Sie sind auf Seite 1von 18

Smart Cards

Our Inevitable Future


Presented by: Ravi Bhati (34) Rohan Modi (35) Rohit Srivastava (36)

What Are Smart Cards?


Credit card sized plastic card with an embedded chip. Generally made of plastic such as PVC or Polycarbonate. May come in 2 types:

Memory Micro-processor

Contact and Contact-less type cards. Used as a replacement for magnetic strip cards.

Whats In A Smart Card?

GND VCC VPP Reset I/O Clock

Reserved

Typical Configurations

256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU. 8051 based designs are common.

Types of Smart Cards

Selection of A Smart Card

Card Function Trade-Offs

Card Operating Systems

The two primary types of smart card operating systems are :


Fixed File Structure Dynamic Application System.

Selection of a card OS depends on


The application that the card is intended for. Encryption capabilities of the operating system and the chip.

Symmetric Key Asymmetric Key (Public Key).

Smart Card Readers

Computer Based Readers which connect through USB or COM (Serial) ports

Dedicated Terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.

How Does A Smart Card Works?

Security of Smart Cards

Password

Card holders protection Entity authentication

Cryptographic Challenge Response

Biometric information

Persons identification

A combination of one or more

Password Verification

Terminal asks the user to provide a password. Password is sent to Card for verification. Scheme can be used to permit user authentication.

Not a person identification scheme

Cryptographic Verification

Method of converting data from a human readable form to a modified form, and then back to its original readable form, to make unauthorized access difficult. Cryptography is used in the following ways:

Ensure data privacy, by encrypting data Ensures data integrity, by recognizing if data has been manipulated in an unauthorized way Ensures data uniqueness by checking that data is "original", and not a "copy" of the "original". The sender attaches a unique identifier to the "original" data which is checked by the receiver of the data.

Biometric Techniques

Finger print identification

Features of finger prints can be kept on the card (even verified on the card)

Photograph/IRIS pattern

Such information is to be verified by a person. The information can be stored in the card securely.

Why Use Smart Cards?

Can store currently up to 7000 times more data than a magnetic stripe card. Information that is stored on the card can be updated. Magnetic stripe cards are vulnerable to many types of fraud.

Lost/Stolen Cards Skimming Carding/ Phishing

Greatly enhances security by communicating with card readers using PKI algorithms. A single card can be used for multiple applications (cash, identification, building access, etc.) Provides a 3-fold approach to authentic identification:

Pin Smartcard Biometrics

Status Of Smart Card Deployments


UID GSM cards (SIM cards for mobiles) Phone book etc. + authentication. Cards for credit card applications. From 200 all credit cards will be smart card. EMV standard (Europay, MasterCard and VISA) Card for e-purse applications Bank cards Card technology has advanced Contactless smart cards, 32-bit processors and bigger memories JAVA cards

Common and Future Uses of Smart Cards


Current uses:

Chicago Transit Card Speed Pass Amex Blue Card Phone Cards University ID cards Health-care cards Access to high level government facilities. Federally Passed Real-ID act of 2005. E-Passports

Future uses:

References

http://www.smartcardbasics.com/ http://www.smart-card.com/ http://www.howstuffworks.com/ www.smartcard.co.uk/tutorials/sct-itsc.pdf

Das könnte Ihnen auch gefallen