Smart Cards
Smart Cards
Smart Cards
Rakesh Belakud VIII sem, E & C , GIT, Belgaum Under the guidance of Prof. Abhishek Deshmukh
Agenda
Machine readable plastic cards What are smart cards? Architecture of smart cards Security mechanisms Operation of smart cards Multi-application cards Applications
Plastic Cards
Visual identity application Plain plastic card is enough
Magnetic strip (e.g. credit cards) Visual data also available in machine readable form No security of data Electronic memory cards Machine readable data Some security (vendor specific)
Smart Cards
Processor cards (and therefore memory too) Credit card size With or without contacts. Cards have an operating system too. The OS provides A standard way of interchanging information An interpretation of the commands and data. Cards must interface to a computer or terminal
Reserved
Whats in a Card?
CLK
RST Vcc
RFU
GND RFU
Vpp
I/O
Typical Configurations
256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU. 8051 based designs are common. The price of a mid-level chip when produced in bulk is less than US$1.
7
Dedicated terminals
Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
Communication mechanisms
Communication between smart card and reader is
standardized ISO 7816 standard Commands are initiated by the terminal Interpreted by the card OS Card state is updated Response is given by the card.
Security Mechanisms
Password
Card holders protection
Biometric information
Persons identification
10
Data storage
Data is stored in smart cards in E2PROM
Card OS provides a file structure mechanism
MF
File types
EF EF
DF
DF EF EF
DF
EF
11
and security attributes specified at creation time. Commands for reading, writing, appending records, updating etc.
Commands work on the current EF. Execution only if security conditions are met.
12
13
14
15
Multi-application cards
16
Conclusions
An accepted authentication technology for providing tamper
transaction.
To store data in separate files which do not interact and transfer
17
Bibliography
1. 2. 3. 4.
Electronics For You-august 2007 edition by air cmde p.d.badoni. Secure & practical applications by srinivasan.s & alan Smart card technology with case studies by Carr, M.R.; Security Technology, 2002. Smart Cards: A Guide to Building and Managing Smart Card Applications by Henry Dreifus and Thomas Monk published by John Wiley & sons Smart Card Security and Applications by Mike Hendry 2nd edition published by Artech House Publishers Electronic Payment Systems by Donal O'Mahony, Michael A. Peirce, Hitesh Tewari published by Artech House Publishers
5. 6.
18
Thank you.
19