Beruflich Dokumente
Kultur Dokumente
Smart Card
Maryam Savari
Mohammad Montazerolzohour
I.
INTRODUCTION
Type of algorithm
Symmetric cryptography
algorithm
Asymmetric cryptography
algorithm
Hash function
Algorithm
AES (128 bit, 196 bits, 256
bits)
DES (56 bit)
T-DES (112 bit)
IDEA (128bit)
DSA
ECDSA (160-256 bit)
RSA (1024-2048 bit)
HMAC
MD5
RIPEMD-160
SHA-1 and SHA-256
43
978-1-4673-1677-4
Decryption process:
1- Decrypt symmetric key with private key of
asymmetric algorithm. (for example: decrypt DESs key with
ECC private key )
2- Decrypt the cipher text with symmetric key [20]. The
exact process is shown in the Figure 2.
978-1-4673-1677-4
44
C. Passport System
International Civil Aviation Organization (ICAO) defined
standards for passport in the International Organization for
Standardization (ISO). E-passport is smart card with integrated
circuit which stores similar information in the paper passport.
E-passport is used for authentication of card holder. It includes
a digital photograph which is used for biometric comparison. In
the international border person authentication is with facial
recognition technology from digital photography. This
interface is one of the advantages of passport card but passport
cards have a problem in reliability and security. There is not
any encryption between card reader and e-passport. A. Baith
Mohamed, Ayman Abdel-Hamid and Kareem Youssri
Mohamed used EPC RFID Tags method to solve this problem
and in a few systems TDES is used to solve this problem [10].
Since, there are many threats to catch information and
every system will face the risk of threats, system should be
protected against attacks. Passport cards have been facing these
threats as like as other system. Some threats in passport cards
are between smart card and card reader and some of them are
between card reader and card issuer or server which will
authenticate the information of the card holder. Advanced
Encryption Standard (AES) is used to prevent attack in
transaction between card reader and server also Chip
Authentication and Terminal Authentication are implemented
to avoid threats between reader and e-passport. There is no
encryption algorithm between passport card and card reader
[10, 16]. In Figure 5 the process is demonstrated in a simple
way.
IV. METHODOLOGY
For safety of data transfer with smart card two features are
very important:
1- Safeguarding the data and information.
Applications
Health
Credit
Passport
Asymmetric
Algorithms
ECC
ECC
ECC
Semantic
Algorithms
DES
AES
-
Method
Combination
Combination
Point
Doubling
978-1-4673-1677-4
45
Requirement
Application
Level of
speed
requirement
Level of
speed data
Level of
security
Health System
high
huge
middle
Credit system
middle
low
high
Passport System
high
middle
middle
978-1-4673-1677-4
46
C. Passport System
Passport system use only ECC algorithm for Encryption
data. Data are not changeable by user. The process of
encryption is shown in the Figure 13. Rest process is exactly
same as real passport system which explained before.
Figure 10. Health Card communicates with database.
978-1-4673-1677-4
47
VI. CONCLUSION
Combination algorithms are one of the useful and efficient
methods which are suitable for applications with high level of
data to transfer. Using multipurpose smart card is much better
than carrying different cards.
Also, using encryption
algorithms in passport card make them more secure. Since,
data in health system is huge the best algorithm for health
system is combination algorithms of DES and ECC. Finally the
best algorithm for a credit card is combination of ECC and
AES because it is secure enough for credit system.
REFERENCES
[1]
978-1-4673-1677-4
48