SMART CARD CONTENT SECURITY
#1

ABSTRACT
Smart Cards are often touted as “secure” portable storage devices. A complete, high-level design
metodology has been proposed for embedded information systems based on smart card devices.
However, this metodology takes as granted that informations stored on the card will be really
securely stored, and access control will be correctly maintained. Unfortunately, standards and
specifications, created by hardware and software vendors for both the card hardware and the micro
operating system which runs it have been repeatedly proven not as secure as they are commonly
supposed to be.
In this paper we try to analyze the faults in existing standards and implementations of content
security for smart card embedded information systems, and we try to suggest possible ways (both
hardware and software) to prevent security leaks. This paper does not provide breaking news, but
rather tries to sum up the known techniquest to attack smart card devices.
1 SMART CARD CONCEPTS
1.1 CARD TYPES. WHAT IS SMART ?

The International Organization for Standardization (ISO) standard 78101 "Identification Cards –
Physical Characteristics" defines physical properties such as flexibility, temperature resistance, and
dimensions for three different card formats (ID-1, ID-2, and ID-3).
There are different types of ID-1 format cards, each specified by a different substandard2:
Embossed cards: embossing allows for textual information or designs on the card to be transferred
to paper by using a simple and inexpensive device. ISO 78113 specifies the embossed marks,
covering their form, size, embossing height, and positioning. Transfer of information via embossing
may seem primitive, but the simplicity of the system has made worldwide proliferation possible.
Magnetic Stripe: the primary advantage that magnetic stripe technology offers over embossing is
a reduction in the flood of paper documents. Parts 2, 4, and 5 of ISO 7811 specify the properties of
the magnetic stripe, coding techniques, and positioning. The stripe’s storage capacity is about 1000
bits and anyone with the appropriate read/write device can view or alter the data.
Integrated Circuit cards (smart cards): these are the newest and most clever additions to the ID-1
family, and they also follow the details laid down in the ISO 78164 series. These types of cards
allow far greater orders of magnitude in terms of data storage – cards with over 20 Kbytes of
memory are currently available. Also, and perhaps most important, the stored data can be protected
against unauthorized access and tampering. Memory functions such as reading, writing, and erasing
can be linked to specific conditions, controlled by both hardware and software. Another advantage
of smartcards over magnetic stripe cards is that they are more reliable and have longer expected
lifetimes.
Memory Cards: though often also referred to as smartcards, memory cards are typically much less
expensive and much less functional than microprocessor cards. They contain EEPROM and ROM
memory, as well as some address and security logic. In the simplest designs, logic exists to prevent
writing and erasing of the data. More complex designs allow for memory read access to be
restricted. Since they cannot directly manipulate data they are dependent on the card reader (also
known as the card-accepting device) for their processing and are suitable for uses where the card
performs a fixed operation. Typical memory card applications are pre-paid telephone cards and
health insurance cards.
Contactless Smartcards: though the reliability of smartcard contacts has improved to very
acceptable levels over the years, contacts are one of the most frequent failure points any
electromechanical system due to dirt, wear, etc. The contactless card solves this problem and also
provides the issuer an interesting range of new possibilities during use. Cards need no longer be
inserted into a reader, which could improve end user acceptance. No chip contacts are visible on the
surface of the card so that card graphics can express more freedom. Still, despite these benefits,
contactless cards have not yet seen wide acceptance. The cost is higher and not enough experience
has been gained to make the technology reliable. Nevertheless, this elegant solution will likely have
its day in the sun at some time in the future.
Optical Memory Cards: ISO/IEC standards 116935 and 116946 define standards for optical
memory cards. These cards look like a card with a piece of a CD glued on top - which is basically
what they are. They can carry many megabytes of data, but can only be written once and never
erased with today’s technology. Today, these cards have no processor in them (although this is
coming in the near future). While the cards are comparable in price to chip cards, the card read and
write devices use non-standard protocols and are still very expensive. However such cards may find
use in applications such as health care where large amounts of data must be stored


DOWNLOAD FULL REPORT
http://home.dei.polimi.it/zanero/papers/scsecurity.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: content security cluster solution, smartcards, abstract on web content security, smart card security systems project report, smart water electrolyte content, hydroforming embossing, powered by mybb security card,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  CREDIT CARD APPROVAL SYSTEM project report helper 6 5,842 15-01-2018, 04:12 PM
Last Post: Guest
  Cloud Computing Security: From Single to Multi-Clouds 1 832 14-02-2017, 04:56 PM
Last Post: jaseela123d
  SMART CLASS seminar class 6 4,335 08-08-2016, 03:00 PM
Last Post: jaseela123d
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Content-based image retrieval (CBIR) System project topics 15 13,767 13-05-2016, 02:30 PM
Last Post: dhanabhagya
  Security system using IP camera mechanical engineering crazy 5 4,378 16-03-2015, 02:52 PM
Last Post: seminar report asees
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,268 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,707 11-09-2014, 07:45 PM
Last Post: erhhk
  Credit Card Fraud Detection Using Hidden Markov Models alagaddonjuan 28 20,661 04-09-2014, 11:31 PM
Last Post: Charlescic
  Citizen card system project topics 12 10,848 14-10-2013, 08:39 PM
Last Post: Guest

Forum Jump: