Uhvh
Uhvh
FUNCTIONAL PRESENTATION
FP01 SAM and Key Management
Written by: Frederic Levy 7 March 2014
This document contains an introduction to the Calypso SAM functionalities and to the recommended
management of the ticketing secret keys.
Introduction
The Calypso ticketing system security is partly based upon the use of secret keys, stored into
microprocessor cards and into Secure Application Modules (SAM), which act as a real safe for these
data. The knowledge of the keys allows to authenticate the cards or ticket content, and to modify it.
The terminals that dialog with a card or a ticket, at any of their lifecycle phase (manufacturing,
initialization, personalization, use, end of life) must therefore be equipped with a secure module that
allows and limits their possible actions upon the cards and tickets.
Initialization et pre- Personalization Supervision Central System
personalization SAM
SAM
SAM SAM SAM
HSM
Control
Reloading Equipment Validator
Actually, the secure modules (SAM) are also microprocessor smart cards. The information that they
contain are protected by SAM system secret keys (called “SAM keys”). For on-line operations such
as remote loading, an HSM (Hardware Security Module) may be used instead of a SAM.
As for the cards, the personalization, authentication, and modification of the modules requires the
presence, in the terminals processing the modules, of another module ensuring the confidentiality of
the operations.
Initialization Pre-personalization SAM usage
et Personalization (write, certified
read…)
SAM SAM
Furthermore, in order to increase the system security, the modules are not all identical. A module
only contains the keys necessary for its use, each of the key being limited only to the necessary
actions (ciphering, personalization, etc.).
The number of usages of any key may be traced with a counter, which maximum value (its “ceiling”)
may be securely managed to limit the key usage.
The SAM does not interpret the data exchanged with the card, but only authorizes the card
modification, or generates and verifies the data signatures.
However, a configurable mechanism called “CAAD” allows controlling the card data modification
according to the data location in the card, or to markers at the beginning of the card data.
The security architecture may need to be adapted to the requirements of a specific network.
SAM-CPP
Card
Pre-personalization Embedder
Partial key
OPMS of authority X
A4F57...
SAM-CP
Authority OPMS Card Personalization
OPMS Personalizer
194E2... SAM-SP
Sam
OPMS Authorities Operator
Personalization
SAM-SL
Sam Load
Partial key
Authority of authority Y Sam Supervision
SAM-CL
Card/Ticket
Load
194E2...
Selling Machine
After manufacturing the SAM must be managed according to their level of importance. For example,
the master SAM, which allows manufacturing of other SAM must always be protected and kept in a
secure safe.
References
Modifications History
7-03-2014 Added: AES, counters and ceilings, CAAD, and www.CalypsoStandard.net registration.
Editorial improvements.
8-12-2010 Added: HSM and triple DES.
Removed DES (deprecated).
Updated ceremony diagram.
Editorial improvements.
15-01-2003 Creation
Spirtech
29 rue du Louvre • 75002 PARIS • FRANCE
[email protected]