MIFARE

From Infogalactic: the planetary knowledge core
Jump to: navigation, search

MIFARE is the NXP Semiconductors-owned trademark of a series of chips widely used in contactless smart cards and proximity cards.

The MIFARE name covers proprietary technologies based upon various levels of the ISO/IEC 14443 Type A 13.56 MHz contactless smart card standard. According to MIFARE themselves, 10 billion of their smart card chips and 150 million of their reader modules have been sold.[1] The technology is owned by NXP Semiconductors, which was spun off from Philips Electronics in 2006.

Variants

The technology is embodied in both cards and readers.

The MIFARE name (derived from the term MIkron FARE Collection System) covers seven different kinds of contactless cards:

MIFARE Classic 
Employs a proprietary protocol compliant to parts 1-3 of ISO/IEC 14443 Type A, with an NXP proprietary security protocol for authentication and ciphering.
MIFARE Classic EV1
MIFARE Ultralight
Low-cost ICs that employ a proprietary protocol compliant to ISO/IEC 14443-3 Type A. MIFARE Ultralight based tickets are ideal for high volume applications such as public transport, loyalty cards and event ticketing.
MIFARE Ultralight C
The first low-cost ICs for limited-use applications that offer the benefits of an open Triple DES cryptography. The MIFARE Ultralight C can act as a single trip mass transit ticket, event ticket, or low cost loyalty card, and are also used for device authentication.
MIFARE DESFire
Are smart cards that comply to ISO/IEC 14443-4 Type A with a mask-ROM operating system from NXP. The 'DES' in the name refers to the use of a DES, 2K3DES, 3K3DES and AES hardware cryptographic engine for securing transmission data; while 'Fire' is an acronym for 'Fast, innovative, reliable and enhanced'.
MIFARE DESFire EV1
Includes AES encryption. MIFARE DESFire EV1 delivers a balance of speed, performance and cost efficiency.
MIFARE DESFire EV2
The second evolution of our industry-leading MIFARE DESFire open architecture platform for smart cards offers superior performance, state-of-the-art security, privacy and enhanced multi-application support to enable new business models.
MIFARE Plus
Drop-in replacement for MIFARE Classic with certified security level (AES-128 based) and is fully backwards compatible with MIFARE Classic.
MIFARE SAM AV2
Secure access module that provides the secure storage of cryptographic keys and cryptographic functions.

MIFARE Classic

The MIFARE Classic card is fundamentally just a memory storage device, where the memory is divided into segments and blocks with simple security mechanisms for access control. They are ASIC-based and have limited computational power. Thanks to their reliability and low cost, those cards are widely used for electronic wallet, access control, corporate ID cards, transportation or stadium ticketing.

The MIFARE Classic 1K offers 1024 bytes of data storage, split into 16 sectors; each sector is protected by two different keys, called A and B. Each key can be programmed to allow operations such as reading, writing, increasing value blocks, etc. MIFARE Classic 4K offers 4096 bytes split into forty sectors, of which 32 are same size as in the 1K with eight more that are quadruple size sectors. MIFARE Classic mini offers 320 bytes split into five sectors. For each of these card types, 16 bytes per sector are reserved for the keys and access conditions and can not normally be used for user data. Also, the very first 16 bytes contain the serial number of the card and certain other manufacturer data and are read only. That brings the net storage capacity of these cards down to 752 bytes for MIFARE Classic 1K, 3440 bytes for MIFARE Classic 4K, and 224 bytes for Mini. It uses an NXP proprietary security protocol (Crypto-1) for authentication and ciphering.

The Samsung TecTile NFC tag stickers use MIFARE Classic chips. This means only devices with an NXP NFC controller chip can read or write these tags. At the moment BlackBerry phones, the Nokia Lumia 610 (August 2012[2]), the Google Nexus 4, Google Nexus 7 LTE and Nexus 10 (October 2013[3]) can't read/write TecTile stickers.

MIFARE Classic encryption has been compromised; see below for details.

MIFARE Ultralight and MIFARE Ultralight EV1

The MIFARE Ultralight has only 512 bits of memory (i.e. 64 bytes), without cryptographic security. The memory is provided in 16 pages of 4 bytes. Cards based on these chips are so inexpensive that they are often used for disposable tickets for events such as the Football World Cup 2006. It provides only basic security features such as one-time-programmable (OTP) bits and a write-lock feature to prevent re-writing of memory pages but does not include cryptography as applied in other MIFARE based cards.

MIFARE Ultralight EV[4] introduced in November 2012 the next generation of paper ticketing smart card IC for limited-use applications that offers solution developers and operators the maximum flexibility for their ticketing schemes and additional security options. It comes with several enhancements above the original MIFARE Ultralight

  • 384 and 1024 Bits user memory product variants
  • OTP, Lock Bits, configurable counters for improved security
  • Three independent 24-bit-one-way counters to stop reloading
  • Protected data access through 32-bit password
  • NXP Semiconductors originality signature function, this is an integrated originality checker and is an effective cloning protection that helps to prevent counterfeit of tickets. However this protection is applicable only to "mass penetration of non NXP originated chips and does not prevent hardware copy or emulation of a single existing valid chip"[5]

Key applications:

  • Limited-use tickets in public transport
  • Event ticketing (stadiums, exhibitions, leisure parks)
  • Loyalty

MIFARE Ultralight C

Introduced at the Cartes industry trade show in 2008, MIFARE Ultralight C is part of NXP's low-cost MIFARE offering (disposable ticket). With Triple DES, MIFARE Ultralight C uses a widely adopted standard, enabling easy integration in existing infrastructures. The integrated Triple DES authentication provides an effective countermeasure against cloning.

Key features:

  • Fully compliant with ISO/IEC 14443 parts 1-3, Type A (including anti-collision)
  • 1536 bits (192 bytes) EEPROM memory
  • Protected data access via 3-pass Triple DES authentication
  • Memory structure as in MIFARE Ultralight (pages of 4 byte)
  • Backwards compatibility to MIFARE Ultralight due to compatible command set
  • 16 bit one-way counter
  • Unique 7 byte serial number (UID)

Key applications for MIFARE Ultralight C are Public Transportation, Event Ticketing, Loyalty and NFC Forum Tag Type 2.

MIFARE DESFire

The MIFARE DESFire (MF3ICD40) was introduced in 2002 and is based on a core similar to SmartMX, with more hardware and software security features than MIFARE Classic. It comes pre-programmed with the general purpose MIFARE DESFire operating system which offers a simple directory structure and files. They are sold in four variants: one with Triple-DES only and 4 KB of storage, and three with AES (2, 4 or 8 KB; see MIFARE DESFire EV1). The AES variants have additional security features, e.g., CMAC. MIFARE DESFire uses a protocol compliant with ISO/IEC 14443-4.[6] The card is based on an 8051 processor with 3DES/AES crypto accelerator, making very fast transactions possible.

The maximal read/write distance between card and reader is 10 centimetres (3.9 in), but actual distance depends on the field power generated by the reader and its antenna size.

In 2010 NXP announced the discontinuation of the MIFARE DESFire (MF3ICD40) after it had introduced its successor MIFARE DESFire EV1 late 2008. In October 2011 researchers of Ruhr University Bochum[7] announced that they had broken the security of MIFARE DESFire (MF3ICD40), which was acknowledged by NXP.,[8] see DESFire Attacks

MIFARE DESFire EV1

(previously called DESFire8)

New evolution of MIFARE DESFire card, broadly backwards compatible. Available with 2 KB, 4 KB and 8 KB NV-Memory. Other features include:[9]

  • Support for random ID
  • Support for 128-bit AES
  • Hardware and Operating System is Common Criteria certified at level EAL 4+

MIFARE DESFire EV1 was publicly announced in November 2006.[citation needed]

Key applications:

  • Advanced public transportation
  • Access management
  • Loyalty
  • Micropayment

MIFARE DESFire EV2

New evolution of MIFARE DESFire card, broadly backwards compatible.[10] New features include:

  • MIsmartApp enabling to offer or sell memory space for additional applications of 3rd parties without the need to share secret keys
  • Transaction MAC to authenticate transactions by 3rd parties
  • Virtual Card Architecture for privacy protection
  • Proximity check against relay attacks

MIFARE DESFire EV2 was publicly announced in March 2016.

MIFARE Plus

MIFARE Plus is a replacement card for the MIFARE Classic. It provides an easy upgrade of existing infrastructures toward high security. Data management is identical to the MIFARE Classic; however, the security management requires the modification of the installed reader base. Other features include:

  • 2 Kbytes or 4 Kbytes of memory
  • 7 or 4 bytes UID, with optional support for random UID
  • Support for 128-bit AES
  • Common Criteria certified at level EAL 4+
  • MIFARE Plus S for simple migration or MIFARE Plus X with many eXpert commands
  • Security upgrade with cards in the field.

Key applications:

  • Public Transportation
  • Access management, e.g. employee, school or campus cards
  • Electronic toll collection
  • Car parking
  • Loyalty programs

It is less flexible than MIFARE DESFire EV1.

MIFARE Plus was publicly announced in March 2008 with first samples in Q1 2009.[11]

MIFARE Plus, when used in older transportation systems that do not yet support AES on the reader side, still leaves an open door to attacks. Though it helps to mitigate threats from attacks that broke the Crypto-1 cipher through the weak random number generator, it does not help against brute force attacks and cryptoanalytic attacks.[12] During the transition period from MIFARE Classic to MIFARE Plus where only a few readers might support AES in the first place, it offers an optional AES authentication in Security Level 1 (which is in fact MIFARE Classic operation). This does not prevent the attacks mentioned above but enables a secure mutual authentication between the reader and the card to prove that the card belongs to the system and is not fake. In its highest security level SL3, using 128-bit AES encryption, MIFARE Plus is secured from attacks.

MIFARE Plus EV1

MIFARE Plus EV1 was announced in April 2016.[13]

New features compared to MIFARE Plus X include:

  • Sector-wise security-level switching: the choice of crypto algorithm used in the authentication protocol can be set separately for each sector. This makes it possible to use the same card with both MIFARE Classic readers (with sectors protected by 48-bit CRYPTO1 keys, "Security Level 1") and MIFARE Plus readers (with sectors protected by 128-bit AES keys, "Security Level 3"). This feature is intended to make it easier to gradually migrate existing MIFARE Classic installations to MIFARE Plus, without having to replace all readers at the same time.
  • ISO 7816-4 wrapping: the card can now be accessed in either the traditional MIFARE protocol (which is not compliant with the ISO 7816-4 APDU format), or using a new protocol variant that runs on top of ISO 7816-4. This way the cards become compatible with NFC reader APIs that can only exchange messages in ISO 7816-4 APDU format, with a maximum transfer data buffer size of 256 bytes.
  • Proximity check: while the MIFARE Classic protocol tolerated message delays of several seconds, and was therefore vulnerable to relay attacks, MIFARE Plus EV1 now implements a basic "ISO compliant" distance-bounding protocol. This puts tighter timing constraints on the permitted round-trip delay during authentication, in order to make it harder to forward messages to far-away cards or readers via computer networks.
  • Secure end-2-end channel: permits AES-protected over-the-air updates even to Crypto1 application sectors (SL1SL3 mix mode).
  • Transaction MAC: the card can produce an additional message-authentication code over a transaction that can be verified by a remote clearing service, independent of the keys used by the local reader during the transaction.

MIFARE SAM AV2

MIFARE SAMs are not contactless smartcards. They are Secure access modules designed to provide the secure storage of cryptographic keys and cryptographic functions for terminals to access the MIFARE products securely and to enable secure communication between terminals and host (backend). MIFARE SAMs are available from NXP in the contact-only module (PCM 1.1) as defined in ISO/IEC 7816-2 and the HVQFN32 format.[citation needed]

Key features:

  • Compatible with MIFARE portfolio solutions
  • Supports MIFARE, 3DES and AES cryptography
  • Key diversification
  • Secure download and storage of keys
  • 128 key entries
  • ISO/IEC 7816 baud rate up to 1.5 Mbit/s
  • X-mode functionality

Integrating a MIFARE SAM AV2 in a contactless smart card reader enables a design which integrates high-end cryptography features and the support of crypto authentication and data encryption/decryption.[citation needed] Like any SAM, it offers functionality to store keys securely, and perform authentication and encryption of data between the contactless card and the SAM and the SAM towards the backend. Next to a classical SAM architecture the MIFARE SAM AV2 supports the X-mode which allows a fast and convenient contactless terminal development by connecting the SAM to the microcontroller and reader IC simultaneously.[citation needed]

MIFARE SAM AV2 offers AV1 mode and AV2 mode where in comparison to the SAM AV1 the AV2 version includes Public Key Infrastructure (PKI), Hash functions like SHA-1, SHA-224, and SHA-256. It supports MIFARE Plus and a secure host communication. Both modes provide the same communication interfaces, cryptographic algorithms (Triple-DES 112-bit and 168-bit key, MIFARE Crypto1, AES-128 and AES-192, RSA with up to 2048-bit keys), and X-mode functionalities.[citation needed]

Applications

MIFARE products can be used in different applications:[14]

<templatestyles src="Div col/styles.css"/>

  • Automated fare collection system
  • ID Cards
  • Access Management
  • Campus cards
  • Loyalty cards (reward points)
  • Tourist cards
  • Micropayment (Mobile wallet, contactless payment, cashless payment)
  • Road tolling
  • Transport ticketing
  • Event ticketing
  • Mobile ticketing
  • Citizen card
  • Membership cards
  • Parking
  • Library cards
  • Fuel cards
  • Hotel key cards
  • NFC Tag (NFC apps, MIFARE4Mobile)
  • Taxi cards
  • Smart meter
  • Museum Access Cards
  • Product Authentication
  • Production control
  • Health cards
  • Ferry Cards
  • Car rentals
  • Fleet Management
  • Amusement parks
  • Bike rentals
  • Blood donor cards
  • Information services
  • Interactive exhibits
  • Interactive lotteries
  • Password storage
  • Smart advertising
  • Social welfare
  • Waste management

Formerly most access systems used MIFARE Classic, but today these systems have switched to MIFARE DESFire because this product has more security than MIFARE Classic.

Byte Layout

Error creating thumbnail: File with dimensions greater than 25 MP
byte level layout of MiFare cards.

History

  • 1994 — MIFARE Classic 1K contactless technology introduced.
  • 1996 — First transport scheme in Seoul using MIFARE Classic 1K.
  • 1997 — MIFARE PRO with Triple DES coprocessor introduced.
  • 1999 — MIFARE PROX with PKI coprocessor introduced.
  • 2001 — MIFARE UltraLight introduced.
  • 2002 — MIFARE DESFire introduced, microprocessor based product.
  • 2004 — MIFARE DESFire SAM introduced, secure infrastructure counterpart of MIFARE DESFire.
  • 2006 — MIFARE DESFire EV1 is announced as the first product to support 128-bit AES
  • 2008 — MIFARE4Mobile industry Group is created, consisting of leading players in the Near Field Communication (NFC) ecosystem.
  • 2008 — MIFARE Plus is announced as a drop-in replacement for MIFARE Classic based on 128-bit AES
  • 2008 — MIFARE Ultralight C is introduced as paperticket IC featuring Triple DES Authentication
  • 2010 — MIFARE SAM AV2 is introduced as secure key storage for readers AES, Triple DES, PKI Authentication
  • 2012 — MIFARE Ultralight EV1 introduced, backwards compatible to MIFARE Ultralight but with extra security.
  • 2014 — MIFARE SDK was introduced, allowing developers to create and develop their own NFC Android applications.
  • 2014 — MIIFARE Smart MX2 the world’s first secure smart card platform with MIFARE Plus and MIFARE DESFire EV1 with EAL 50 was released
  • 2015 — MIFARE Plus SE the entry-level version of NXP’s proven and reliable MIFARE Plus product family was introduced.
  • 2016 — MIFARE Plus EV1 was introduced, the proven mainstream smart card product compatible with MIFARE Classic in its backward compatible security level
  • 2016 — MIFARE DESFire EV2 is announced with improved performance, security & privacy and multi-application support.

The MIFARE product portfolio was originally developed by Mikron in Gratkorn, Austria. Mikron was acquired by Philips in 1995.[15] Mikron sourced silicon from Atmel in the US, Philips in the Netherlands, and Siemens in Germany.[citation needed]

Infineon Technologies (then Siemens) licensed MIFARE Classic from Mikron in 1994[16] and developed both stand alone and integrated designs with MIFARE product functions. Infineon currently produces various derivatives based on MIFARE Classic including 1K memory (SLE66R35) and various microcontrollers (8 bit (SLE66 series), 16 bit (SLE7x series), and 32 bit (SLE97 series) with MIFARE emulations, including devices for use in USIM with Near Field Communication.[17]

Motorola tried to develop MIFARE-like chip for wired-logic version but finally gave up. The project expected one million cards per month for start, but that fell to 100,000 per month just before they gave up the project.[18]

In 1998 Philips licensed MIFARE Classic to Hitachi[19] Hitachi licensed MIFARE products for the development of the contactless smart card solution for NTT's IC telephone card which started in 1999 and finished in 2006.[citation needed] In the NTT contactless IC telephone card project, three parties joined: Tokin-Tamura-Siemens, Hitachi (Philips-contract for technical support), and Denso (Motorola-only production).[citation needed] NTT asked for two versions of chip, i.e. wired-logic chip (like MIFARE Classic) with small memory and big memory capacity. Hitachi developed only big memory version and cut part of the memory to fit for the small memory version.

The deal with Hitachi was upgraded in 2008 by NXP ( by then no longer part of Philips) to include MIFARE Plus and MIFARE DESFire to the renamed semiconductor division of Hitachi Renesas Technology.[20]

In 2010 NXP licensed MIFARE products to Gemalto. In 2011 NXP licensed Oberthur to use MIFARE products on SIM cards. In 2012 NXP signed an agreement with Giesecke & Devrient to integrate MIFARE applications on their secure SIM products. These licensees are developing Near Field Communication products[21][22]

Security of MIFARE Classic, MIFARE DESFire and MIFARE Ultralight

The encryption used by the MIFARE Classic card uses a 48 bit key.[23]

A presentation by Henryk Plötz and Karsten Nohl[24] at the Chaos Communication Congress in December 2007 described a partial reverse-engineering of the algorithm used in the MIFARE Classic chip. Abstract and slides[25] are available online. A paper that describes the process of reverse engineering this chip was published at the August 2008 USENIX security conference.[26]

In March 2008 the Digital Security[27] research group of the Radboud University Nijmegen made public that they performed a complete reverse-engineering and were able to clone and manipulate the contents of an OV-Chipkaart which is a MIFARE Classic card.[28] For demonstration they used the Proxmark device, a 125 kHz / 13.56 MHz research instrument.[29] The schematics and software are released under the free GNU General Public License by Jonathan Westhues in 2007. They demonstrate it is even possible to perform card-only attacks using just an ordinary stock-commercial NFC reader in combination with the libnfc library.

The Radboud University published three scientific papers concerning the security of the MIFARE Classic:

In response to these attacks, the Dutch Minister of the Interior and Kingdom Relations stated that they would investigate whether the introduction of the Dutch Rijkspas could be brought forward from Q4 of 2008.[30]

NXP tried to stop the publication of the second article by requesting a preliminary injunction. However, the injunction was denied, with the court noting that, "It should be considered that the publication of scientific studies carries a lot of weight in a democratic society, as does informing society about serious issues in the chip, because it allows for mitigating of the risks."[31][32]

Both independent research results are confirmed by the manufacturer NXP.[33] These attacks on the cards didn't stop the further introduction of the card as the only accepted card for all Dutch public transport the OV-chipkaart continued as nothing happened[34] but in October 2011 the company TLS, responsible for the OV-Chipkaart announced that the new version of the card will be better protected against fraud.[35]

The MIFARE Classic encryption Crypto-1 can be broken in about 200 seconds on a laptop,[36] if approx. 50 bits of known (or chosen) key stream are available. This attack reveals the key from sniffed transactions under certain (common) circumstances and/or allows an attacker to learn the key by challenging the reader device.

The attack proposed in[37] recovers the secret key in about 40 ms on a laptop. This attack requires just one (partial) authentication attempt with a legitimate reader.

Additionally there are a number of attacks that work directly on a card and without the help of a valid reader device.[38] These attacks have been acknowledged by NXP.[39] In April 2009 new and better card-only attack on MIFARE Classic has been found. It was first announced at the Rump session of Eurocrypt 2009.[40] This attack was presented at SECRYPT 2009.[41] The full description of this latest and fastest attack to date can also be found in the IACR preprint archive.[42] The new attack improves by a factor of more than 10 all previous card-only attacks on MIFARE Classic, has instant running time, and it does not require a costly precomputation. The new attack allows to recover the secret key of any sector of MIFARE Classic card via wireless interaction, within about 300 queries to the card. It can then be combined with the nested authentication attack in the Nijmegen Oakland paper to recover subsequent keys almost instantly. Both attacks combined and with the right hardware equipment such as Proxmark3, one should be able to clone any MIFARE Classic card in not more than 10 seconds. This is much faster than previously thought.

MIFARE DESFire Attacks

In November 2010, security researchers from the Ruhr University released a paper detailing a 'side channel' attack against MIFARE cards, including the DESFire EV and EV1 cards.[43] The paper demonstrated that DESFire cards could be easily cloned at a cost of approximately $25 in 'off the shelf' hardware. The authors asserted that this side channel attack allowed MIFARE cards to be cloned in approximately 100ms. Furthermore, the paper's authors included hardware schematics for their original cloning device, and have since made corresponding software, firmware and improved hardware schematics publicly available on GitHub.[44]

In October 2011 David Oswald and Christof Paar of Ruhr-University in Bochum, Germany, detailed how they were able to conduct a successful "side-channel" attack against the card using equipment that can built for nearly $3,000. called "Breaking MIFARE DESFire MF3ICD40: Power Analysis and Templates in the Real World,"[45] They stated that System integrators should be aware of the new security risks that arise from the presented attacks and can no longer rely on the mathematical security of the used 3DES cipher. Hence, in order to avoid, e.g. manipulation or cloning of smartcards used in payment or access control solutions, proper actions have to be taken: on the one hand, multi-level countermeasures in the backend allow to minimize the threat even if the underlying RFID platform is insecure," In a statement[46] NXP said that the attack would be difficult to replicate and that they had already planned to discontinue the card at the end of 2011. NXP also stated "Also, the impact of a successful attack depends on the end-to-end system security design of each individual infrastructure and whether diversified keys – recommended by NXP – are being used. If this is the case, a stolen or lost card can be disabled simply by the operator detecting the fraud and blacklisting the card, however this operation assumes that the operator has those mechanisms implemented. This will make it even harder to replicate the attack with a commercial purpose,"

MIFARE Ultralight Attack

In September 2012 a security consultancy Intrepidus[47] demonstrated at the EU SecWest event in Amsterdam,[48] that MIFARE Ultralight based fare cards in the New Jersey and San Francisco transit systems can be manipulated using an Android application, enabling travelers to reset their card balance and travel for free in a talk entitled "NFC For Free Rides and Rooms (on your phone)".[49] Although not a direct attack on the chip but rather the reloading of an unprotected register on the device, it allows hackers to replace value and show that the card is valid for use. This can be overcome by having a copy of the register online so that values can be analysed and suspect cards hotlisted. NXP have responded by pointing out that they had introduced the MIFARE Ultralight C in 2008 with 3DES protection and in November 2012 introduced the MIFARE Ultralight EV1[50] with three decrement only counters to foil such reloading attacks.

Considerations for systems integration

For systems based on contactless smartcards (e.g. public transportation), security against fraud relies on many components, of which the card is just one. Typically, to minimize costs, systems integrators will choose a relatively cheap card such as a MIFARE Classic and concentrate security efforts in the back office. Additional encryption on the card, transaction counters, and other methods known in cryptography are then employed to make cloned cards useless, or at least to enable the back office to detect a fraudulent card, and put it on a blacklist. Systems that work with online readers only (i.e., readers with a permanent link to the back office) are easier to protect than systems that have offline readers as well, for which real-time checks are not possible and blacklists cannot be updated as frequently.

Certification

Another aspect of fraud prevention and compatibility guarantee is the MIFARE Certificate called to life in 1998 ensuring the compatibility of several certified cards with multiple readers of MIFARE technology. With this certification, the main focus was placed on the contactless communication of the wireless interface, as well as to ensure proper implementation of all the commands of MIFARE cards and readers. The certification process was developed and carried out by the Austrian laboratory called Arsenal Research. Today Arsenal Testhouse performs the certification tests and provides the certified products in an online database.[51]

See also

Places that use MIFARE products

Transportation

Card name Locality Type Details
EYCON e-Bus Argentina (Bahía Blanca) MIFARE Classic 1K Initially for use in the local public transport for short and medium distances. However it is expected that in the card will be used for taxis, and furthermore purchase items in shops.
SUBE card Argentina (Buenos Aires) MIFARE Classic 1K Used for public transport- such as: Metro, trains and buses[52]
Red Bus Argentina (Córdoba, Mendoza, Salta) MIFARE Classic 1K For payment of public transport.
Tarjeta Sin Contacto Argentina (Rosario) MIFARE DESFire EV1 SAM V2[53] Means of payment for urban transport and as of 2015 payment for public bicycles.
Adelaide Metro metroCard Australia (Adelaide) MIFARE DESFire EV1 Adelaide Metro network (Bus, Train and Tram)[54]
TransLink Go card Australia (Brisbane) MIFARE Classic 1K Used on the TransLink public transport network.
ACTION MyWay Australia (Canberra) MIFARE Classic 1K Form of electronic ticketing used on public transport services within Canberra
Metro Green Card Australia (Hobart) MIFARE Classic 4 Greencard simplifies public transport by acting like a digital wallet. Used on buses and the metro.
SmartRider Australia (Perth) MIFARE Classic 1K Widely used across the Transperth public transport in metropolitan Perth, as well as the regional town bus services. Used for public bus, train and ferry services.
Opal card Australia (Sydney) MIFARE DESFire EV1 Is valid on all bus, rail, light rail and government ferry services in Sydney and surrounding areas such as Central Coast.
Myki Australia (Victoria) MIFARE DESFire Used on public transport such as, trains, buses, trams and coaches in Victoria
Baku metrocard Azerbaijan (Baku) MIFARE Classic 1K, MIFARE Plus S 1K[55] For use on the subway rides on the Baku Metro.
TRI Brazil (Porto Alegre) MIFARE Classic 1K Used for the buses and trains in Porto Alegre.
BHTrans Brazil (Belo Horizonte) MIFARE Classic 1K
RioCard Brazil (Rio de Janeiro) The RioCard can be used on all modes of public transport within Rio- bus, ferry, subway and train. However it can only be used a maximum of eight times a day
Bilhete Único Brazil (São Paulo) MIFARE Classic 1K Can be used on buses, rapid transit and the train.
Orovale Brazil (Teresopolis) Can be used on the buses for this area.
Carte Occasionnelle (STM, RTC), Carte Solo Canada (Montréal, Québec and Québec, Québec) MIFARE Ultralight SMT- Used on the bus, rapid transit, taxibus and paratransit in Montreal. RTC- used for bus servies, bus rapid transit and paratransit in Quebec. Carte Solo- used for the commuter rail and express bus service in Greater Montreal.
M-Card Canada (St. John's) MIFARE Classic 1K Used on the Metrobus Transit system.[56]
Presto Card Canada (Toronto, Ottawa and Hamilton, Ontario) MIFARE DESFire Used on various public transport systems in the greater Toronto and Hamilton Area and Ottawa. Buses, trains, rapid transit and streetcars
Compass Card Canada (Metro Vancouver) NXP's MIFARE DESFire EV1 4K, MIFARE Ultralight (single use)[57] Used for public transit (TransLink). $6 refundable deposit.[58]
Peggo Card Canada (Winnipeg) MIFARE DESFire EV1 4K Used on the Winnipeg Transit system.
Tarjeta Metroval[59] Chile (Valparaíso) MIFARE Classic 1K Valparaíso Metro uses a this card as unique payment method
Tarjeta Bip! Chile (Santiago de Chile) MIFARE Classic 1K and 4K (if bank bip or university bip are used) Metro de Santiago, Transantiago[60]
StrongLink China (Beijing)
Yikatong China (Beijing) Can be used on the subway, buses, taxis and in some cooperating retailers and restaurants. The card can also be used for Beijing’s bicycle sharing system
Yang Cheng Tong China (Guangzhou) Used on the metro, buses, taxis and ferries in Guangzhou and the surrounding areas.
Cívica Colombia (Medellin) Can be used for travel on the subway, cable cars, some bus routes and in the near future for the tram
BusCARD Croatia (Split) MIFARE Classic 1K Used for public transport
BuTra Croatia (Osijek) MIFARE Classic 1K Used by trams & buses and social ID identification
Rijeka City Card Croatia (Rijeka) MIFARE Classic 1K, MIFARE Ultralight Used by buses, parking spaces, libraries, museums...
ZET Card Croatia (Zagreb) MIFARE Classic 1K Can be used for travel on all public transport networks in Zagreb. Also entitles you to get discounts at over 150 locations such as the museum and zoo.
In Karta Czech republic (nationwide) MIFARE DESFire, MIFARE DESFire EV1 ,[61] Used for transport on trains, aimed at regular train users. Using the card enables 25% discount on fares.
Opencard Czech republic (Prague) MIFARE DESFire EV1 Used for travel on the public transport in Prague. As well as paid parking and libraries.
Lítačka Czech republic (Prague) MIFARE DESFire EV1 Successor of Opencard, used mostly for public transport in Prague, can be also used in municipal libraries. It cannot be used as electronic wallet - for parking - as its predecessor.
Pardubicka karta Czech republic (Pardubice) MIFARE Classic 4K Card is issued by DPMP a.s. (Transport company of Pardubice), can also be used as a ticket to local theatre, and used by many schools in Pardubice for student IDs.
Rejsekort Denmark MIFARE Classic 4K Can be used for travel on trains, buses and metro in Copenhagen.
Ühiskaart Estonia (Tallinn) MIFARE Classic Can be used for travel on trams, buses, trolleybuses in Tallinn, as well as other towns inside the country.
Bussikaart Estonia (Tartu) MIFARE Ultralight C Used for bus travel in Tartu. Works also in other locations around the country.
Matkakortti Finland (Helsinki) MIFARE DESFire Can be used with all forms of public transport systems within Helsinki Metropolitan Area.[62]
Metromoney Georgia (Tbilisi) MIFARE Classic 1K Used in municipal transport (metro, bus) and while traveling by Rike-Narikala ropeway.[63]
MTR City Saver Hong Kong MIFARE Ultralight C Older cards only. New cards use Sony FeliCa Lite-S.
Indian Railways India MIFARE DESFire Indian railways (five major cities)
Cardz Me India (Karnataka) Issued to students in the Indian state of Karnataka by Cardz Middle East
Metro/Bus Card Iran (Tehran, Isfahan) MIFARE Classic 1K Used for public transport, Metro and Bus - (Tehran Metro)
Man Card Iran (Mashhad) MIFARE DESFire EV1 Used for public transport (Metro and Bus) and low value payments (such as bakeries) - (Mashhad Metro)
SmartCard Ireland (Dublin) MIFARE Classic 1K Used for train transport for Iarnród Éireann
Leap card Ireland (Dublin) MIFARE DESFire EV1[64] replaces the individual Luas, Dart and Dublin Bus smartcards
Luas Smart-card Ireland (Dublin) MIFARE Classic being replaced by the Leap card
Dublin Bus Smart-card Ireland (Dublin) MIFARE Classic being replaced by the Leap card
DART Smart-card Ireland (Dublin) MIFARE Classic being replaced by the Leap card
AltoAdige/Südtirol Pass Italy (Trentino-Alto Adige/Südtirol) MIFARE DESFire EV1 Southern Tirol network (Bus, Train and Cable-cars)[65]
Etalons Latvia MIFARE Ultralight Can be used to pay fare for buses, trams and trolleybus.
Travel card Lithuania MIFARE Classic Introduced in summer of 2013
Touch N Go Malaysia Used for paying road tolls on the Expressway, fare of public transport, electronics parking and retail payments.
AT HOP card New Zealand (Auckland) MIFARE DESFire EV1 Introduced as the regional integrated ticketing card. The previous branded HOP card aka "Snapper/HOP" uses the JCOP standard and was phased out of use in Auckland in 2013.[66]
Kolumbuskort Norway (Rogaland) MIFARE DESFire EV1 Bus, Boat. http://www.kolumbus.no
Ruter reisekort Norway (Oslo and Akershus) MIFARE DESFire EV1 (MF3ICD41) Bus, boat, tram, subway and trains. Ruter and NSB
Białostocka Karta Miejska Poland (Białystok) MIFARE Classic 1K Used on buses
Krakowska Karta Miejska Poland (Kraków) MIFARE Classic 1K / MIFARE Plus 2K Used on trams and buses and as ID for Kraków City Bike system
Warszawska Karta Miejska Poland (Warsaw) MIFARE Classic 1K Used on buses, trams, subway and railroad
eBilet Poland (Gdynia) MIFARE Classic 1K Used on trolleybuses and buses
RATB Activ Romania (Bucharest) MIFARE Classic 1K Used on all public surface transportation and also available for subway
Moscow Metro Russia (Moscow) MIFARE Standard, MIFARE Ultralight, MIFARE Plus Disposable ticket, eWallet "TROIKA"
EMcard Slovakia MIFARE DESFire EV1 Used by almost every public transport system in Slovakia and some in Czech Republic. In most cases only referred to as BCK - Bezkontaktná cipová karta (contactless smart card)
Urbana Slovenia (Ljubljana) MIFARE DESFire EV1 Used by buses, parking spaces, libraries, museums, the Ljubljana Castle funicular, sports institutes and cultural events.[67]
Upass South Korea (Seoul/Metropolitan) Mifare Classic Used by Metro, bus, light metro, and airport link. Discontinued in 2014, replaced by T-money.
Daekyung Transport Card South Korea (Daegu) Mifare Classic Mainly used by Daegu Metro, Daegu bus and Gyeongsan bus. Discontinued in 2014 (except several Daegu Bank BC debit cards), replaced by Toppass/Onepass.
Consorcio de Transportes de Madrid Spain (Madrid) MIFARE DESFire EV1 MF3ICD41 Metro, trains and buses
Resekortet Sweden MIFARE Classic 1K[68] Travel ticket for buses and trains.
Skånetrafiken JoJo Sweden MIFARE Classic 1K Used for public transport in Skåne
Karlstadsbuss Sweden MIFARE Classic 4K Karlstadsbuss Resekort
SL Access Sweden MIFARE Classic 4K Stockholms lokaltrafik (Stockholm public transit)
Västtrafik Sweden MIFARE Classic 1K/4K, MIFARE Plus, MIFARE Ultralight Västtrafikkortet
EasyCard Taiwan MIFARE Classic, MIFARE Plus[69]
KGS Card Turkey MIFARE Classic 1K, MIFARE Plus 2K (in Classic compatibility mode) Toll Highways, KGS (acronym for Contactless Card Toll System)
Muzekart Turkey MIFARE Classic 1K, MIFARE Plus 2K Used as a museum pass for Istanbul’s various museums
Istanbulkart Turkey (Istanbul) MIFARE DESFire EV1 Buses, ferry boats, metro, light metro, trams and overground trains
İzmirimKart(2015) Turkey (Izmir) MiFare Plus & custom card securing Metro, bus, passenger ship
Iff card United Kingdom (Cardiff) MIFARE DESFire EV1 Used on Cardiff Bus services.
SmartTech Production Hong Kong NXP MIFARE Golden Partner[70]
Oyster card United Kingdom (London) MIFARE DESFire EV1 Migrated from MIFARE Classic to MIFARE DESFire EV1 in 2011[71]
EasyRider United Kingdom (Nottingham) Can be used as payment for buses or the tram on Nottingham City Transport
Breeze Card United States (Atlanta, Georgia) MIFARE Ultralight and MIFARE Classic Can be used as payment for MATRA Rapid Rail and MARTA Bus.
CharlieCard United States (Boston, Massachusetts) MBTA v. Anderson - Civil case related to the responsible disclosure of flaws in the system
METRO Q Card United States (Houston, Texas) MIFARE Classic 1K Used for payment of the METRORail, METROBus and METROLift.
Transit Access Pass United States (Los Angeles, California) MIFARE Plus - Security Level 1[72] Used as electronic ticketing for most public transport within Los Angeles County.
Go-To Card United States (Minneapolis, Minnesota) MIFARE Classic 1K
ConnectCard United States (Pittsburgh, Pennsylvania) MIFARE Classic
Clipper card United States (San Francisco Bay Area, California) MIFARE DESFire Replacing TransLink, which used a Motorola Card.[73]
PATH SmartLink United States (New York/New Jersey) MIFARE DESFire Used as a fare payment method on the PATH transit system in Newark.
Easy Card United States (South Florida, Florida) MIFARE Ultralight Used on Metrobus, Metrorail, Tri-Rail, City of Hialeah Transit, and Conchita Transit Express.
Compass Card United States (San Diego) MIFARE Classic 1K Used on buses, trolleys, Coaster and Sprinter trains in SDMTS and NCTD
SmarTrip United States (Washington Metropolitan Area, Washington, D.C.) MIFARE Plus X Used on the Washington Metropolitan Area Transit Authority and neighbouring transit systems; accepted on systems in Baltimore, Maryland
CharmCard United States (Baltimore, Maryland) MIFARE Plus X Used on the Maryland Transit Administration; accepted in Washington, D.C. systems
Rabbit Card Thailand MIFARE DESFire EV1 Used on BTS Skytrain, Bangkok BRT, restaurants, shops and cinemas that accept Rabbit Card
Smart Purse Thailand MIFARE Classic 1K Used on Metrobus (buses), 7-Eleven, shops and restaurants that accept Smart Purse
Bangkok Metro Smart card Thailand MIFARE Classic 1K Bangkok Metro

Application References

Application Application Category Project NXP Partner Locality Product Used Usecase
Automatic Fare Collection Smart Mobility Moscow Metro Smart Technologies Group Moscow MIFARE Ultralight Contactless smartcards for payment in the AFC System of the Moscow Metro[74]
Automatic Fare Collection Smart Mobility Touch N Go Kuala Lumpur Malaysian toll expressway and highway operators payment system
Campus card Multiapplication including access Ege Üniversitesi İzmir Mifare Classic Controlled-access campus entrance by these cards
Parking Smart Mobility NOL RTA Dubai MIFARE DESFire EV1 Multiapplication Card inter alia used for parking[75]
Parking Smart Mobility Pay on Foot system Skidata Ireland Used for cashless vending applications for parking[76]
Mobile Ticketing Access MIFARE4Mobile Gemalto, Giesecke & Devrient, Oberthur Technologies, STMicroelectronics MIFARE SmartMX Access to buildings through Smartphone[77]
Tourist Card Smart Mobility Mobilis Card Agencia Valenciana de Mobilidad (aVM) Valencia MIFARE SmartMX Tourist card, bike rental, electric car rental, transport ticketing, taxi card, access management and payment function[78]
Tourist Card Smart Mobility Oyster Card London MIFARE Classic 1K Used for public transport[74]
Fuel Card Smart Mobility Shell Plastkart Turkey MIFARE Classic 1K Loyalty Programs at petrol stations[79]
Fuel Card Smart Mobility Petrol Ofisi Plastkart Turkey MIFARE Classic 1K Loyalty Programs at petrol stations[80]
Taxi Card Smart Mobility Touch Travel Card Sri Lanka MIFARE DESFire EV1 payment solution in taxis[81]
Taxi Card Smart Mobility NOL RTA Dubai Muliapplication card also used for Taxi payment[82]
Ferry Card Smart Mobility Opal card Sydney MIFARE DESFire EV1 Card for Transport and Ferry services[74]
Car sharing Smart Mobility Car2Go Daimler MIFARE DESFire EV1 Used for Car sharing[83]
Bike rental Smart Mobility OV-fiets Netherlands Bike rental smartcard
Bike rental Smart Mobility Callock Bike rental[84]
Corporate Access Access Nestlé KABA MIFARE DESFire EV1 Access Security Solution[85]
Bike rental Smart Mobility Callock Bike rental[84]
Home Access Access AirKey EVVA MIFARE SmartMX Mobile Access[84]
Home Access Access Immobilienfirma Top-Invest sárl Salto Luxemburg MIFARE DESFire EV1 Smart Lock for Home Access[86]
Hotel Access Access Marriott Hotel Card KABA Hotel Access Card[87]
Campus card Access Campus Card University of Cambridge Salto Cambridge, UK MIFARE DESFire EV1 Multiapplication Campus Card[88]
Campus Card Access Campus Card University of Oxford Oxford, UK MIFARE DESFire EV1 4K Multiapplication Campus Card[89]
Event Ticketing Access FC Köln Payment Solutions Köln, Germany MIFARE DESFire EV1 Event ticketing application for soccer games[90]
Event Ticketing Access Ticket FIFA 2014 Brazil Event ticketing for Soccer WM[91]
Citizen Card Access National Entitlement Card (NEC) Scotland, UK MIFARE SmartMX 30 different services (identity, transport, financial and health-related services...)[92]
Library Card Access Berlin Dietrich-Bonhoeffer library Bibliotheca Berlin, Germany MIFARE DESFire EV1 Library ID[93]
Library Card Access City Library Reutlingen Germany MIFARE DESFire EV1 Cashless Payment for Library Fees[84]
Amusement Park Access Transdev Studio Bank Mega Makassar MIFARE DESFire EV1 Access,loyalty & Micro Payments[94]
Museum Card Access Müze Kart Mapikart, Türsab Istanbul, Turkey MIFARE Classic 1K Access to Museum[95]
Membership Card Loyalty Manchester City Football Club - Stadium Membership Card Gemalto Manchester Access, Loyalty, Membership, Payment function[96]
Loyalty Card Loyalty Rabbit Card – Carrot Rewards Bangkok, Thailand MIFARE DESFire EV1 Used for Transport, shops, restaurants, Identification, Access control, security and Carrot Reward[97][98]
Loyalty Card Loyalty Trans Studio Amusement Park Bank Mega Indonesia MIFARE DESFire EV1 Trans Studio Amusement Park[99]
NFC Tags NFC NFC Tag SMARTRAC NFC enabled Smartphones[100]
Health Card Identification European Health Insurance Card Europe JCOP Health and Identification Card[101]
Health Card Identification Sesam-Vitale card France MIFARE SmartMX Health and Identification Card[102]
Digital Signature Identification Vingcard Assa Abloy Digital Signature used for Access[103]
Micropayment Micropayment Yeldi Identiv India MIFARE DESFire EV1 Cashless payments via mobile phones[104]
Multiapplication Card Multiapplication Touch Travel Card Sri Lanka MIFARE DESFire EV1 ; MIFARE SAM AV2 Transport, Micropayment, Payment for Shops orTaxis, NFC Mobile Ticketing[81]
Multiapplication Card Multiapplication Passolig (TFF) E-Kart, E-Kent, Aktifbank Turkey JCOP; MIFARE DESFire EV1 Stadium Access - Ticketing, Micropayment, Payment, Transport[105]
Smart Paper Ticket Moscow Metropolitan Card Smart Technologies Group Moscow, Russia MIFARE Ultralight Used for electronic smart paper ticketing in public transport[106]
Banking Banking Touch Travel Card Sri Lanka MIFARE DESFire EV1 Payment Solution[107]

Institutions

References

  1. Lua error in package.lua at line 80: module 'strict' not found.
  2. Lua error in package.lua at line 80: module 'strict' not found.
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. [1][dead link]
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Some ISO/IEC 7816-4 commands are used by MIFARE DESFire EV1, including a proprietary method to wrap native MIFARE DESFire commands into a ISO/IEC 7816 APDU.
  7. Lua error in package.lua at line 80: module 'strict' not found.
  8. Lua error in package.lua at line 80: module 'strict' not found.[permanent dead link]
  9. http://www.gemalto.com/products/hybrid_card_body/download/DESFire_EV1_vs_DESFire.pdf
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. Lua error in package.lua at line 80: module 'strict' not found.
  13. Lua error in package.lua at line 80: module 'strict' not found.
  14. Lua error in package.lua at line 80: module 'strict' not found.[permanent dead link]
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. Lua error in package.lua at line 80: module 'strict' not found.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. [2] Archived December 6, 2010, at the Wayback Machine
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.[permanent dead link]
  24. Lua error in package.lua at line 80: module 'strict' not found.
  25. Lua error in package.lua at line 80: module 'strict' not found.
  26. Lua error in package.lua at line 80: module 'strict' not found.
  27. Lua error in package.lua at line 80: module 'strict' not found.
  28. Lua error in package.lua at line 80: module 'strict' not found.
  29. Lua error in package.lua at line 80: module 'strict' not found.
  30. Lua error in package.lua at line 80: module 'strict' not found.
  31. Lua error in package.lua at line 80: module 'strict' not found.
  32. Lua error in package.lua at line 80: module 'strict' not found.
  33. Lua error in package.lua at line 80: module 'strict' not found.
  34. [3] Archived June 8, 2012, at the Wayback Machine
  35. Lua error in package.lua at line 80: module 'strict' not found.
  36. Lua error in package.lua at line 80: module 'strict' not found.
  37. Lua error in package.lua at line 80: module 'strict' not found.
  38. Lua error in package.lua at line 80: module 'strict' not found.
  39. [4][dead link]
  40. Lua error in package.lua at line 80: module 'strict' not found.
  41. Lua error in package.lua at line 80: module 'strict' not found.
  42. Lua error in package.lua at line 80: module 'strict' not found.
  43. Lua error in package.lua at line 80: module 'strict' not found.
  44. Lua error in package.lua at line 80: module 'strict' not found.
  45. Lua error in package.lua at line 80: module 'strict' not found.
  46. [5][dead link]
  47. [6] Archived December 6, 2012, at the Wayback Machine
  48. Lua error in package.lua at line 80: module 'strict' not found.
  49. Lua error in package.lua at line 80: module 'strict' not found.
  50. [7][dead link]
  51. http://arsenal-testhouse.com/certified-mifare-products/
  52. Lua error in package.lua at line 80: module 'strict' not found.
  53. Lua error in package.lua at line 80: module 'strict' not found.
  54. [8] Archived July 4, 2012, at the Wayback Machine
  55. Lua error in package.lua at line 80: module 'strict' not found.
  56. [9] Archived March 6, 2012, at the Wayback Machine
  57. Lua error in package.lua at line 80: module 'strict' not found.
  58. Lua error in package.lua at line 80: module 'strict' not found.
  59. Lua error in package.lua at line 80: module 'strict' not found.
  60. Lua error in package.lua at line 80: module 'strict' not found.
  61. Lua error in package.lua at line 80: module 'strict' not found.
  62. [10] Archived December 29, 2011, at the Wayback Machine
  63. Lua error in package.lua at line 80: module 'strict' not found.
  64. Lua error in package.lua at line 80: module 'strict' not found.
  65. Lua error in package.lua at line 80: module 'strict' not found.
  66. [11] Archived February 21, 2014, at the Wayback Machine
  67. [12] Archived June 28, 2012, at the Wayback Machine
  68. Lua error in package.lua at line 80: module 'strict' not found.
  69. Lua error in package.lua at line 80: module 'strict' not found.
  70. Lua error in package.lua at line 80: module 'strict' not found.
  71. Lua error in package.lua at line 80: module 'strict' not found.
  72. Lua error in package.lua at line 80: module 'strict' not found.
  73. Lua error in package.lua at line 80: module 'strict' not found.
  74. 74.0 74.1 74.2 Lua error in package.lua at line 80: module 'strict' not found.
  75. Lua error in package.lua at line 80: module 'strict' not found.
  76. Lua error in package.lua at line 80: module 'strict' not found.
  77. Lua error in package.lua at line 80: module 'strict' not found.
  78. Lua error in package.lua at line 80: module 'strict' not found.
  79. Lua error in package.lua at line 80: module 'strict' not found.
  80. Lua error in package.lua at line 80: module 'strict' not found.
  81. 81.0 81.1 Lua error in package.lua at line 80: module 'strict' not found.
  82. Lua error in package.lua at line 80: module 'strict' not found.
  83. Lua error in package.lua at line 80: module 'strict' not found.
  84. 84.0 84.1 84.2 84.3 [13] Archived May 28, 2014, at the Wayback Machine
  85. Lua error in package.lua at line 80: module 'strict' not found.
  86. [14][dead link]
  87. Lua error in package.lua at line 80: module 'strict' not found.
  88. Lua error in package.lua at line 80: module 'strict' not found.
  89. [15] Archived May 28, 2014, at the Wayback Machine
  90. Lua error in package.lua at line 80: module 'strict' not found.
  91. Lua error in package.lua at line 80: module 'strict' not found.
  92. Lua error in package.lua at line 80: module 'strict' not found.
  93. Lua error in package.lua at line 80: module 'strict' not found.
  94. Lua error in package.lua at line 80: module 'strict' not found.
  95. Lua error in package.lua at line 80: module 'strict' not found.
  96. Lua error in package.lua at line 80: module 'strict' not found.
  97. Lua error in package.lua at line 80: module 'strict' not found.
  98. Lua error in package.lua at line 80: module 'strict' not found.
  99. Lua error in package.lua at line 80: module 'strict' not found.
  100. [16] Archived March 30, 2014, at the Wayback Machine
  101. [17][dead link]
  102. [18] Archived May 27, 2014, at the Wayback Machine
  103. Lua error in package.lua at line 80: module 'strict' not found.
  104. Lua error in package.lua at line 80: module 'strict' not found.
  105. Lua error in package.lua at line 80: module 'strict' not found.
  106. Lua error in package.lua at line 80: module 'strict' not found.
  107. Lua error in package.lua at line 80: module 'strict' not found.
  108. Lua error in package.lua at line 80: module 'strict' not found.
  109. Lua error in package.lua at line 80: module 'strict' not found.
  110. Lua error in package.lua at line 80: module 'strict' not found.

Further reading

External links