Study on Cryptographic Application for Smart Card Course Title : Computer Security & E-Payment System Faculty : 김 광 조 김 종 승 이 정 연
Compute Security & E-Payment System T erm Project 2 INDEX ▣ 1. Motivation ▣ 2. Survey Problems Related with Smart Card ▣ 3. Identify Efficient Cryptosystems for Smart Card ▣ 4. Future Work ▣ 5. Time Schedule ▣ 6. References
Compute Security & E-Payment System T erm Project 3 1. Motivation ▣ 1. To reduce trials and errors to design COS later using results of this term project. ▣ 2. To know How to work smart card and what architectures are. ▣ 3. To implement efficient crypto algorithms within various constraints. ▣ 4. To know secure, non-secure requirements of smart card. ▣ 5. To establish basis for our thesis.
Compute Security & E-Payment System T erm Project 4 2. Problems related with smart card ▣ 1. Constrained memory, limited computing power, slow transmission rate, use low voltage of IC chips ▣ 2. Not compatible each other ▣ 3 Different IC chip specifications ▣ 4. No standard design principles ▣ 5. Difficult Upgrade ▣ 6. Grows up customer’s needs…
Compute Security & E-Payment System T erm Project 5 3. Efficient Cryptosystem for Smart Card ▣ 1. Smaller key size but more strong against attacks ▣ 2. Less use memory ▣ 3. Faster than others ▣ 4. Using combination of symmetric & asymmetric key cryptosystems ▣ 5. Compatible with any IC chip products ▣ 6. Follow international standards….
Compute Security & E-Payment System T erm Project 6 4. Future Work ▣ 1. Characteristics of smart card systems ▣ 2. International Standards ▣ 3. Specification of IC chips ▣ 4. COS design criteria ▣ 5. Analyze and improve computation of cryptosystems ▣ 6. Current issues ▣ 7. Suggest more practical model of smart card systems
Compute Security & E-Payment System T erm Project 7 5.Time Schedule Time Table Work 3 th 4 th 5 th 6 th 7 th 8 th 9 th 10 th 11 th 12 th 13 th 14 th 15 th Characteristics of smart card International Standards Specification of IC chips COS design criteria Analyze &improve computation of cryptosystems Suggest more practical model
Compute Security & E-Payment System T erm Project 8 6. References ▣ [1] Jorge Ferrari, “Smart Card :A case study”, IBM ▣ [2] Certicom white paper “ECC for smart card” ▣ [3] R. Rivest, A.Shamir “A method for obtaining Digital Signatures and public-key cryptosystems” ▣ [4] C.Kaufman, “network Security Private Communication in a Public word”