Introduction: The World of Contactless Communication

Every time you tap your transit card on a turnstile, wave your badge at a door reader, or hold your phone near a payment terminal, you are using radio-frequency identification. RFID — and its close relative NFC — has become so embedded in daily life that most people interact with it dozens of times a day without a second thought. Yet the technology underneath is rich and layered: a stack of physical, protocol, and application standards that took decades to converge into the seamless experience you use today.

This book is about understanding that stack from the ground up, and then using that understanding to build things.


What Is RFID?

RFID stands for Radio-Frequency IDentification. At its core it is a technique for identifying an object — or storing small amounts of data — using radio waves, without any physical contact and without requiring the tag to have its own power source.

A basic RFID system has two components:

The interaction is entirely wireless. The tag has no battery; it steals power from the electromagnetic field the reader projects. When the tag enters the field, it wakes up, performs its protocol exchange, and goes silent again. The whole interaction can take as little as a few milliseconds.


RFID vs NFC: What Is the Difference?

NFC stands for Near Field Communication. It is a specific subset of RFID operating at 13.56 MHz, at very short range (typically under 4 cm), and following a defined set of standards from the NFC Forum.

The key distinctions:

Property RFID (general) NFC
Frequency LF (125 kHz), HF (13.56 MHz), UHF (860–960 MHz) 13.56 MHz only
Range cm to many meters depending on band < 4 cm by design
Direction Reader ↔ Tag only Reader/Writer, Peer-to-Peer, Card Emulation
Standards body ISO, EPC Global NFC Forum + ISO
Typical device Dedicated reader hardware Smartphone, smart card

In practice, when people say “NFC” they usually mean the 13.56 MHz, short-range, ISO 14443-based ecosystem. This book uses both terms: “RFID” when discussing the broader technology space, and “NFC” when discussing the 13.56 MHz standards and applications that are the primary focus.


Where You Encounter NFC Every Day

Before opening a data sheet, it is worth appreciating the sheer breadth of NFC deployment in the real world:

Public transit. The majority of contactless transit cards worldwide — Oyster (London), Navigo (Paris), OV-chipkaart (Netherlands), Suica (Japan), and hundreds of others — run on MIFARE Classic or MIFARE Desfire chips over ISO 14443.

Access control. Corporate badges, hotel key cards, and university ID cards are almost universally HF RFID. Many older deployments use MIFARE Classic; newer secure installations use DESFire or SEOS.

Contactless payment. Visa payWave, Mastercard contactless, and Apple/Google Pay all use ISO 14443, though the payment application layer (EMV) sits on top of the base protocol.

Inventory and library systems. Public libraries tag their books with ISO 15693 tags (a “vicinity” HF standard) because the slightly longer range makes shelf scanning practical.

NFC smart stickers and marketing. NTAG213/215/216 chips are sold as programmable stickers for product authentication, promotional links, or smart home automation triggers.

Healthcare. Patient wristbands, medication packaging, and medical device authentication increasingly use NFC.

IoT and maker projects. The PN532 chip and modules like the Adafruit PN532 breakout have made NFC a common feature in hobbyist hardware.


Why Read This Book?

There is no shortage of “tap to read NFC” tutorials. What is harder to find is a coherent explanation of why the code looks the way it does — why you authenticate before reading a MIFARE Classic block, why you need a Capability Container before writing NDEF, why Key A and Key B have different default access rights.

This book aims to give you the mental model that makes all of that obvious. Each layer of the protocol stack is explained on its own terms before the next layer is introduced. By the time you reach the practical examples chapter, you will not need to copy-paste magic byte sequences; you will know what they mean and be able to construct them yourself.


What This Book Covers

Part 1 — Foundations

Chapter 1 surveys the entire RFID frequency landscape: LF at 125 kHz, HF at 13.56 MHz, and UHF at 860–960 MHz. You will learn the physics that explains why each band has the range and data-rate characteristics it does, and the dominant use cases in each.

Chapter 2 narrows the focus to 13.56 MHz and maps the ISO and NFC Forum standards that govern it: ISO 14443 (proximity cards), ISO 15693 (vicinity cards), and the NFC Forum tag type definitions. You will also learn the anti-collision process and the identifiers (UID, ATQA, SAK) that describe a tag.

Part 2 — Tag Deep Dives

Chapters 3 and 4 cover the two most important chip families for general NFC work: MIFARE Classic and MIFARE Ultralight / NTAG. Each chapter goes into the memory map, the security model, and the practical implications.

Chapter 5 covers the NDEF (NFC Data Exchange Format) — the application-layer format that lets you store URLs, text, and other structured data on a tag regardless of the underlying chip.

Chapter 6 takes a brief look at high-security NFC: MIFARE DESFire, JCOP / Java Card, and why open tooling is limited for these platforms.

Part 3 — Hands-On

Chapter 7 surveys the hardware ecosystem: which reader chips and reader modules exist, how they connect, and how to choose.

Chapter 8 covers the software libraries you will use from Python and other platforms.

Chapter 9 is a collection of complete, working Python examples.

Chapter 10 suggests project ideas and points to further reading.


How to Use This Book

Read Part 1 and Part 2 sequentially — the chapters build on each other. Part 3 can be read in any order once you have the conceptual foundation. The practical examples chapter (Chapter 9) is most useful when you have hardware in hand.

Code examples in the text are short (under 20 lines). Complete scripts are in the code/ folder and referenced by filename in the relevant chapter.


Next Chapter: RFID Fundamentals — Frequencies, Ranges & Use Cases

Back to Table of Contents