Smart Cards by Mahadev Karadigudda. * Introduction * How smart cards assist in enhancing security * Security vulnerabilities * Conclusion.

Slides:



Advertisements
Similar presentations
Do not put content in this area Do not put content in this area Reflex Blue R 0 G 0 B 153 Collis Corporate Colours Reflex Blue 70% R 102 G 102 B 204 Reflex.
Advertisements

1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Smart Card Technology Why is a Smart Card So Smart?
Smart Card Security Xufen Gao CS 265 Spring, 2004 San Jose State University.
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Smart Card The Future Is Here… By Salman Awan. Introduction Smart cards represent a new technology that has tremendous potential for enhancing the security.
Smart Card security analysis Smart Card security analysis Marc Witteman, TNO.
Smart Card Syed Jabbar Computer Science Course:
Ecosystem Scenarios for Cloud-based NFC Payments
Smart Card Reader. Quick Start Training Agenda Smart Card Introduction ISO 7816 Standard Smart Card Operation CoolRunner-II Smart Card Reader CoolRunner-II.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Smart Cards Kyle Dion. What is a Smart Card? Definition: defined as any pocket-sized card with embedded integrated circuits which can process information.
SecurePak Electronic tamper detection for packaging developed by Cypak and Swedish Postal Service.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
JAIPUR 16 DEC 08 TECHNOLOGY FOR FINANCIAL INCLUSION Indian Institute of Banking & Finance N D RAO.
ATEM Service Centre Conference Smart Cards? ATEM Service Centre Conference Smart Cards? Presented by Glenn Martin - Business Development Manager.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Submitted by: Rahul Rastogi, CS Department.  Introduction  What is a smart card?  Better than magnetic stripe card.  Technology What’s in a card?
FIT3105 Smart card based authentication and identity management Lecture 4.
Electronic payments — and — emerging technologies peter honeyman center for information technology integration.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
outline Purpose Design Implementation Market Conclusion presentation Outline.
Authentication in Ubiquitous Computing Laurent BUSSARD and Yves ROUDIER Institut Eurecom Workshop on Security in Ubiquitous Computing UBICOMP 2002, Goteborg.
Wireless Sensor Network Security Anuj Nagar CS 590.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Microcrypt Technologies SPACER Secure Physical Access Control Enhanced Reader for contactless cryptographic smart cards.
& its Case study for the Smart Card
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Smart Cards By Simon Siu and Russell Doyle Overview Size of a credit card Small embedded computer chip – Memory cards – Processor cards – Electronic.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
Mr.PRABHAT KUMAR MOHAPATRA
“Jožef Stefan” Institute Transnational ICT and Security Technology Opportunities – Ljubljana, 31 May 2007 Company Details Address: Jamova 39 Post Code:
Team 6: Faisal Moiz Raymond Nnodim Michael Woodruff Instructor: Dr. Bun Yue Mentor: Craig Russell – Tietronix Software 1 Capstone – Spring 2012 Android.
[1] National Institute of Science & Technology Technical Seminar Presentation Presented By : Rajashree Mohapatra (IT ) Technical Seminar.
Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks Authors: Saar Drimer and Steven J. Murdoch Presented in: Usenix Security Symposium.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Smart card security Nora Dabbous Security Technologies Department.
Smart Card Technology & Features
A smart card is a credit-card sized plastic card embedded with an integrated circuit chip that makes it "smart". This marriage between a convenient plastic.
The Study of E-payment System Using Smart Card Computer Security & Electronic Payment System - Cheong Je-ho - Song Jae-il - Shin Heung-Soon -
April 20023CSG11 Electronic Commerce Smartcards John Wordsworth Department of Computer Science The University of Reading Room.
NICOLE AND LAVONTIS COMPUTER APPLICATIONS. USB Flash Drive A USB flash drive,sometimes called s pen drive or thumb drive,is a flash memory storage device.
By Brian Sutherland and Chou Peter Hoang
Payment in Identity Federations David J. Lutz Universitaet Stuttgart.
1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
SMART CARDS Presented By Jishnu Sasikumar Reg No : 09 PG 142.
EVOLUTION OF EMBEDDED SYSTEMS SRI SUNFLOWER COLLEGE OF ENGINEERING AND TECHNOLOGY PESENTED BY: A.Abhaya Dhathri J.Gayathri 3 rd ECE 3 rd ECE.
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
MOBILE DEVICES AND COMPUTER BUS Batch - HYD10 / 1516 Learning Group - HIS 45 Team Nagashravani K L Anirban Bhattacharjee
CONTACTLESS SMART CARD Betty Yu. What is contactless smart card? A contactless smart card is a contactless MHz credential whose dimensions are credit-card.
What is a Smart Card? Standard credit card-sized with microchip embedded on it Two types –Memory-only chips –Microprocessor chips.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
SMART CARDS SMART CARDS Sumesh Kumar K. What is a Smart Card? Plastic Card. Microchip loaded with data. Uses - telephone calling, electronic card payment.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
Sravanthi chalasani University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS Sravanthi Chalasani SMART CARDS.
TECHNOLOGY FOR FINANCIAL INCLUSION
Presented by Edith Ngai MPhil Term 3 Presentation
Electronic Commerce Smartcards
ABYSS : An Architecture for Software Protection
Smart Card Technology Why is a Smart Card So Smart?
How Things Work: Smart Cards Ian McConkey November 2, 2017
Smart Card.
كارت هوشمند چيست وچگونه كار مي‌كند؟
Moxa Smart Grid Technology Portfolio
By: Zachary G/ Kailona G IS 201 M9
Presentation transcript:

Smart Cards by Mahadev Karadigudda

* Introduction * How smart cards assist in enhancing security * Security vulnerabilities * Conclusion

* Smart Card: Credit card sized plastic card with a chip embedded on it. * Invented by German inventors Jurgen Dethloff and Helmut Grotrup. * Tamper resistance. * Deployed in access control in banking, wireless communications etc..

* Contact cards and Contactless cards. * Memory based cards and microprocessor based cards. * T0-T1 cards and T0-T15 protocols.

* Smart Card architecture EEPROM ROMPROCESSORRAM I/O

* Security: * Access Control * Authentication * Integrity * Trusted Communication. Application FileA Application FileB PIN--A PIN--B ProcessorRAMROM(OS) Smart Card Software Architecture

* Security Vulnerabilities: * Differential power analysis * Attacks on tamper resistance * High frequency clock glitch * Trapping high voltages * Software attacks

* Conclusion: * Portable and reliable data storage * Security vulnerabilities * Prevention * Smart Cards, part of a security infrastructure