Advances in Smartcard Security

نویسنده

  • Marc Witteman
چکیده

Hardware architecture Smartcards come in different shapes. First of all there is a distinction between contact cards and contact-less cards. The first kind is easily recognised by the characteristic contact stamp that appears on both credit-card sized and SIM card sized versions. The second one is more difficult to identify because the chip may be hidden not only inside a credit-card sized container, but also in badges, car keys or labels. Secure tokens like dongles (hardware keys) and other types of smart tokens are related to smartcards, but mostly less complicated. They often implement proprietary hard-encoded encryption, although some newer versions use common algorithms like DES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smartcard Integration with Kerberos V5

We describe our design and implementation of smartcard integration with Kerberos V5. Authentication is among the most important applications for smartcards and is one of the critical requirements for computer security. By augmenting Kerberos V5 with tamper-resistant hardware, we enhance the security of Kerberos V5 and o er a potential \killer application" leading to wider adoption of smartcard ...

متن کامل

Smartcard Integration with Kerberos V5 Smartcard Integration with Kerberos V5

We describe our design and implementation of smartcard integration with Kerberos V5. Authentication is among the most important applications for smartcards and is one of the critical requirements for computer security. By augmenting Kerberos V5 with tamper-resistant hardware, we enhance the security of Kerberos V5 and o er a potential \killer application" leading to wider adoption of smartcard ...

متن کامل

Interleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications

Although smartcards are widely used, secure smartcard interoperability has remained a significant challenge. Usually each manufacturer provides a closed environment for their smartcard based applications including the microchip, associated firmware and application software. While the security of this " package " can be tested and certified for example based on the Common Criteria, the secure an...

متن کامل

SCFS: A UNIX Filesystem for Smartcards

Smartcard software developers su er from the lack of a standard communication framework between a workstation and a smartcard. To address this problem, we extended the UNIX lesystem to provide access to smartcard storage, which enables us to use les in a smartcard as though normal UNIX les, but with the additional security properties inherent to smartcards.

متن کامل

Developing and Testing a Smart Card Application

We present our solution to design and test a security sensitive SmartCard application written in Java using a classical SmartCard. The design concentrates on the modeling of an interface between the user application and the SmartCard. Furthermore, we describe how to test the diierent levels of this interface.

متن کامل

Security Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication

The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity. In such a biometrics-based cardholder authentication system, sensitive data may be transferred between the smartcard and the card reader. In this paper we identify and classify possible threats to the communications link between card and card reader duri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002