Cloning Encrypted University ID
嗯,用户想让我帮他总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我需要理解这篇文章讲的是什么。 看起来这篇文章是关于如何克隆大学ID卡的。用户提到他想把ID卡的信息放进Apple钱包里,不是为了恶意用途。他提到卡片是加密的,不能直接复制原始信号。 文章中提到卡片有一个密钥K_card,读卡器发送一个随机数nonce,卡片计算V_card并返回,读卡器也计算V_scanner,如果两者相等,就说明密钥正确。用户不确定如何克隆这个握手过程,并猜测K_card是否是卡片上打印的数字之一。 所以总结一下,文章主要讨论了大学ID卡的加密机制以及如何克隆卡片的过程。用户想知道K_card是否容易获取,并且如果知道了这个密钥,是否能推断出密钥导出函数。 接下来我要把这些信息浓缩到100字以内。需要包括加密机制、K_card的作用、读卡器和卡片之间的验证过程、以及用户对克隆过程的疑问和可能的解决方案。 可能的结构:介绍主题(克隆大学ID卡),说明加密机制(K_card、nonce、V_card和V_scanner),以及用户的疑问(K_card是否容易获取)。 最后检查字数,确保不超过100字,并且语言简洁明了。 </think> 文章探讨了如何通过技术手段克隆大学ID卡,并分析了卡片加密机制及验证过程。作者推测卡片密钥可能与卡面信息相关,并考虑通过获取密钥来实现克隆。 2025-10-30 20:14:45 Author: www.reddit.com(查看原文) 阅读量:2 收藏

Hello, I am looking into how to clone my university ID (just to put my own in my Apple wallet, not for any malicious reasons). I believe that the card is encrypted so I can't just copy the raw output signal.

It is my understanding that there is a key encoded into the card K_card. Then, the reader sends some nonce to it. The card computes and returns (with some id info) V_card = KDF(K_card, nonce). Then, the scanner computes V_scanner = KDF(K_card, nonce). And if V_scanner = V_card, the card had the correct K_card.

I am, however, not sure how to best go about cloning this handshake. Somehow the main system learned the K_card. Is it possible that it is one of the numbers printed on the card itself, which the administrator just types into the system when initializing the card? If I knew that key, I imagine it wouldn't be hard to figure out the exact key derivation function.


文章来源: https://www.reddit.com/r/HowToHack/comments/1okaesa/cloning_encrypted_university_id/
如有侵权请联系:admin#unsafe.sh