Smart Card Technology
Smart Card Technology
Smart Card Technology
3. Security issues
1. Introduction
• • Features
What is a smart card?
• Authentication
• Use of SM’s
• Signatures
• Objectives • SET
• Future views
• HST-project
2. Technology 4. Applications
• Physical structure • Multiple Application Smart Card
• Different types of SM’s Systems
• Chip
• Electronic Smart Passport/Visa
• Standards
• Different applications of the future
Introduction to smart cards
- What is a smart card?
provide the different mixes of applications that various types of cardholder will
want (BUT: rarely accepted at the moment)
Key concept in HST is Electronic ID-card, smart card which contains users
cryptographic keys and certificates.
• With this card and other PKI components person can be digitally identified
in Internet where he or she can use it for example to sign documents.
- Chip / Standards
Physical Structure
Made up of three elements
1. A physical card (plastic)
2. A printed circuit chip
3. An integrated circuit chip (microcontroller)
(Chips are embedded on the card)
Printed circuit conforms to ISO standard 7816/3 which provides five connection
points for power and data
• The printed circuit protects the circuit chip from mechanical stress and static electricity
Chip made from silicon which is not flexible and particularly easy to break
In general, the size, the thickness and bend requirements for the smart card are
designed to protect the card from being spoiled physically
Different types of SM’s
Java cards
SIM cards
eCash cards
Contact / Contactless Smart
Cards
Proximity cards
Hybrid/twin cards
Combi cards
Contact / Contactless Smart Cards
CONTACT: CONTACTLESS:
Cards the size of a conventional Cards containing an embedded
credit or debit card with a single antenna instead of contact pads
embedded integrated circuit chip attached to the chip for reading and
that contains just memory or writing information contained in the
memory plus a microprocessor. chip's memory.
Cards containing two or more embedded chip technologies such as a prox chip
with its antenna and a contact smart chip with its contact pads are Hybrid/twin
cards.
• Uses: Accommodates legacy system infrastructure while adding applications that
require different e-card technologies
The combi card has one smart chip embedded in the card that can be accessed.
This form of smart card is growing in popularity because it provides ease-of-use
and high security in a single card product.
• Uses: Mass transit and access control combined with other applications such as
network security, vending, meal plans, loyalty, etc.
Java card
The Java Card specifications enable Java technology to run on smart cards
and other devices with limited memory
Multi-Application Capable
- Java Card technology enables multiple applications to co-exist securely on a
single smart card
Dynamic:
- New applications can be installed securely
Secure:
- relies on the inherent security of the Java programming language to provide a
secure execution environment.
- platform's proven industry deployments and security evaluations ensure that
card issuers benefit from the most capable and secure technology available
today.
CHIP - What does the chip contain
and what is it made for?
Made for the portable storage and retrieval of data
Used memory types:
• ROM Read only memory (mask ROM)
• PROM Programmable read only memory
• EPROM Erasable programmable ROM
• EEPROM Electrically erasable PROM
• RAM Random access memory
Present projects:
• Smart MEIJI is a joint project designed to reinforce co-operation
between Europe and Japan in the field of smart cards
SECURITY ISSUES
- Features
- Authentication
- Signatures
- SET
Security features
An important aspect to smart cards to prevent unauthorized users from gaining access to
information contained on the card.
The advantage smart cards have over magnetic stripe cards is that the smart card contains
the computer chip which stores the password or PIN.
the password is not sent over a communication line to a computer system for
verification, which can easily be tapped.
most important part of a smart card is the software that provide the applications
It has been established that any secure transaction involves 6 generic functions:
• Data Protection
• Identification of the cardholder
• Mutual authentication
• Secure writing
• Certification or signature
• Encryption
The security imposed to protect the transmission between the card and the outside world
by the mean of cryptographic technique in order to control the:
• writing operation
• authentication the card or the terminal
• origin of the message
• transmission of cryptographic keys
Authentication
The most common method used for cardholder verification at present
is to give the cardholder a PIN (Personal Identification Number)
which he or she has to remember.
Loaded with private key(s), public key certificates and some ways to
point securely to non-repudiation policies
• The loading procedure and the data formats need to be specified.
Any questions ?
2.1 Introduction
2.2 Life cycle of smart card
2.3 Logical Structure
2.4 Access Control
2.1 Introduction
What makes the smart card better than normal magnetic stripe card?
• The advantage smart cards have over magnetic stripe cards is that the
smart card contains the computer chip which stores the password or PIN
• Therefore, the password is not sent over a communication line to a
computer system for verification, which can easily be tapped.
2.2 Life cycle of smart card
Divided into five phases (on most smart cards)
These phases justified by
• Limitation of transfer and access of data is incremental throughout different
phases
• Different areas of smart card protected throughout the life cycle
2.2.1 Fabrication phase
Carried out by the chip manufacturers
A Fabrication Key (KF) is added to protect the chip
• unique and is derived from a master manufacturer key
Fabrication data will be written to the circuit chip
2.2.2 Pre-personalisation phase
Done by Card manufacturers
Chip will be mounted on the plastic card
The connection between the chip and the printed circuit will be made
Fabrication key (KF) changed to Personalisation key (KP)
Personalisation lock Vper
• No further modification of the KF
Physical memory access instructions will be disabled
Access of the card can be done only by using logical memory addressing
2.2.3 Personalisation phase
Conducted by the card issuers
Data files contents and application data are written to the card
Information of card holder stored to the chip (PIN, Unlocking PIN)
Utilisation lock Vutil
• No further modification of the KP
2.2.4 Utilisation phase
Phase for the card owners use of the card
Access of information on the card will be limited by the security
policies set by the application
2.2.5 End-of-Life phase
Two ways:
• 1. invalidation lock
• All operations will be disabled (except read)
• 2. Control system irreversibly blocks access
• All operations will be disabled
2.2.6 Summary of life-cycle
Areas/Phases Fabrication Pre-personalisation Personalisation Utilisation End-of-Life
3.1 Introduction
3.2 Logical attacks
3.3 Physical attacks
3.4 Mathematical attacks
3.5 Conclusions
3.1 Introduction
Target of attacks:
• The secret of the cryptographic algorithm
• The keys stored
• The access control
• Information strored on card
3.2 Logical attacks
Starting point:
• EEPROM (electrically erasable programmable read only memory) write
operations can be affected by unusual voltages and temperatures ->
• information can be trapped by raising or dropping the supplied voltage
to the microcontroller
3.2 Logical attacks (2)
Example 1. Attack of PIC16C84 microcontroller
• Erasing the memory by raising the voltage VCC (Supply voltage) to VPP
(Programming voltage) - 0.5V
3.2 Logical attacks (3)
Example 2. Attack on DS5000 security processor
• A short voltage drop can release the security lock without erasing the
secret data sometimes
3.2 Logical attacks (4)
Example 3. Usage of analogue random generator
• Creates cryptographic keys that will produce an output of almost all 1’s
when the supply voltage is lowered slightly.
3.2 Logical attacks (5)
• Prevention of logical attacks
• some security processors implemented sensors which will cause an
alarm when there is any environmental changes
3.3 Physical attacks
• Invasive physical attacks
• Reverse engineering of the circuit chips
• erasing the security lock bit by focusing UV light on the EPROM
• probing the operation of the circuit by using microprobing needles
• using laser cutter microscopes to explore the chip
3.3 Physical attacks (2)
Example 1. Invasive physical attacks
• Circuit chip removed from the plastic card
• The resin dissolved
• The acid and resin washed away
>>>>> The chip can be examined and attacked directly (only for US $30)
3.3 Physical attacks (3)
Example 2. Attacking by reverse engineering circuit chips (High quality
laboratory needed)
• etching away a layer of a chip at a time
• thin film of a metal attached to chip creating a diode -> filmed with electron beam
• PCs image processing system software used to analyze the pictures
The layout and function of the chip can then be identified
3.3 Physical attacks (4)
also…
• Technique developed by IBM can be used to observe the operation of the
chip. As a result its secret can be fully revealed
3.3 Physical attacks (5)
Prevention of physical attacks
• Acid added to chip when the chip is tampered, acid destroys all vital
information on the chip
3.4 Mathematical attacks
Done by mathematical geniuses
Fully theoretical
• Usage of complicated mathematical calculations and formulas
3.5 Conclusions
Today's, most of the attacks available are classified as attacks where
the cost associated to break the system are far more than the cost of
the system itself, or it has to spend several or hundred years of
computing power to break into a single transaction…
3.5 Conclusions (2)
..but still questions remain:
• Can the PIN code be downloaded by the card reader and then stored
somewhere?
• When signature is used it is still possible that you don’t know what you’re
signing?!