Sei sulla pagina 1di 24

Smart Cards: Technology

TANU SHARMA Final Year, CS

Introduction
In 1968 German inventors patent combination of plastic cards with micro chips.

DEFINITION
A Smart card is a portable devices that contains some non-volatile memory and a microprocessor. This card contains some kind of an encrypted key that is compared to a secret key contained on the users processor.

Standard credit card-sized with microchip embedded on it Two types


Memory-only chips Microprocessor chips

Why Smart Cards


Improve the convenience and security of any transaction. Provide tamper-proof storage of user and account identity. Provide vital components of system security. Protect against a full range of security threats

Types of Smart Cards

Relationship based smart credit cards Electronic purses (replace money; known as debit cards and electronic money)

OBJECTIVE
Machine readable plastic cards Security mechanisms Applications

Construction of Smart Cards

Construction of Smart Cards


Vcc RST CLK I/O GND Vpp

RFU

RFU

Plastic Cards
Visual identity application
Plain plastic card is enough

Magnetic strip (e.g. credit cards)


Visual data also available in machine readable form No security of data

Electronic memory cards


Machine readable data Some security (vendor specific)

Smart Cards
Processor cards (and therefore memory too) Credit card size
With or without contacts.

Cards have an operating system too. The OS provides


A standard way of interchanging information An interpretation of the commands and data.

Cards must interface to a computer or

Smart Cards devices

VCC Reset Clock

GND VPP I/O Reserved

Whats in a Card?

CLK

RST Vcc

RFU
GND RFU

Vpp
I/O

Typical Configurations
256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU. 8051 based designs are common. The price of a mid-level chip when produced in bulk is less than US$1.

Smart Card Readers


Computer based readers Connect through USB or COM (Serial) ports

Communication mechanisms
Communication between smart card and reader is standardized
ISO 7816 standard

Commands are initiated by the terminal


Interpreted by the card OS Card state is updated Response is given by the card.

Response from the card include 1..Le bytes followed by Response Code

Security Mechanisms
Password
Card holders protection

Cryptographic challenge Response


Entity authentication

Biometric information
Persons identification

A combination of one or more

Password Verification
Terminal asks the user to provide a password. Password is sent to Card for verification. Scheme can be used to permit user authentication.

Cryptographic verification
Terminal verify card (INTERNAL AUTH) Terminal sends a random number to card to be hashed or encrypted using a key. Card provides the hash or hypertext. Terminal can know that the card is authentic. Card needs to verify (EXTERNAL AUTH) Terminal asks for a challenge and sends the response to card to verify Card thus know that terminal is authentic. Primarily for the Entity Authentication

Biometric techniques
Finger print identification.
Features of finger prints can be kept on the card (even verified on the card)

Photograph pattern .
Such information is to be verified by a person. The information can be stored in the card securely.

Access control on the files


Applications may specify the access controls
A password (PIN) on the MF selection
For example SIM password in mobiles

Multiple passwords can be used and levels of security access may be given

Applications may also use cryptographic authentication

How does it all work?


Card is inserted in the terminal ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Card gets power. OS boots up. Sends ATR (Answer to reset)

Terminal sends first command to select MF


Terminal prompts the user to provide password Terminal sends password for verification Terminal sends command to select MF again Terminal sends command to read EF1

Card responds with an error (because MF selection is only on password presentation)


Card verifies P2. Stores a status P2 Verified. Responds OK Card responds OK Card supplies personal data and responds OK

Current Applications
Payphones Mobile Communications Banking & Retail Electronic Purse Health Care ID Verification and Access Control

Thank You

Potrebbero piacerti anche