Cryptographic Application of Programmable Smart Cards
نویسندگان
چکیده
In a complex, smart card based system this feature turns smart cards from passive datastorage devices into active computational units. In fact they contain a tamper resistant secure one-chip microcomputer able to execute various cryptographic functions. Moreover, their potential can be extended after the issuance of the card by uploading various new applications. However, the limited resources of the card (e. g. 4Mhz 8-bit processor, 8 kilobytes of storage capacity) require special programming methods and restrictions.
منابع مشابه
A Protocol for Programmable Smart Cards
This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host applications in a unified, card-independent way. Its design, inspired by the standardization of on-card Java language and cryptographic API, has been kept as generic and modular as possible. The protocol security model...
متن کاملPerformance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones
The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major...
متن کاملA Dynamic Current Mode Logic to Counteract Power Analysis Attacks
Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of implementations (e.g. smart cards, ASICs, FPGAs) of cryptographic algorithms. To protect such devices against power analysis attacks, it has been proposed to use a dynamic and differential logic style f...
متن کاملSecure and Efficient Crypto System Based On 128-Bit AES
The AES algorithm was selected in 2000 by the US National Institute of Standards and Technologies (NIST) as a replacement to the Data Encryption Standard (DES) cryptographic algorithm. It is based on Rijndael algorithm which is a symmetric-key algorithm that processes fixed data of 128-bit blocks. The AES algorithm is suited for an efficient implementation on a wide range of processors. It can ...
متن کاملSmart Cards - Requirements, Properties, and Applications
Smart cards play an increasing role as 'active' security devices. Due to its microcomputer and programmable memory, a smart card can cater for the specific needs of the environment it is used in. Smart cards allow the secure handling and storage of sensitive data such as user privileges and cryptographic keys as well as the execution of cryptographic algorithms. They are secure tokens by means ...
متن کامل