BREAKMEIFYOUCAN! - Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies

11 min read Original article ↗

This paper presents an in-depth analysis of vulnerabilities in MIFARE Ultralight C, MIFARE Ultralight AES, NTAG 223 DNA, NTAG 224 DNA, and widely circulated non-NXP Ultralight C compatible cards. We reveal multiple avenues to substantially weaken the security of each technology across a range of configurations.

Through relay-based man-in-the-middle techniques and partial key overwrites—optionally combined with EEPROM tearing techniques—an attacker can reduce the keyspace of two-key Triple DES (2TDEA) from 2112 to 228 or less in certain real-world deployments, making brute-force key recovery feasible with modest computational resources.

We further demonstrate how MIFARE Ultralight AES can be similarly affected when CMAC integrity checks are not enforced. The security of NTAG 223/224 DNA is undermined by the absence of integrity checks and the calculation of CMAC over Secure Unique NFC (SUN) messages, providing an unauthenticated ciphertext oracle that facilitates key recovery from a single tag.

The following NXP products and non-NXP compatible ICs are affected:

MIFARE Ultralight CMF0ICU2

MIFARE Ultralight AESMF0AES

NTAG 223 DNANT2H2331G0 / NT2H2331S0

NTAG 224 DNANT2H2421G0 / NT2H2421S0

Giantec GT23SC4489Non-NXP UL-C

Feiju FJ8010Non-NXP UL-C

USCUID-ULNon-NXP UL-C

2112

Original Keyspace

Two-key 3DES

228

Reduced Keyspace

After partial overwrite

<1m

Non-NXP Recovery

Single card, full key

For genuine NXP Ultralight C: Using partial key overwrite across multiple tags sharing a static key, full 112-bit 2TDEA key recovery is achievable in days to weeks depending on available hardware and number of tags.

For non-NXP cards (ULCG, FJ8010, USCUID-UL): Flawed PRNGs and missing anti-tearing mechanisms enable complete key recovery from a single card in under 60 seconds—even on a mobile phone.

For NTAG 223/224 DNA: The SUNCMAC_KEY can be recovered from a single tag in under a minute via partial key overwrite combined with offline CMAC brute-force against collected SUN messages.

  • Partial Key Overwrite Attack: Enables attackers with authenticated access to reduce key-recovery brute-force workload against 2TDEA and AES-128 keys given multiple source tags using the same key.
  • Theoretical Single-Tag Recovery: Method to recover the full 112-bit 2TDEA key from a single NXP Ultralight C tag in specific configurations, applicable even with diversified keys.
  • NTAG 22x DNA Attack: Partial key overwrite and tearing techniques applied to AES-128 protected NTAG 22x DNA, enabling significantly faster offline CMAC brute-force for recovering the SUN message authentication key.
  • Non-NXP Card Analysis: First systematic analysis of widespread non-NXP Ultralight C compatible cards, demonstrating implementation flaws (predictable PRNGs, absent anti-tearing) allowing near-instantaneous key recovery.
  • Real-World Deployment Survey: Empirical data from hospitality and other deployments showing configuration lapses around key diversification, lock bytes, and integrity mechanisms.

General

What is this research about?

This research demonstrates vulnerabilities in widely deployed NFC technologies used for access control, ticketing, and hospitality. We show that cryptographic keys protecting MIFARE Ultralight C, MIFARE Ultralight AES, and NTAG 223/224 DNA tags can be recovered through a combination of relay attacks, partial key overwrites, and EEPROM manipulation techniques.

The core issue is that these tags lack adequate post-authentication integrity protection, and many deployments fail to properly configure available security features like lock bytes and key diversification.

Is this a flaw in the cryptography itself?

No. The underlying cryptographic algorithms (3DES and AES-128) remain secure. The vulnerabilities arise from:

  • Protocol design choices that allow unauthenticated memory writes after initial authentication
  • Lack of atomicity when writing cryptographic keys across multiple memory pages
  • Widespread misconfiguration in real-world deployments (unlocked memory, static keys)
  • Non-NXP compatible chips with severely flawed random number generators

Has this been responsibly disclosed?

Yes. We initiated contact with NXP Semiconductors in July 2025 and provided them with a complete draft of our findings. NXP confirmed the findings in August 2025 and requested additional time for product recertification. We coordinated the publication timeline with NXP, balancing their recertification needs with the importance of informing the security community and affected parties.

Why is the paper titled "BREAKMEIFYOUCAN!"?

The title comes directly from the default factory key programmed into every MIFARE Ultralight C chip by NXP. When you read the 16-byte 3DES key from a fresh Ultralight C tag, it spells out the ASCII string BREAKMEIFYOUCAN!.

This appears to be a deliberately playful challenge left by NXP's engineers in 2008 for the security research community, and embedded directly in the Ultralight C's memory. We chose the paper's title to reflect this challenge, having demonstrated multiple practical attacks.

Of course, in any properly configured deployment, this default key should be replaced with a unique, securely generated key before deployment.

Am I Affected?

I'm a hotel guest. Should I be concerned about my room key?

The risk to individual hotel guests is generally low for opportunistic attacks. These attacks require specialized equipment and technical knowledge. However, our research did demonstrate a successful credential forgery attack against a real hospitality system using a discarded room key.

Practical advice:

  • Don't leave your key card unattended for extended periods
  • Don't discard key cards in publicly accessible areas near the hotel
  • Report lost cards immediately so they can be deactivated
  • Use in-room safes and additional door locks when available

I operate a hotel or access control system using these technologies. Am I affected?

Likely yes, to some degree. Our survey found that 100% of MIFARE Ultralight C systems examined were affected by one or more issues. The severity depends on your configuration:

  • High risk: Static keys shared across all cards, unlocked key memory pages, non-NXP compatible cards in your supply chain
  • Medium risk: Key diversification implemented but lock bytes not configured, CMAC not enabled on Ultralight AES
  • Lower risk: Proper key diversification, locked memory pages, verified genuine NXP chips, CMAC enabled (for Ultralight AES)

We strongly recommend auditing your deployment against the mitigations listed below.

Does this affect public transit systems?

Some transit systems use MIFARE Ultralight C for limited-use tickets. If your system uses static keys and doesn't lock key memory pages, it could be vulnerable to the multi-tag key recovery attack. However, transit systems often have backend validation that may limit the practical impact.

Systems using MIFARE DESFire or other more advanced technologies are not affected by this specific research.

Are counterfeit/non-NXP cards in my supply chain?

Our sampling found that approximately 34% of cards from hospitality deployments were not genuine NXP products. Non-NXP compatible cards (like Giantec GT23SC4489 "ULCG", Feiju FJ8010, or USCUID-UL) have severely flawed random number generators that allow key recovery from a single card in under 60 seconds.

How to check:

  • Use hf mfu info from the latest Proxmark3 firmware, which integrates fingerprinting for all counterfeit cards mentioned in the paper
  • ULCG cards can be quickly identified by their UID suffix ending in 1589
  • See details in our paper and other fingerprinting tools available in our GitHub repository for deeper inspection
  • Audit your supply chain and verify card sources

What about MIFARE DESFire, MIFARE Classic, or other NFC technologies?

MIFARE DESFire: Not affected by this research. DESFire provides end-to-end encrypted sessions with integrity protection and is recommended as an upgrade path.

MIFARE Classic and MIFARE Plus: Not in scope for this paper, but MIFARE Classic has its own well-documented vulnerabilities (Crypto1 weaknesses) which are mitigated in MIFARE Plus, provided it is properly configured.

ICODE DNA, UCODE DNA, NTAG 424 DNA: We examined these briefly. NTAG 424 DNA appears to require authentication before key modification, which mitigates the partial key overwrite attack. See the full paper for details.

What Should I Do?

What immediate steps should system operators take?

1. Audit your current deployment:

  • Check if lock bytes are configured on key pages (Lock byte 3, bit 7 for Ultralight C)
  • Verify whether you're using static or diversified keys
  • Test sample cards for non-NXP compatible chips
  • For Ultralight AES: check if SEC_MSG_ACT is enabled

2. For new card issuance:

  • Implement key diversification using UID and a site-specific salt
  • Permanently lock key memory pages after personalization
  • Enable authentication attempt limits where available
  • Verify genuine NXP chips before deployment

3. For existing deployments with static keys:

  • If key pages can still be locked, do so immediately
  • Plan migration to diversified keys or more secure technology
  • Implement additional backend validation where possible

Can existing cards be patched or fixed?

Partially. If the key memory pages and configuration bytes are not yet locked, you can:

  • Lock the key pages to prevent the partial key overwrite attack
  • Enable AUTH_LIM on Ultralight AES to limit brute-force attempts

However: If you're using static keys across your deployment, locking the pages only prevents new attacks—it doesn't change the fact that an attacker with enough cards could still recover the key through other means. Migration to diversified keys is the proper long-term solution.

For non-NXP compatible cards: These cannot be meaningfully secured and should be replaced with genuine NXP products.

What's the recommended migration path for high-security applications?

For applications requiring higher security assurance, we recommend migrating to MIFARE DESFire EV3 or similar advanced contactless smart card technologies. These provide:

  • End-to-end encrypted communication sessions
  • Mandatory integrity protection (not optional)
  • Hardware-level countermeasures against tearing and manipulation
  • Secure key storage with proper atomicity guarantees

While Ultralight AES is an improvement over Ultralight C, its security still depends heavily on proper configuration, whereas DESFire provides stronger security by default.

Technical Details

How does the partial key overwrite attack work?

MIFARE Ultralight C stores its 112-bit 2TDEA key across four 4-byte memory pages (pages 44-47). The tag's firmware doesn't enforce atomic writes across all four pages—each page can be written independently.

After gaining authenticated access via a relay attack, an attacker can:

  • Overwrite three of the four key pages with known values (e.g., zeros)
  • Brute-force the remaining 28 bits (~228 possibilities)
  • Repeat on different tags, targeting different key quarters each time
  • Combine the four recovered segments to reconstruct the full key

This reduces the attack complexity from 2112 to roughly 4 × 228, making it feasible with modest hardware.

Why does the relay attack work if there's mutual authentication?

The mutual authentication in Ultralight C does work correctly—both the reader and tag prove they know the shared secret. The problem is what happens after authentication.

Unlike MIFARE DESFire, Ultralight C has no post-authentication integrity protection. All commands after authentication are sent in plaintext without any MAC or encryption. An attacker who relays the authentication exchange can then inject their own commands to the now-authenticated tag.

Crucially, the tag has no timing constraints—it will wait indefinitely for the reader's response during authentication, eliminating the tight timing windows that normally make relay attacks difficult.

What equipment is needed to perform these attacks?

The attacks can be performed with relatively inexpensive, commercially available hardware:

  • Relay attack: Two Flipper Zero devices communicating over 433 MHz, or Proxmark3 devices
  • Online brute-force: Proxmark3 or Flipper Zero (~100 auth attempts/second)
  • Offline computation: Standard laptop (for non-NXP cards) or GPU cluster (for 2-tag variant on genuine cards)
  • Tearing attacks: Proxmark3 with precise timing, or even Flipper Zero with busy-loop timing

Total equipment cost is well under $500, and the techniques are within reach of moderately skilled attackers.

Where can I find the proof-of-concept tools?

All tools and scripts are available on GitHub at github.com/zc-public/breakme-resources. Relevant code has also been contributed to:

  • Proxmark3 firmware repository
  • Flipper Zero firmware (version 1.4.0+)
  • ChameleonUltra firmware

The tools include key recovery scripts, fingerprinting utilities, and optimized brute-force implementations.

  • Enable CMAC integrity verification on all AES-protected communications (SEC_MSG_ACT for Ultralight AES)
  • Implement key diversification using card UID and a site-specific key or salt as input to a secure KDF
  • Lock critical memory pages including key pages, AUTH0, and configuration bytes to prevent modification
  • Enable authentication attempt counters (AUTH_LIM) where available and lock the configuration
  • Verify supply chain integrity and replace non-NXP compatible cards with genuine NXP products where security is required
  • Store CMAC over critical data including UID and hardware counters for technologies without secure messaging
  • Consider migration to MIFARE DESFire EV3 or similar technologies with end-to-end encryption and hardware-level countermeasures

2025-07-23

Initiated contact with NXP; NXP acknowledged initial contact

2025-07-24

Sent draft of vulnerability report to NXP; NXP acknowledged receipt

2025-08-05

NXP confirmed findings and requested changes to draft

2025-08-12

Acknowledged feedback, shared research updates, requested NTAG-22x sample sources

2025-10-20

Delivered second draft of vulnerability report; requested publication timeline

2025-11-03

NXP indicated additional time needed for recertification

2025-12-01

NXP requested disclosure delay to Q2 2026 for product recertification

2025-12-08

Anticipated publication date communicated to NXP; disclosure timeline scoped to customer risk mitigation

2026-01-25

Paper and Proof-of-Concept exploits published

The full technical paper is available on ePrint. Proof-of-concept tools and supporting materials are published on GitHub, with relevant code contributed to the Proxmark3, Flipper Zero, and ChameleonUltra firmware repositories.