Smart Card 李開振, 許家碩 Department of Computer Science National Chiao Tung University.

Slides:



Advertisements
Similar presentations
Smart Card Security Xufen Gao CS 265 Spring, 2004 San Jose State University.
Advertisements

Smart Card Department of Computer Science National Chiao Tung University.
Smart Card Syed Jabbar Computer Science Course:
Computer Systems Nat 4/5 Computing Science Computer Structure:
Smart Card Reader. Quick Start Training Agenda Smart Card Introduction ISO 7816 Standard Smart Card Operation CoolRunner-II Smart Card Reader CoolRunner-II.
The ATA/IDE Interface Can we write a character-mode device driver for the hard disk?
Smart Cards Kyle Dion. What is a Smart Card? Definition: defined as any pocket-sized card with embedded integrated circuits which can process information.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Low Cost Attack on Tamper Resistant Devices Ross Anderson, Markus Kuhn Songpol Manoonpong.
MICRO PROCESSER The micro processer is a multipurpose programmable, clock driven, register based, electronic integrated device that has computing and decision.
© Paradigm Publishing, Inc. 2-1 Chapter 2 Input and Processing Chapter 2 Input and Processing.
Chapter 1: Computers and Digital Basics 1 Computers and Digital Basics Chapter 1.
© 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
1 3. Smart Identification 3.1 Smart Cards What Is a Smart Card?  Smart cards evolved from plastic identification and magnetic stripe cards through.
Microprocessor and Microcontroller Based Systems Instructor: Eng.Moayed N. EL Mobaied The Islamic University of Gaza Faculty of Engineering Electrical.
ATEM Service Centre Conference Smart Cards? ATEM Service Centre Conference Smart Cards? Presented by Glenn Martin - Business Development Manager.
Submitted by: Rahul Rastogi, CS Department.  Introduction  What is a smart card?  Better than magnetic stripe card.  Technology What’s in a card?
Chapter 10 Boundary Controls. Cryptographic Controls Cryptology is the science of secret codes Cryptography deals with systems for transforming data into.
Muhammad Wasim Raad1 Smart Cards Operating Systems أنظمة التشغيل للبطاقات الذكية By: Dr Muhammad Wasim Raad Computer Engineering Department.
KReSIT IIT Bombay 1 Survey on Smart Card & Mobile Payment Tijo Thomas ( ) Guided by Prof: Bernard Menezes.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
Java Card Technology Ch02: Smart card Basics Instructors: Fu-Chiung Cheng ( 鄭福炯 ) Associate Professor Computer Science & Engineering Computer Science &
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
COMPONENTS OF THE SYSTEM UNIT
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
C.S. Choy95 COMPUTER ORGANIZATION Logic Design Skill to design digital components JAVA Language Skill to program a computer Computer Organization Skill.
GSM Network Security ‘s Research Project By: Jamshid Rahimi Sisouvanh Vanthanavong 1 Friday, February 20, 2009.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
© Paradigm Publishing Inc. 2-1 Chapter 2 Input and Processing.
Mr.PRABHAT KUMAR MOHAPATRA
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
Revised: Aug 1, ECE 263 Embedded System Design Lesson 1 68HC12 Overview.
[1] National Institute of Science & Technology Technical Seminar Presentation Presented By : Rajashree Mohapatra (IT ) Technical Seminar.
CPU Computer Hardware Organization (How does the computer look from inside?) Register file ALU PC System bus Memory bus Main memory Bus interface I/O bridge.
Introduction to the Computer System. What is a computer ? A computer is an electronic device that can accept data and instruction, process them or store.
Computers Are Your Future Eleventh Edition Chapter 2: Inside the System Unit Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
© Paradigm Publishing Inc. 2-1 Chapter 2 Input and Processing.
Smart card security Nora Dabbous Security Technologies Department.
Smart Card Technology & Features
1 Schlumberger SIM Toolkit in GSM Wilson Cheung Schlumberger Technologies (Asia) Ltd. SIM Toolkit in GSM Wilson Cheung Schlumberger Technologies (Asia)
SKILL AREA: 1.2 MAIN ELEMENTS OF A PERSONAL COMPUTER.
 Introduction to Micro processor Introduction to Micro processor  Microprocessor instruction and opcodes Microprocessor instruction and opcodes  Mnemonics.
Computer Hardware A computer is made of internal components Central Processor Unit Internal External and external components.
Computer Organization. The digital computer is a digital system that performs various computational tasks Digital computer use binary number system which.
Computer and Information Sciences College / Computer Science Department CS 206 D Computer Organization and Assembly Language.
THE MICROPROCESSOR A microprocessor is a single chip of silicon that performs all of the essential functions of a computer central processor unit (CPU)
SMART CARDS Presented By Jishnu Sasikumar Reg No : 09 PG 142.
Computer operation is of how the different parts of a computer system work together to perform a task.
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
Overview of microcomputer structure and operation
Hello world !!! ASCII representation of hello.c.
Introduction to Microprocessor Cards 하남수
1. Presentation Agenda  Identify Java Card Technology  Identify Elements of Java Card applications  Communicating with a Java Card Applet  Java Card.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
Sravanthi chalasani University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS Sravanthi Chalasani SMART CARDS.
Computing Science Computer Structure: Lesson 1: Processor Structure
APPENDIX A Hardware and Software Basics
AGENDA Introduction Kind of information smart card contain
GSM SECURITY AND ENCRYPTION
Processor/Memory Chapter 3
Smart Card Technology Why is a Smart Card So Smart?
BUSINESS PLUG-IN B3 HARDWARE AND SOFTWARE BASICS
Microprocessor.
Introduction to Computers
Introduction to Microprocessors and Microcontrollers
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
Morgan Kaufmann Publishers Computer Organization and Assembly Language
Introduction to Micro Controllers & Embedded System Design
Components of a CPU AS Computing - F451.
Presentation transcript:

Smart Card 李開振, 許家碩 Department of Computer Science National Chiao Tung University

Outline 1/2 Introductions History, Application area, Standardization Types of Cards Embossed cards, magnetic-stripe cards, Smart Card, Optical Memory Card Physical and Electrical properties Smart Card Operation System Design, files management, sequential control, Open platform Smart Card Data Transmission Data transmission Protocols, message structure (APDU) Smart Card Commands

Outline 2/2 Security Techniques Smart Card Terminals The Smart Card Life Cycle The five phases of the Smart Card life Cycle Smart Card in Payment Systems Payment transactions, Prepaid Memory Card, Electronic Purses Smart Card in Telecommunications GSM, UMTS, Wireless Identification Module, Public Card Phones Application Design

Introductions

Introductions - History 1950s - The proliferation of plastic cards started in the USA 1970s - It possible to integrate data storage and processing logic on a single silicon chip Roland Moreno registered his smart card patents in France The French PTT (postal and telecommunications services agency) successfully carried out a field trial with telephone cards

Application area Memory Card

Application area Microprocessor cards

Application area Contactless cards

Standardization ISO TC68/SC6 ISO/IEC JTC1/SC17 ISO/IEC 7816 GSM European Telecommunications Standards Institute (ETSI)

Types of Cards

Embossed Card Magnetic-stripe cards Smart Card

Types of Cards - Embossed Card

Type of Cards - Magnetic-stripe cards

Type of Cards - Smart Card

Smart Card Microcontrollers processor address and data buses three types of memory (RAM, ROM and EEPROM) Input/Output

Smart Card - Memory

Smart Card - Microprocessor

Smart Card - Contactless smart card

Types of card - Optical Memory Card ISO/IEC and

Physical and Electrical properties

Physical properties Physical properties - ID1: external rectangle: width: mm, height: mm internal rectangle: width: mm, height: mm

Physical properties ID000: external rectangle: width: mm, height: mm internal rectangle: width: mm, height: mm

Physical properties ID00: external rectangle: width: mm, height: mm internal rectangle: width: mm, height: mm

Smart Card Operation System

The primary tasks of a smart card operating system Transferring data to and from the smart card Controlling the execution of commands Managing files Managing and executing cryptographic algorithms Managing and executing program code.

Smart Card OS - I/O I/O manager Protocol state machine Send block Send byte Send bitReceive bit Receive byte Receive block Hardware Data flow

Smart Card OS – Commands processing

Smart Card OS - Filesystem Master File (MF) The root directory of the filesystem Dedicated File (DF) directory files Elementary File (EF) hold the actual user data

Smart Card OS - Filesystem MF EF DF EF ...

Filesystem - EF file structure Transparent file structure Transparent file structure is often referred to as a binary structure. Byte number …………………………. n Offset Data

Filesystem - EF file structure Linear Fixed file structure data structure is based on chaining fixed-length records Byte number n Record Number 1234m1234m

Filesystem - EF file structure Linear variable file structure each record can have an individually defined length Byte number n Record Number 1234m1234m

Smart Card Data Transmission

Answer to Reset (ATR)

Data transmission Structure of a character for data transmission Start bitParity bit high low t

Data transmission conventions (a) direct convention, (b) inverse convention

Data transmission Protocols ProtocolMeaning T=0Asynchronous, half-duplex, byte oriented [ISO ] T=1Asynchronous, half-duplex, block oriented [ISO ] T=2Asynchronous, full-duplex, block oriented [ISO-10536] T=3Full duplex; not yet specified T=4Asynchronous, half-duplex, byte oriented, extension of T=0, not yet specified T=5 … T= 13 Reserved for future use, not yet specified T=14For national use, not standardized by ISO T=15Reserved for future use, not yet specified

Message structure (APDU) Structure of the command APDU

Message structure (APDU) Structure of the response APDU

ClassApplication 0XStandard commands compliant with ISO/IEC /7/8 80Electronic purses compliant with EN XApplication-specific and company-specific commands (private use) 8XCredit cards with chips, compliant with EMV A0GSM mobile telecommunication system compliant with GSM 11.11

Smart Card Commands

CaseCommand dataExpected response data 1No data 2 Data 3 No data 4Data

Smart Card Commands File selection Command Read and Write Command Search Command File Manipulation Commands Identification Commands Authentication Commands File management Commands

Security Techniques

User Identification Symmetric unilateral Authentication Asymmetric unilateral Authentication Symmetric mutual Authentication Smart Security Attacks at the social level Attacks at the physical level Attacks at the logical level

User Identification 1/3

User Identification 2/3

User Identification 3/3

Attack on smart cards 1/2 Attacks at the social level attacks that are primarily directed against people that work with smart cards can only partially be countered by technical measures Attacks at the physical level it is necessary to obtain physical access to the smart card microcontroller hardware can be static or dynamic

Attack on smart cards 2/2 Attacks at the logical level most known successful attacks on smart cards arise from pure mental reflection or computation classical cryptanalysis, known faults in smart card operating systems and Trojan horses in the smart card application.

The Smart Card Life Cycle

The Smart Card Life Cycle 1/3 Phase 1: Production of the chip and the smart card Designing the chip Generating the smart card operating system Fabricating the chips and modules Producing the card body Embedding the module in the card body

The Smart Card Life Cycle 2/3 Phase 2: Card preparation Completing the smart operating system Phase 3: Application preparation Initializing the applications(s) Personalizing the applications(s), both visually and electrically

The Smart Card Life Cycle 3/3 Phase 4: Card usage Activating the applications Deactivating the applications Phase 5: Termination of card usage Deactivating the applications Deactivating the card

Smart Card in Telecommunications

The GSM System The subscriber identity module (SIM) Security Subscriber identification SIM authentication Data encryption

The GSM System Data storage Dialing numbers Short messages Mobile telephone settings Subscriber information SIM characterization Managing services and supplementary applications Subscriber administration

SIM in the GSM System

File system in SIM 1/2

File system in SIM 2/2