Smart Card
-
Upload
jada-shepard -
Category
Documents
-
view
35 -
download
1
description
Transcript of Smart Card
![Page 1: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/1.jpg)
Smart Card
李開振 , 許家碩Department of Computer Science
National Chiao Tung University
![Page 2: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/2.jpg)
Outline 1/2 Introductions
History, Application area, Standardization Types of Cards
Embossed cards, magnetic-stripe cards, Smart Card, Optical Memory Card
Physical and Electrical properties Smart Card Operation System
Design, files management, sequential control, Open platform
Smart Card Data Transmission Data transmission Protocols, message structure (APDU)
Smart Card Commands
![Page 3: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/3.jpg)
Outline 2/2 Security Techniques Smart Card Terminals The Smart Card Life Cycle
The five phases of the Smart Card life Cycle Smart Card in Payment Systems
Payment transactions, Prepaid Memory Card, Electronic Purses
Smart Card in Telecommunications GSM, UMTS, Wireless Identification Module, Public
Card Phones Application Design
![Page 4: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/4.jpg)
Introductions
![Page 5: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/5.jpg)
Introductions - History 1950s - The proliferation of plastic cards started in the USA 1970s - It possible to integrate data storage and processing logic on a single silicon chip 1974 - Roland Moreno registered his smart card patents in France 1984 - The French PTT (postal and telecommunications services agency) successfully carried out a field trial with telephone cards
![Page 6: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/6.jpg)
Application area Memory Card
![Page 7: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/7.jpg)
Application area Microprocessor cards
![Page 8: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/8.jpg)
Application area Contactless cards
![Page 9: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/9.jpg)
Standardization ISO TC68/SC6 ISO/IEC JTC1/SC17 ISO/IEC 7816 GSM 11.11
European Telecommunications Standards Institute (ETSI)
![Page 10: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/10.jpg)
Types of Cards
![Page 11: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/11.jpg)
Types of Cards Embossed Card Magnetic-stripe cards Smart Card
![Page 12: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/12.jpg)
Types of Cards - Embossed Card
![Page 13: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/13.jpg)
Type of Cards - Magnetic-stripe cards
![Page 14: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/14.jpg)
Type of Cards - Smart Card
![Page 15: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/15.jpg)
Smart Card Microcontrollers processor address and data buses three types of memory
(RAM, ROM and EEPROM) Input/Output
![Page 16: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/16.jpg)
Smart Card - Memory
![Page 17: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/17.jpg)
Smart Card - Microprocessor
![Page 18: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/18.jpg)
Smart Card - Contactless smart card
![Page 19: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/19.jpg)
Types of card - Optical Memory Card ISO/IEC 11 693 and 11 694
![Page 20: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/20.jpg)
Physical and Electrical properties
![Page 21: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/21.jpg)
Physical properties Physical properties - ID1:
external rectangle: width: 85.72 mm, height: 54.03 mm
internal rectangle: width: 85.46 mm, height: 53.92 mm
![Page 22: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/22.jpg)
Physical properties ID000:
external rectangle: width: 25.10 mm, height: 15.10 mm
internal rectangle: width: 24.90 mm, height: 14.90 mm
![Page 23: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/23.jpg)
Physical properties ID00:
external rectangle: width: 66.10 mm, height: 33.10 mm
internal rectangle: width: 65.90 mm, height: 32.90 mm
![Page 24: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/24.jpg)
Smart Card Operation System
![Page 25: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/25.jpg)
Smart Card Operation System The primary tasks of a smart card
operating system Transferring data to and from the smart
card Controlling the execution of commands Managing files Managing and executing cryptographic
algorithms Managing and executing program code.
![Page 26: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/26.jpg)
Smart Card OS - I/O I/O manager
Protocol state machine
Send block
Send byte
Send bit Receive bit
Receive byte
Receive block
HardwareData flow
![Page 27: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/27.jpg)
Smart Card OS – Commands processing
![Page 28: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/28.jpg)
Smart Card OS - Filesystem Master File (MF)
The root directory of the filesystem Dedicated File (DF)
directory files Elementary File (EF)
hold the actual user data
![Page 29: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/29.jpg)
Smart Card OS - FilesystemMF
EF
EF
DF
DF
DF
EF
EF
......
... ...
![Page 30: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/30.jpg)
Filesystem - EF file structure Transparent file structure
Transparent file structure is often referred to as a binary structure.
Byte number0 1 2 3 4 5 …………………………. n
Offset Data
![Page 31: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/31.jpg)
Filesystem - EF file structure Linear Fixed file structure
data structure is based on chaining fixed-length records Byte number
0 1 2 3 4 5 nRecordNumber
1234
m
![Page 32: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/32.jpg)
Filesystem - EF file structure Linear variable file structure
each record can have an individually defined length Byte number
0 1 2 3 4 5 nRecordNumber
1234
m
![Page 33: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/33.jpg)
Smart Card Data Transmission
![Page 34: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/34.jpg)
Smart Card Data Transmission Answer to Reset (ATR)
![Page 35: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/35.jpg)
Data transmission Structure of a character for data transmission
31 2 4 5 6 7 8
Start bit Parity bit
high
lowt
![Page 36: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/36.jpg)
Data transmission conventions
31 2 4 5 6 7 8
Logic 1
Logic 1
31 2 4 5 6 7 8
Logic 0
Logic 1
high
high
low
low
(a)
(b)
t
t
(a) direct convention, (b) inverse convention
![Page 37: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/37.jpg)
Data transmission Protocols
Protocol MeaningT=0 Asynchronous, half-duplex, byte oriented [ISO-7816-3]T=1 Asynchronous, half-duplex, block oriented [ISO-7816-3]T=2 Asynchronous, full-duplex, block oriented [ISO-10536]T=3 Full duplex; not yet specifiedT=4 Asynchronous, half-duplex, byte oriented, extension of T=0,
not yet specifiedT=5…
T=13Reserved for future use, not yet specified
T=14 For national use, not standardized by ISOT=15 Reserved for future use, not yet specified
![Page 38: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/38.jpg)
Message structure (APDU) Structure of the command APDU
![Page 39: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/39.jpg)
Message structure (APDU) Structure of the response APDU
![Page 40: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/40.jpg)
Class Application
0X Standard commands compliant with ISO/IEC 7816-4/7/8
80 Electronic purses compliant with EN 1546-3
8X Application-specific and company-specific commands (private use)
8X Credit cards with chips, compliant with EMV
A0 GSM mobile telecommunication system compliant with GSM 11.11
![Page 41: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/41.jpg)
Smart Card Commands
![Page 42: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/42.jpg)
Smart Card Commands
Case Command data Expected response data
1 No data No data
2 No data Data
3 Data No data
4 Data Data
![Page 43: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/43.jpg)
Smart Card Commands File selection Command Read and Write Command Search Command File Manipulation Commands Identification Commands Authentication Commands File management Commands
![Page 44: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/44.jpg)
Security Techniques
![Page 45: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/45.jpg)
Security Techniques User Identification
Symmetric unilateral Authentication Asymmetric unilateral Authentication Symmetric mutual Authentication
Smart Security Attacks at the social level Attacks at the physical level Attacks at the logical level
![Page 46: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/46.jpg)
User Identification 1/3
![Page 47: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/47.jpg)
User Identification 2/3
![Page 48: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/48.jpg)
User Identification 3/3
![Page 49: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/49.jpg)
Attack on smart cards 1/2 Attacks at the social level
attacks that are primarily directed against people that work with smart cards can only partially be countered by technical measures
Attacks at the physical level it is necessary to obtain physical access to the smart card microcontroller hardware can be static or dynamic
![Page 50: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/50.jpg)
Attack on smart cards 2/2 Attacks at the logical level
most known successful attacks on smart cards arise from pure mental reflection or computation classical cryptanalysis , known faults in smart card operating systems and Trojan horses in the smart card application.
![Page 51: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/51.jpg)
The Smart Card Life Cycle
![Page 52: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/52.jpg)
The Smart Card Life Cycle 1/3 Phase 1: Production of the chip and the smart card
Designing the chip Generating the smart card operating system Fabricating the chips and modules Producing the card body Embedding the module in the card body
![Page 53: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/53.jpg)
The Smart Card Life Cycle 2/3 Phase 2: Card preparation
Completing the smart operating system Phase 3: Application preparation
Initializing the applications(s) Personalizing the applications(s), both visually and electrically
![Page 54: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/54.jpg)
The Smart Card Life Cycle 3/3 Phase 4: Card usage
Activating the applications Deactivating the applications
Phase 5: Termination of card usage Deactivating the applications Deactivating the card
![Page 55: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/55.jpg)
Smart Card in Telecommunications
![Page 56: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/56.jpg)
The GSM System The subscriber identity module (SIM) Security
Subscriber identification SIM authentication Data encryption
![Page 57: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/57.jpg)
The GSM System Data storage
Dialing numbers Short messages Mobile telephone settings Subscriber information SIM characterization
Managing services and supplementary applications Subscriber administration
![Page 58: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/58.jpg)
SIM in the GSM System
![Page 59: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/59.jpg)
File system in SIM 1/2
![Page 60: Smart Card](https://reader033.fdocument.pub/reader033/viewer/2022042603/568132ad550346895d995ba4/html5/thumbnails/60.jpg)
File system in SIM 2/2