Smart Cards: Technology For Secure Management of Information
Smart Cards: Technology For Secure Management of Information
Secure Management of
Information
By-
Saurabh pratap singh
Pccs college gr.noida
1
Machine readable plastic cards
What are smart cards
Security mechanisms
Applications
SCOSTA experience
Indian Driving License application
Agenda
2
Visual identity application
Plain plastic card is enough
Magnetic strip (e.g. credit cards)
Visual data also available in machine readable form
No security of data
Plastic Cards
3
Processor cards (and therefore memory too)
Credit card size
With or without contacts.
Cards have an operating system too.
The OS provides
A standard way of interchanging information
An interpretation of the commands and data.
Smart Cards
4
Smart Cards devices
5
GND
VCC
VPP
Reset
I/O
Clock
Reserved
What’s in a Card?
CLK RST
Vcc
RFU
GND
RFU
Vpp
I/O
6
Typical Configurations
7
Dedicated terminals
Usually with a small screen,
keypad, printer, often also
have biometric devices such
as thumb print scanner.
8
Terminal/PC Card Interaction
9
Password
Card holder’s protection
Cryptographic challenge Response
Entity authentication
Biometric information
Person’s identification
A combination of one or more
Password Verification
12
MF File types
Binary file (unstructured)
DF DF EF EF
Fixed size record file
DF EF Variable size record file
EF EF
File Naming and Selection
16
Each files has a 2 byte file ID and an optional 5-bit SFID (both
unique within a DF). DFs may optionally have (globally unique)
16 byte name.
OS keeps tack of a current DF and a current EF.
Current DF or EF can be changed using SELECT FILE command.
Target file specified as either:
DF name
File ID
SFID
Relative or absolute path (sequence of File IDs).
Parent DF
Basic File Related Commands
17
Read: Never
Write: Password
Verification (P1)
An example scenario (institute ID card)
20
The terminal itself does not store any keys, it’s the two cards that
really authenticate each other. The terminal just facilitates the
process.
Status of smart card deployments
23
Famous Gujarat Dairy card
Primarily an ID card
GSM cards (SIM cards for mobiles)
Phone book etc. + authentication.
Cards for “credit card” applications.
By 2007 end all credit cards will be smart.
EMV standard
Card for e-purse applications
Bank cards
Card technology has advanced
Contactless smart cards,
32-bit processors and bigger memories
JAVA cards
SCOSTA Experience
24
Consider a polynomial
k1 + k2.x + k3.x2 + k4.x3 + k5.x4 = b
If b1, b2, b3, b4, b5 are known for x = 1, 2, 3.., the
system of equations can be solved and all k’s can be
found.
We use the SCOSTA cards to store (x1, b1), (x2, b2) etc.
At any point in time, five such pairs are needed.
For robustness, seven cards are generated and kept at
7 different locations.
Operations
32
Operations
34
Prof. Deepak Gupta and Manindra Agrawal (CSE)
S. Ravinder and Kapileshwar Rao (MTech students
of CSE who worked on this project)
National Informatics Centre (NIC) Delhi
MCIT and MoST
References:
Smart Card Handbook
ISO7816 standards
www.parivahan.nic.in
Acknowledgements
35
Questions are invited
?
Thanking you