You are on page 1of 26

Smart Cards

2nd May, 2011

Vijit Singh
07EC73
Organization
Introduction
Types of smart cards
Smart card readers
Standards
System Planning
Security
Applications
Summary
References
Introduction
Plastic chip card containing an embedded
computer chip
Memory or microprocessor – stores or
transacts data
Introduced in Europe three decades ago
Debuted as a stored value tool
Tamper-proof storage
More reliable than machine-readable cards
Types of Smart Cards
Types of Smart Cards
Contact cards
Types of Smart Cards

Memory cards
◦ Cannot process files
◦ No processing power for data management
◦ Synchronous protocols
◦ Fixed addresses
◦ Three types
Types of Smart Cards

Straight memory cards


◦ Store data; no processing capability
Protected/Segmented memory cards
◦ Built-in logic for data access control
Stored value memory cards
◦ Disposable/rechargeable; designed for specific
purposes
Types of Smart Cards

CPU/MPU microprocessor multifunction


cards
◦ On-card dynamic data processing capabilities
◦ Card operating system (COS)
◦ Different and multiple functions/applications
◦ Greater convenience and security
Types of Smart Cards
Card construction
Types of Smart Cards
Card function trade-offs
Smart Card Readers
Contact
◦ ISO 7816 T=0 standard
◦ Higher speed
◦ More secure
◦ Direct coupling to the reader
Smart Card Readers
Contactless
◦ Involves Radio Frequencies for
communication
◦ Dominant protocols under ISO 14443 is
MIFARE
Standards

InternationalOrganization for
Standardization (ISO)
◦ ISO/IEC 7816
◦ ISO/IEC14443
◦ ISO/IEC 15693
System Planning
Security
Security
Dataintegrity
Authentication
Non-repudiation
Authorization and delegation
Auditing and logging
Management
Cryptography/Confidentiality
Security
Data Security mechanisms and their
respective algorithms
Security
DES (Data Encryption Standard)
◦ Most well known symmetric algorithm
◦ Same key for encryption & decryption
Security

Triple-DES
◦ Provides additional security
◦ Two or three keys used
◦ Also known as EDE mode (encrypt-decrypt-
encrypt)
Security
Security
Asymmetric algorithm
◦ Different keys for encryption & decryption
◦ RSA: most well known asymmetric algo
Applications

SIM cards and telecommunication


Loyalty and stored value
Securing digital content and physical
assets
E-commerce
Applications

Bank-issued smart cards


Healthcare informatics
Embedded medical device control
Enterprise and network security
Physical access
Summary

Smart cards store/transacts data


Provides improved convenience and
security of any transaction
Availability in various forms
Finds application in many areas
Future of smart cards: more sophisticated
MULTOS loaded smart cards
References

 en.wikipedia.org/wiki/Smart_cards
 www.smartcardbasics.com
 Secure Personal Identification Systems: Policy, Process
and Technology Choices for a Privacy-Sensitive
Solution, Smart Card Alliance white paper, February,
2002 http://www.smartcardalliance.org
 SA Smart Card Handbook
http://www.smart.gov/smartgov/information/smartcardh
andbook.doc
THANK YOU

You might also like