Researchers from Radboud University in the Netherlands have successfully cracked the security of the Oyster card used for fare payments on buses and tubes in London.
The researchers travelled on the tube on a cloned card, reset its credit level from a laptop and caused gates to jam closed.
Transport for London (TfL) said that its Oyster cards are secure, that personal information is kept separate from journey information and that anyone caught using a cloned card would be prosecuted.
The system is checked every 24 hours and the best any Oyster criminal could get is a day's free travel, the company claimed.
Radboud researcher Wouter Teepe presented evidence on the crack to the Dutch parliament, which has already delayed installation of a €1bn automated payment transport system based on the same core technology.
At the heart of an Oyster card is the Mifare chip, made by Philips spin-off NXP.
Designed in the 1990s before processors of that size could handle strong encryption, Mifare has suffered at least three published cracks, according to security experts who have urged TfL to upgrade the system.
Researchers crack London's Oyster card security
By Andrew Charlesworth on Jun 24, 2008 8:41AM