700 likes | 1.19k Vues
Smart Card. 李開振 , 許家碩 Department of Computer Science National Chiao Tung University. Outline 1/2. Introductions History, Application area, Standardization Types of Cards Embossed cards, magnetic-stripe cards, Smart Card, Optical Memory Card Physical and Electrical properties
E N D
Smart Card 李開振, 許家碩 Department of Computer Science National Chiao Tung University
Outline 1/2 • Introductions • History, Application area, Standardization • Types of Cards • Embossed cards, magnetic-stripe cards, Smart Card, Optical Memory Card • Physical and Electrical properties • Smart Card Operation System • Design, files management, sequential control, Open platform • Smart Card Data Transmission • Data transmission Protocols, message structure (APDU) • Smart Card Commands
Outline 2/2 • Security Techniques • Smart Card Terminals • The Smart Card Life Cycle • The five phases of the Smart Card life Cycle • Smart Card in Payment Systems • Payment transactions, Prepaid Memory Card, Electronic Purses • Smart Card in Telecommunications • GSM, UMTS, Wireless Identification Module, Public Card Phones • Application Design
Introductions - History • 1950s - The proliferation of plastic cards started in the USA • 1970s - It possible to integrate data storage and processing logic on a single silicon chip • 1974 - Roland Moreno registered his smart card patents in France • 1984 - The French PTT (postal and telecommunications services agency) successfully carried out a field trial with telephone cards
Application area • Memory Card
Application area • Microprocessor cards
Application area • Contactless cards
Standardization • ISO TC68/SC6 • ISO/IEC JTC1/SC17 • ISO/IEC 7816 • GSM 11.11 European Telecommunications Standards Institute (ETSI)
Types of Cards • Embossed Card • Magnetic-stripe cards • Smart Card
Smart Card Microcontrollers • processor • address and data buses • three types of memory (RAM, ROM and EEPROM) • Input/Output
Types of card - Optical Memory Card • ISO/IEC 11 693 and 11 694
Physical properties • Physical properties - ID1: • external rectangle: width: 85.72 mm, height: 54.03 mm • internal rectangle: width: 85.46 mm, height: 53.92 mm
Physical properties • ID000: • external rectangle: width: 25.10 mm, height: 15.10 mm • internal rectangle: width: 24.90 mm, height: 14.90 mm
Physical properties • ID00: • external rectangle: width: 66.10 mm, height: 33.10 mm • internal rectangle: width: 65.90 mm, height: 32.90 mm
Smart Card Operation System • The primary tasks of a smart card operating system • Transferring data to and from the smart card • Controlling the execution of commands • Managing files • Managing and executing cryptographic algorithms • Managing and executing program code.
Protocol state machine Send block Receive block Send byte Receive byte Send bit Receive bit Hardware Data flow Smart Card OS - I/O • I/O manager
Smart Card OS - Filesystem • Master File (MF) • The root directory of the filesystem • Dedicated File (DF) • directory files • Elementary File (EF) • hold the actual user data
MF EF EF DF ... EF ... DF DF ... EF ... Smart Card OS - Filesystem
Byte number 0 1 2 3 4 5 …………………………. n Offset Data Filesystem - EF file structure • Transparent file structure • Transparent file structure is often referred to as a binary structure.
Byte number 0 1 2 3 4 5 n 1 2 3 4 m Record Number Filesystem - EF file structure • Linear Fixed file structure • data structure is based on chaining fixed-length records
Byte number 0 1 2 3 4 5 n 1 2 3 4 m Record Number Filesystem - EF file structure • Linear variable file structure • each record can have an individually defined length
Smart Card Data Transmission • Answer to Reset (ATR)
high 1 2 3 4 5 6 7 8 low t Start bit Parity bit Data transmission • Structure of a character for data transmission
(a) Logic 1 high 1 2 3 4 5 6 7 8 low t Logic 1 (b) Logic 0 high 1 2 3 4 5 6 7 8 low t Logic 1 Data transmission conventions • (a) direct convention, (b) inverse convention
Message structure (APDU) • Structure of the command APDU
Message structure (APDU) • Structure of the response APDU
Smart Card Commands • File selection Command • Read and Write Command • Search Command • File Manipulation Commands • Identification Commands • Authentication Commands • File management Commands
Security Techniques • User Identification • Symmetric unilateral Authentication • Asymmetric unilateral Authentication • Symmetric mutual Authentication • Smart Security • Attacks at the social level • Attacks at the physical level • Attacks at the logical level
Attack on smart cards 1/2 • Attacks at the social level • attacks that are primarily directed against people that work with smart cards • can only partially be countered by technical measures • Attacks at the physical level • it is necessary to obtain physical access to the smart card microcontroller hardware • can be static or dynamic
Attack on smart cards 2/2 • Attacks at the logical level • most known successful attacks on smart cards • arise from pure mental reflection or computation • classical cryptanalysis , known faults in smart card operating systems and Trojan horses in the smart card application.