Authentication
The process of verifying the identity of an NFC tag or reader. Ranges from simple password checks (32-bit) to cryptographic mutual authentication (AES-128). Critical for anti-counterfeiting, access control, and payment applications.
What Is NFC Authentication?
NFC authenticationauthenticationIdentity verification of NFC tags/readers via passwords or cryptographyView full → is the process of verifying the identity of an NFC tag or reader to establish trust before exchanging sensitive data. Authentication ranges from simple password protection using a 32-bit code to sophisticated cryptographic protocols employing AES-128 mutual authentication. The choice of authentication mechanism directly determines an NFC deployment's resistance to cloning, eavesdropping, and unauthorized access.
Authentication Levels
NFC authentication can be categorized into four progressive security levels:
| Level | Mechanism | Security | Example Chips |
|---|---|---|---|
| None | Open read/write | No protection | Basic NTAG 213 (unprotected) |
| Basic | 32-bit password | Low (plaintext) | NTAG 21x, Ultralight EV1 |
| Standard | 3DES / AES keys | Medium-High | Ultralight C, DESFire EV1 |
| Advanced | AES-128 mutual auth + SDM | Very High | NTAG 424 DNA, DESFire EV3 |
Password Authentication
The simplest authentication method uses a 32-bit (4-byte) password transmitted to the tag's NFC chip via the PWD_AUTH command. If the password matches, the tag grants access to the protected memory area and returns a 16-bit password acknowledgment (PACK). If it fails, the tag remains locked.
Limitations. The 32-bit password is transmitted in plaintext over the RF interface, meaning anyone with an NFC sniffer within the read range can capture it. Password protectionPassword protection32-bit access control for memory areas (plaintext transmission)View full → is appropriate for preventing casual tampering but inadequate for security-critical applications. The 32-bit key space (4.29 billion combinations) can be brute-forced with dedicated hardware.
Cryptographic Authentication
For higher security, modern NFC chips implement standard cryptographic algorithms:
DES / 3DES. Used in MIFARE Ultralight C and DESFire EV1. Three-key Triple DES provides 168-bit effective key length. While more secure than password protection, 3DES is considered legacy and is being phased out in favor of AES.
AES-128. Used in NTAG 424 DNA, DESFire EV2/EV3, and MIFARE Plus. AES provides strong symmetric encryption with 128-bit keys. The authentication handshake uses a challenge-response protocol where both parties prove knowledge of the shared key without transmitting it.
Mutual Authentication
In mutual authentication, both the reader and tag verify each other's identity. The reader sends a challenge to the tag, the tag responds with an encrypted answer and its own challenge, and the reader responds in turn. This prevents both unauthorized readers from accessing protected tags and counterfeit tags from impersonating genuine ones.
Dynamic Authentication (SUN/SDM)
The most advanced NFC authentication mechanism is Secure Unique NFC (SUN) combined with Secure Dynamic Messaging (SDM), available in NTAG DNA chips. Every tap generates a unique, cryptographically signed URL that a backend server verifies. This eliminates the possibility of replay attacks and provides irrefutable proof of tag authenticity.
Choosing the Right Authentication
The appropriate authentication level depends on the threat model:
- Marketing tags, information sharing: No authentication or basic password to prevent rewriting
- Asset tracking, loyalty programs: Password protection with access control bits
- Brand protection, anti-counterfeiting: AES mutual authenticationmutual authenticationTwo-way identity verification between reader and tagView full → or SUN/SDM
- Payment, access control: Full EMV or DESFire EV3 with AES mutual authentication
Related Terms
Related Guides
常见问题
The NFC glossary is a comprehensive reference of technical terms, acronyms, and concepts used in Near Field Communication technology. It is designed for developers, product managers, and engineers who work with NFC and need clear definitions of terms like NDEF, APDU, anti-collision, and ISO 14443.
Each glossary term is cross-referenced with related NFC chips, standards, and other terms. For example, the term 'AES-128' links to chips that support AES encryption (NTAG 424 DNA, DESFire EV2/EV3), and the term 'ISO 14443' links to all chips compliant with that standard.
Yes. NFCFYI provides glossary definitions in 15 languages including English, Korean, Japanese, Chinese, Spanish, Portuguese, Hindi, Arabic, French, Russian, German, Turkish, Vietnamese, Indonesian, and Thai. Use the language selector in the header to switch languages.