NXP Semiconductors
MF1P(H)x1y1
MIFARE Plus EV1
MF1P(H)x1y1 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2018. All rights reserved.
Product short data sheet Rev. 3.0 — 23 July 2018
COMPANY PUBLIC 366930 13 / 27
8.10 Security level 3
The operation in security level 3 is solely based on the ISO/IEC 14443-4 protocol layer.
The usage of the backwards compatibility protocol is not possible.
In security level 3, a mandatory AES authentication between PICC and reader is
conducted, where two keys are generated as a function of the random numbers from the
PICC and the reader as well as of the shared key.
These two session keys are used to secure the data which is exchanged on the interface
between the card and reader. One of the two keys is used to ensure the confidentiality of
the command and the response while the other key ensures the integrity of the command
and the response.
MIFARE Plus EV1 features the secure messaging from its predecessor MIFARE Plus
EV0 and it offers the possibility to choose the newly introduced EV1 secure messaging.
On First Authenticate, the PCD can use the PCD capability bytes to chose between
MIFARE Plus EV0 and MIFARE Plus EV1 secure messaging.
The reader can decide which security needs to be used in the communication between
PICC and reader. In the simplest case, all commands are secured by a MAC, such
that the PICC will only accept commands from the authenticated reader. Any message
tampering is detected by verifying the MAC. All responses are appended by a MAC to
prove to the reader that neither the command nor the response have been compromised.
If performance is the highest priority, the card can be configured to omit the MAC for read
commands. The card then accepts read commands without knowing whether they are
authentic. However, there is a mechanism to prove to the reader that the read response
is resulting from the unmodified read command that it sent.
Other commands, like write commands, always need to have a MAC appended to ensure
that no memory changes are carried out without proving the authenticity of the command.
The reader can decide for each command whether a MAC is included in the response.
When the appropriate MAC is received, due to linked MACs the reader knows that the
command and commands before it were properly executed.
All commands between two consecutive First Authenticate commands belong to one
transaction and the MACing mechanism assures integrity of the whole transaction.
If the MAC on read responses is omitted, the integrity of all read responses within one
session can still be verified by including a MAC on one read response before issuing the
next First or Following Authenticate command.
To balance performance and confidentiality of the transaction, each data block in a sector
can be configured to allow or disallow sending/receiving plain data.
NXP Semiconductors
MF1P(H)x1y1
MIFARE Plus EV1
MF1P(H)x1y1 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2018. All rights reserved.
Product short data sheet Rev. 3.0 — 23 July 2018
COMPANY PUBLIC 366930 14 / 27
9 Look-up tables
9.1 Security level 0, 1, 2, 3: ISO/IEC 14443-3
Table 4. ISO/IEC 14443-3
Command Description
REQA the REQA and ATQA commands are fully implemented according to
ISO/IEC 14443-3
WUPA the WAKE-UP command is fully implemented according to ISO/IEC
14443-3
ANTICOLLISION/SELECT
cascade level 1
the ANTICOLLISION and SELECT commands are fully implemented
according to ISO/IEC 14443-3. The response is part 1 of the UID.
ANTICOLLISION/SELECT
cascade level 2 for 7 byte
UID version
the ANTICOLLISION and SELECT commands are fully implemented
according to ISO/IEC 14443-3. The response is part 2 of the UID.
HALT the HALT command is fully implemented according to ISO/IEC
14443-3
9.2 Security level 0, 1, 2, 3: ISO/IEC 14443-4
Table 5. ISO/IEC 14443-4
Command Description
RATS the response to the RATS command identifies the PICC type to
the PCD.
PPS the PPS command allows individual selection of the
communication baud rate between PCD and PICC. It is possible
for MF1PLUSx0 to individually set the communication baud rate
independently for both directions.
DESELECT deselection according to ISO/IEC 14443-4.
Please find more information on ISO/IEC 14443-3 in Ref. 7 as well as on the settings of
ATQA, SAK and ATS in Ref. 6.
9.3 SL0 command overview
Table 6. SL0 command overview
Command Description
Commands available after ISO/IEC 14443-3 activation
Read_Sig Retrieve the ECC originality check signature.
WritePerso pre Personalization of AES Keys and all blocks
CommitPerso switch to SL1 or SL3
AuthenticateFirst (part 1) first authenticate
AuthenticateNonFirst (part 1) following authenticate
NXP Semiconductors
MF1P(H)x1y1
MIFARE Plus EV1
MF1P(H)x1y1 All information provided in this document is subject to legal disclaimers. © NXP B.V. 2018. All rights reserved.
Product short data sheet Rev. 3.0 — 23 July 2018
COMPANY PUBLIC 366930 15 / 27
Command Description
AuthenticateContinue (part 2) second authentication step
VCSupportLastISOL3 check if the Virtual Card Concept is supported, communicate
PCD capabilities and retrieve the UID
Commands available after ISO/IEC 14443-4 activation
GetVersion returns manufacturing related data of the PICC
Read_Sig Retrieve the ECC originality check signature.
WritePerso pre Personalization of AES Keys and all blocks
CommitPerso switch to SL1 or SL3
AuthenticateFirst (part 1) first authenticate
AuthenticateNonFirst (part 1) following authenticate
AuthenticateContinue (part 2) second authentication step
VC commands available after ISO/IEC 14443-4 activation, using ISO/IEC 7816-4 protocol
ISOSelect Select virtual card
9.4 SL1 command overview
Table 7. SL1 command overview
Command Description
MIFARE Classic commands
MF Authenticate KeyA authentication with KeyA
MF Authenticate KeyB authentication with KeyB
MF Read reading data
MF Write writing data
MF Increment incrementing a value
MF Decrement decrementing a value
MF Restore restoring a value
MF Transfer transferring a value
Commands using backwards compatibility protocol, see Section 8.6.1
Read_Sig Retrieve the ECC originality check signature.
SetConfigSL1 used to change MIFARE Plus EV1 specific configuration
data.
MF_PersonalizeUIDUsage Personalize UID Usage as described in Ref. 3
AuthenticateFirst (part 1) first authenticate, protocol used as described in Section
8.6.1
AuthenticateNonFirst (part 1) following authenticate, protocol used as described in
Section 8.6.1
AuthenticateContinue (part 2) second authentication step, protocol used as described in
Section 8.6.1

MF1PH2131DA4/01J

Mfr. #:
Manufacturer:
NXP Semiconductors
Description:
RFID Transponders MIFARE Plus EV1
Lifecycle:
New from this manufacturer.
Delivery:
DHL FedEx Ups TNT EMS
Payment:
T/T Paypal Visa MoneyGram Western Union