show that our hardware success-
fully executed a relay attack against an ISO 14443A contactless smart
card, up to a distance of 50 m.
ment systems. This paper illustrates an attack which effectively al
lows an attacker to ‘borrow’ the victim’s card for a short period without req
uiring physical access to the victim’s card. As a result the legitimat
e owner will remain unaware of the attack. We show that our hardware success-
fully executed a relay attack against an ISO 14443A contactless smart
card, up to a distance of 50 m.