What are diversified security keys?

06.04.2020

diversified security keys

DESFire security rests upon a clever, mutual authentication protocol that readers and transponders follow. This protocol is designed to confirm whether the other possesses an identical digital string commonly called a security key. Only when both prove this condition will a transponder reveals its contents to a reader.

Diversified security keys extend this security even further. Traditional DESFire programmed a single security key to a site’s entire population of readers and transponders. By contrast, diversified security keys gives each transponder its own, unique security key.

With 128-bit AES encryption protecting it, DESFire already provides effectively unbreakable transponder security, impervious to hacking or cloning even by modern computers. Diversified security keys brings still more protection to transactions over the air interface between readers and transponders.

Additionally, since DESFire rests upon MIFARE’s open, multi-source standard, you can also secure your device supply in the future. We provide DESFire readers with short delivery times straight from Idesco’s stock. If needed, we can create and program customer-specific security keys in both readers and transponders, ready for site-delivery. Or program them yourself, with our easy-to-use DESCoder programming tool, freeing you to manage security keys and create configuration cards yourself.

Other news

09.06.2020

Want to learn more about using a mobile phone with an Idesco reader? Idesco offers new mobile identification solutions to meet a range of needs.

Read more

08.06.2020

8 CD 2.0 MI is more than a DESFire reader for transacting DESFire (and other MIFARE) transponders.

Read more

08.06.2020

We remain open during our usual business hours throughout summer; production and deliveries will continue to be handled normally, Monday through Friday.

Read more
Customer support

Cookies on our website

Your privacy is important to us, and we are committed to protecting your personal information. Before you continue browsing our website, please read privacy policy and accept cookies.