NFC Chips Compared

Selection criteria for hardware

NFC Chip Comparison Guide

Choosing the right nfc-chip determines your project's memory capacity, security posture, read range, and unit cost. The market is dominated by three families — NTAG, MIFARE Classic, and MIFARE DESFire — each with distinct architectural tradeoffs.

Chip Families Overview

NTAG (NXP Semiconductors) — The consumer workhorse. NTAG chips follow NFC Forum Type 2, use a simple flat eeprom layout, and are certified by the NFC Forum. Memory ranges from 144 bytes (NTAG213) to 888 bytes (NTAG216). Security is limited to a 32-bit password and lock-bits. NTAG DNA and NTAG 424 add aes-encryption and sdm (Secure Dynamic Messaging).

MIFARE Classic (NXP) — The legacy incumbent. Still the most-deployed NFC chip globally (billions shipped), but uses the proprietary crypto-1 cipher which has been publicly broken since 2008. Not NFC Forum certified. Avoid for new secure applications; use for legacy interoperability only.

MIFARE DESFire EV3 (NXP) — The security standard. ISO 14443-4 compliant (NFC Forum Type 4), AES-128/192/256 and des-3des, per-file access-control-bits, mutual-authentication, and originality-signature verification. The chip of choice for physical access control, transport, and government ID.

ICODE (NXP) / ST25 (STMicroelectronics)ISO 15693 (nfc-v) chips for supply chain and item tracking. Longer read range, lower data rates.

NTAG vs MIFARE vs DESFire Comparison

Feature NTAG213 NTAG216 MIFARE Classic 1K DESFire EV3 4K
NFC Forum type Type 2 Type 2 None Type 4
total-memory 180 B 924 B 1024 B 4096 B
user-memory 137 B 868 B ~752 B ~4000 B
Security 32-bit pwd 32-bit pwd Crypto-1 (broken) AES-128/256
data-retention 10 years 10 years 10 years 10 years
write-endurance 100K cycles 100K cycles 100K cycles 500K cycles
Anti-clone No No No Yes (sig)
Unit cost (volume) $0.05 $0.10 $0.08 $0.60
Typical use URLs, Wi-Fi Large payloads Legacy transit Access control

NTAG DNA and Secure Tags

NTAG 424 DNA introduces sun-message (Secure Unique NFC Message) — the tag generates an AES-CMAC over a counter and UID, appended to the URL on every tap. The backend validates the CMAC, making each tap cryptographically unique and defeating replay attacks. This replaces the anti-cloning gap in standard NTAG chips. See NFC Security: Authentication and Anti-Cloning for implementation details.

Selection Criteria

Requirement Recommended Chip
Lowest cost, simple URL NTAG213
Wi-Fi credentials or vCard NTAG215/216
Secure authentication DESFire EV3 or NTAG 424 DNA
Supply chain / long-range ICODE SLIX2 or ST25TV
Legacy system compatibility MIFARE Classic (read-only upgrade)
On-metal mounting on-metal-tag variants (boosted antenna)

Use the NFC Chip Selector to filter across 40+ chips by memory, security, and protocol. Estimate payload fit with the NFC Memory Calculator.

Terms in This Guide