Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Overview of Presentation
Types Of Smart Cards Introduction What is SIM card? History Design Data on SIM Advantages of SIM Threats to SIM Future Evolution Conclusion References
14/11/2011
SIM 09EC092
Crypto Card
USB token
SIM Card
SIM 09EC092
Introduction
A Subscriber Identity Module or Subscriber Identification Module (SIM) is an integrated circuit that securely stores the service-subscriber
14/11/2011
SIM 09EC092
The Subscriber Identity Module (SIM) is a small smart card which contains information. SIM card is a smart card with a
their safety would be threatened. This is because the chip connections may become
illegal access and misappropriation of SIM cards important clues.
14/11/2011
SIM 09EC092
History
The first SIM card was made in 1991 by Munich smart card maker Giesecke & Devrient, who sold the first 300 SIM cards to Finnish
14/11/2011
SIM 09EC092
Design
Vcc (C1): Supply voltage
There are three operating voltages for SIM cards: 5 V, 3 V and 1.8 V (ISO/IEC 7816-3 classes A, B and C, respectively). RST (C2): Reset input. CLK (C3):Clock input delivers an external clock signal (1.10 MHz) that is used as a system clock for the smart card microcontroller. GND (C5): Ground. Vpp (C6): EEPROM programming voltage. Not
SIM 09EC092
Data on SIM
SIM cards store network specific information used to authenticate and identify subscribers on the Network, the most important of these are the ICCID, IMSI, Authentication Key (Ki), Local Area Identity (LAI) and Operator-Specific Emergency Number.
1. ICC-ID (Integrated Circuit Card - ID) Each SIM is Internationally identified by its ICC-ID. ICC-IDs are stored in the
SIM cards and are also engraved or printed on the SIM card body during a
process called personalization. The ICC-ID number is composed of the following subparts: a. b. c. Issuer identification number (IIN) Individual account identification Check digit SIM 09EC092
8
15/11/2011
14/11/2011
SIM 09EC092
The Ki is a 128-bit value used in authenticating the SIMs on the mobile network. Each SIM holds a unique Ki assigned to it by the operator during the personalization process. The Ki is also stored in a database (known as Authentication Center or AuC) on the carrier's network. The SIM card is designed not to allow the Ki to be obtained using the smartcard interface. Instead, the SIM card provides a function, Run GSM Algorithm , that allows the phone to pass data to the SIM card to be signed with the Ki.
This, by design, makes usage of the SIM card mandatory unless the Ki can be
extracted from the SIM card, or the carrier is willing to reveal the Ki.
14/11/2011
SIM 09EC092
10
Operator networks are divided into Location Areas, each having a unique LAI number. When the Mobile changes its location from one Location Area to another it stores its new LAI in SIM and sends it to the operator network to inform network with its new location. If the handset is turned off and back on again it will take data off the SIM and search for the LAI
it was in. This saves time by avoiding having to search the whole list of
frequencies that the telephone normally would.
15/11/2011
SIM 09EC092
11
Advantages
1. Installation:
The SIM card allows users to change phones by simply removing the SIM card from one mobile phone and inserting it into another mobile phone. 2. Cost and Memory: The typical low cost SIM card has little memory, 2-3 KB as described.
14/11/2011
SIM 09EC092
12
Advantages (Contd..)
3. Security: SIM card is very secure and provides: i) the secure loading of the applications .
ii) Secure data storage for the application data and application cryptographic keys. iii) Secure Crypto operation support. The other factors which make the SIM secure are. PIN and PUK: PIN Personal Identification Number 2 PINs exist (PIN 1 and PIN2) Limited attempts on PIN access PUK PIN Unblocking Code Resetting PUK, resets PIN and the attempt counter Too many attempts on PUK blocks use permanently
15/11/2011
SIM 09EC092
13
Threats to SIM
1. SIM Cloning:
SIM cloning consists of duplicating the GSM Subscriber Identity Module identification and placing calls or using other charged services using the account of the cloned SIM. SIM cloning is also a great concern of security services because of its GSM locationbased service undependable if more than one handset is using the same SIM card.
2. Attacks to COMP128:
engineered.
It exploits the weakness in diffusion of the second round in the compression function. This is commonly referred to as a Narrow Pipe.
14/11/2011 14
SIM 09EC092
Future Evolution
1. UNIVERSAL SUBSCRIBER IDENTITY MODULE(USIB):
It is an application for UMTS mobile telephony running on a UICC smart card which is inserted in a 3G mobile phone. There is a common misconception to call the UICC card itself a USIM, but the USIM is merely a logical entity on the physical card. It stores user subscriber information, authentication information and provides storage space for text messages and phone book contacts.
14/11/2011
SIM 09EC092
15
Conclusion
SIM is a smart card which forms an unavoidable part in GSM mobile phones. It stores several user-defined information such as phonebook entries and other subscriber information like IMSI. SIM may be moved from one Mobile Station to another which forms an advantage for the GSM architecture. This makes upgrades very simple for the GSM telephone user.
14/11/2011
SIM 09EC092
16
References
contacts, International Standard, Parts 1-15.
2. [SIMME] 3GPP, 2005a, Specification of the Subscriber Identity Module Mobile Equipment (SIM - ME) interface, 3rd Generation Partnership Project, TS 11.11 V8.13.0 (Release 1999), Technical Specification, (2005-06). 3. http://en.wikipedia.org/wiki/Subscriber_Identity_Module
15/11/2011
SIM 09EC092
17
Thank-You.
( You may ask.)
14/11/2011
SIM 09EC092
18