NXP Semiconductors
MF3D(H)x2
MIFARE DESFire EV2 contactless multi-application IC
MF3Dx2_MF3DHx2_SDS All information provided in this document is subject to legal disclaimers. © NXP B.V. 2018. All rights reserved.
Product short data sheet Rev. 3.1 — 17 May 2018
COMPANY PUBLIC 364231 13 / 27
MIFARE DESFire EV2 also allows Random ID to be used. In this case MIFARE DESFire
EV2 only uses a single anti-collision loop. The 3 byte random number is generated after
RF reset of the MIFARE DESFire EV2.
8.5 Memory organization
The NV memory is organized using a flexible file system. This file system allows a
multiple number of different applications on one MIFARE DESFire EV2. Each application
can have multiple files. Every application is represented by its 3 bytes Application
IDentifier (AID) and an optional ISO DF Name.
5 different data file types and 1 Transaction MAC file type are supported; see Section
8.6.
A guideline to assign DESFire AIDs can be found in the application note MIFARE
Application Directory (MAD); see [3].
Each file can be created either at MIFARE DESFire EV2 initialization (card production/
card printing), at MIFARE DESFire EV2 personalization (vending machine) or in the field.
If a file or application becomes obsolete in operation, it can be permanently invalidated.
Commands which have impact on the file structure itself (e.g. creation or deletion of
applications, change of keys) activate an automatic rollback mechanism, which protects
the file structure from being corrupted.
If this rollback is necessary, it is done without user interaction before carrying out further
commands. To ensure data integrity on application level, a transaction-oriented backup is
implemented for all file types with backup. It is possible to mix file types with and without
backup within one application.
8.6 Available file types
The files within an application can be any of the following types:
Standard data files
Backup data files
Value files with backup
Linear record files with backup
Cyclic record files with backup
Transaction MAC file
8.7 Security
The 7 byte UID is fixed, programmed into each device during production. It cannot be
altered and ensures the uniqueness of each device.
The UID may be used to derive diversified keys for each ticket. Diversified MIFARE
DESFire EV2 keys contribute to gain an effective anti-cloning mechanism and increase
the security of the original key.
Prior to data transmission a mutual three pass authentication can be done between
MIFARE DESFire EV2 and PCD depending on the configuration employing either 56-bit
DES (single DES, DES), 112-bit DES (triple DES, 3DES), 168-bit DES (3 key triple DES,
3K3DES) or AES. During the authentication the level of security of all further commands
NXP Semiconductors
MF3D(H)x2
MIFARE DESFire EV2 contactless multi-application IC
MF3Dx2_MF3DHx2_SDS All information provided in this document is subject to legal disclaimers. © NXP B.V. 2018. All rights reserved.
Product short data sheet Rev. 3.1 — 17 May 2018
COMPANY PUBLIC 364231 14 / 27
during the session is set. In addition the communication settings of the file/application
result in the following options of secure communication between MIFARE DESFire EV2
and PCD:
Plain data transfer (only possible within the backwards-compatible mode to MF3ICD40
and EV2 secure messaging)
Plain data transfer with cryptographic checksum (MAC): Authentication with
backwards-compatible mode to MF3ICD40: 4 byte MAC; All other authentications
based on DES/3DES/AES: 8 byte CMAC
Encrypted data transfer (secured by CRC before encryption): Authentication with
backwards-compatible mode to MF3ICD40: A 16-bit CRC is calculated over the stream
and attached. The resulting stream is encrypted using the chosen cryptographic
method. All other authentications based DES/3DES/AES: A 32-bit CRC is calculated
over the stream and attached. The resulting stream is encrypted using the chosen
cryptographic method. A cryptographic checksum (CMAC) will also be attached when
using EV2 secure messaging.
Find more information on the security concept of the product in [1]. Be aware not all
levels of security are recommended. For new design, the EV2 secure messaging is
recommended.
NXP Semiconductors
MF3D(H)x2
MIFARE DESFire EV2 contactless multi-application IC
MF3Dx2_MF3DHx2_SDS All information provided in this document is subject to legal disclaimers. © NXP B.V. 2018. All rights reserved.
Product short data sheet Rev. 3.1 — 17 May 2018
COMPANY PUBLIC 364231 15 / 27
9 DESFire command set
This section contains an overview of MF3D(H)x2 command codes. A detailed description
of all commands is provided in [1].
9.1 Secure Messaging Commands
Table 5. Secure messaging commands overview
Command Description
Authenticate Authentication as it was already supported by D40. Only for
KeyType.2TDEA keys. Note that the PICC only performs encryption
operations. After this authentication, the D40 backwards compatible
secure messaging is used.
AuthenticateISO Authentication as already supported by DESFire EV1. Only for
KeyType.2TDEA or KeyType.3TDEA keys. After this authentication
EV1 backwards compatible secure messaging is used.
AuthenticateAES Authentication as already supported by DESFire EV1. Only for
KeyType.AES keys. After this authentication EV1 backwards
compatible secure messaging is used.
AuthenticateEV2First Authentication for KeyType.AES keys. After this authentication EV2
secure messaging is used. This authentication is intended to be the
first in a transaction.
AuthenticateEV2NonFirst Authentication for KeyType.AES keys. After this authentication EV2
secure messaging is used. This authentication is intended for any
subsequent authentication after Cmd.AuthenticateEV2First in a
transaction.
9.2 Memory and Configuration Management Commands
Table 6. Memory and configuration management commands overview
Command Description
FreeMem Returns the free memory available on the card
Format At PICC level, all applications and files are deleted. At application
level (only for delegated applications), all files are deleted. The
deleted memory is released and can be reused.
SetConfiguration Configures the card and pre personalizes the card with a
key, defines if the UID or the random ID is sent back during
communication setup and configures the ATS string.
GetVersion Returns manufacturing related data of the PICC.
GetCardUID Returns the UID.
9.3 Key Management Commands
Table 7. Key management commands overview
Command Description
ChangeKey Changes any key stored on the PICC.

MF3D2201DUF/00V

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
RFID Transponders MIFARE DESFire EV2 contactless multi-application IC
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union