Advances in Smartcard Security
نویسنده
چکیده
Hardware architecture Smartcards come in different shapes. First of all there is a distinction between contact cards and contact-less cards. The first kind is easily recognised by the characteristic contact stamp that appears on both credit-card sized and SIM card sized versions. The second one is more difficult to identify because the chip may be hidden not only inside a credit-card sized container, but also in badges, car keys or labels. Secure tokens like dongles (hardware keys) and other types of smart tokens are related to smartcards, but mostly less complicated. They often implement proprietary hard-encoded encryption, although some newer versions use common algorithms like DES.
منابع مشابه
Smartcard Integration with Kerberos V5
We describe our design and implementation of smartcard integration with Kerberos V5. Authentication is among the most important applications for smartcards and is one of the critical requirements for computer security. By augmenting Kerberos V5 with tamper-resistant hardware, we enhance the security of Kerberos V5 and o er a potential \killer application" leading to wider adoption of smartcard ...
متن کاملSmartcard Integration with Kerberos V5 Smartcard Integration with Kerberos V5
We describe our design and implementation of smartcard integration with Kerberos V5. Authentication is among the most important applications for smartcards and is one of the critical requirements for computer security. By augmenting Kerberos V5 with tamper-resistant hardware, we enhance the security of Kerberos V5 and o er a potential \killer application" leading to wider adoption of smartcard ...
متن کاملInterleaving Commands: a Threat to the Interoperability of Smartcard Based Security Applications
Although smartcards are widely used, secure smartcard interoperability has remained a significant challenge. Usually each manufacturer provides a closed environment for their smartcard based applications including the microchip, associated firmware and application software. While the security of this " package " can be tested and certified for example based on the Common Criteria, the secure an...
متن کاملSCFS: A UNIX Filesystem for Smartcards
Smartcard software developers su er from the lack of a standard communication framework between a workstation and a smartcard. To address this problem, we extended the UNIX lesystem to provide access to smartcard storage, which enables us to use les in a smartcard as though normal UNIX les, but with the additional security properties inherent to smartcards.
متن کاملDeveloping and Testing a Smart Card Application
We present our solution to design and test a security sensitive SmartCard application written in Java using a classical SmartCard. The design concentrates on the modeling of an interface between the user application and the SmartCard. Furthermore, we describe how to test the diierent levels of this interface.
متن کاملSecurity Analysis of Smartcard to Card Reader Communications for Biometric Cardholder Authentication
The use of biometrics, and fingerprint recognition in particular, for cardholder authentication in smartcard systems is growing in popularity. In such a biometrics-based cardholder authentication system, sensitive data may be transferred between the smartcard and the card reader. In this paper we identify and classify possible threats to the communications link between card and card reader duri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002