710 likes | 1.05k Views
Smart Card. 李開振 seinlin.cs95g@nctu.edu.tw 許家碩 kyo-haha@yahoo.com.tw Department of Computer Science National Chiao Tung University. Outline 1/2. Introductions ( 許家碩 ) History, Application area, Standardization Types of Cards ( 許家碩 )
E N D
Smart Card 李開振 seinlin.cs95g@nctu.edu.tw 許家碩 kyo-haha@yahoo.com.tw Department of Computer Science National Chiao Tung University
Outline 1/2 • Introductions (許家碩) • History, Application area, Standardization • Types of Cards (許家碩) • Embossed cards, magnetic-stripe cards, Smart Card, Optical Memory Card • Physical and Electrical properties (許家碩) • Smart Card Operation System (李開振, 許家碩) • Design, files management, sequential control, Open platform • Smart Card Data Transmission (李開振, 許家碩) • Data transmission Protocols, message structure (APDU)
Outline 2/2 • Smart Card Commands (李開振) • Security Techniques (李開振) • The Smart Card Life Cycle (李開振) • The five phases of the Smart Card life Cycle • Smart Card in Payment Systems (李開振) • Payment transactions, Prepaid Memory Card, Electronic Purses • Smart Card in Telecommunications (李開振) • GSM, UMTS, Wireless Identification Module, Public Card Phones
Introductions - History • 1950s - The proliferation of plastic cards started in the USA • 1970s - It possible to integrate data storage and processing logic on a single silicon chip • 1974 - Roland Moreno registered his smart card patents in France • 1984 - The French PTT (postal and telecommunications services agency) successfully carried out a field trial with telephone cards
Application area • Memory Card
Application area • Microprocessor cards
Application area • Contactless cards
Standardization • ISO TC68/SC6 • ISO/IEC JTC1/SC17 • ISO/IEC 7816 • GSM 11.11 European Telecommunications Standards Institute (ETSI)
Types of Cards • Embossed Card • Magnetic-stripe cards • Smart Card
Smart Card Microcontrollers • processor • address and data buses • three types of memory (RAM, ROM and EEPROM) • Input/Output
Types of card - Optical Memory Card • ISO/IEC 11 693 and 11 694
Physical properties • Physical properties - ID1: • external rectangle: width: 85.72 mm, height: 54.03 mm • internal rectangle: width: 85.46 mm, height: 53.92 mm
Physical properties • ID000: • external rectangle: width: 25.10 mm, height: 15.10 mm • internal rectangle: width: 24.90 mm, height: 14.90 mm
Physical properties • ID00: • external rectangle: width: 66.10 mm, height: 33.10 mm • internal rectangle: width: 65.90 mm, height: 32.90 mm
Smart Card Operation System • The primary tasks of a smart card operating system • Transferring data to and from the smart card • Controlling the execution of commands • Managing files • Managing and executing cryptographic algorithms • Managing and executing program code.
Protocol state machine Send block Receive block Send byte Receive byte Send bit Receive bit Hardware Data flow Smart Card OS - I/O • I/O manager
Smart Card OS - Filesystem • Master File (MF) • The root directory of the filesystem • Dedicated File (DF) • directory files • Elementary File (EF) • hold the actual user data
MF EF EF DF ... EF ... DF DF ... EF ... Smart Card OS - Filesystem
Byte number 0 1 2 3 4 5 …………………………. n Offset Data Filesystem - EF file structure • Transparent file structure • Transparent file structure is often referred to as a binary structure.
Byte number 0 1 2 3 4 5 n 1 2 3 4 m Record Number Filesystem - EF file structure • Linear Fixed file structure • data structure is based on chaining fixed-length records
Byte number 0 1 2 3 4 5 n 1 2 3 4 m Record Number Filesystem - EF file structure • Linear variable file structure • each record can have an individually defined length
Smart Card Data Transmission • Answer to Reset (ATR)
high 1 2 3 4 5 6 7 8 low t Start bit Parity bit Data transmission • Structure of a character for data transmission
(a) Logic 1 high 1 2 3 4 5 6 7 8 low t Logic 1 (b) Logic 0 high 1 2 3 4 5 6 7 8 low t Logic 1 Data transmission conventions • (a) direct convention, (b) inverse convention
Message structure (APDU) • Structure of the command APDU
Message structure (APDU) • Structure of the response APDU
Smart Card Commands • File selection Command • Read and Write Command • Search Command • File Manipulation Commands • Identification Commands • Authentication Commands • File management Commands
Security Techniques • User Identification • Symmetric unilateral Authentication • Asymmetric unilateral Authentication • Symmetric mutual Authentication • Smart Security • Attacks at the social level • Attacks at the physical level • Attacks at the logical level
Attacks on smart cards 1/2 • Attacks at the social level • attacks that are primarily directed against people that work with smart cards • can only partially be countered by technical measures • Attacks at the physical level • it is necessary to obtain physical access to the smart card microcontroller hardware • can be static or dynamic
Attacks on smart cards 2/2 • Attacks at the logical level • most known successful attacks on smart cards • arise from pure mental reflection or computation • classical cryptanalysis , known faults in smart card operating systems and Trojan horses in the smart card application.