Smart Cards: Technology for Secure Management of Information
#1


PRESENTED BY:
D.Narasimha Reddy

[attachment=12723]
Smart Cards: Technology for Secure Management of Information
SCOSTA experience
Indian Driving License application
Plastic Cards
Visual identity application
Plain plastic card is enough
Magnetic strip (e.g. credit cards)
Visual data also available in machine readable form
No security of data
Electronic memory cards
Machine readable data
Some security (vendor specific)
Smart Cards
Processor cards (and therefore memory too)
Credit card size
With or without contacts.
Cards have an operating system too.
The OS provides
A standard way of interchanging information
An interpretation of the commands and data.
Cards must interface to a computer or terminal through a standard card reader.
Smart Cards devices
What’s in a Card?
Typical Configurations
256 bytes to 4KB RAM.
8KB to 32KB ROM.
1KB to 32KB EEPROM.
Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional.
8-bit to 16-bit CPU. 8051 based designs are common.
The price of a mid-level chip when produced in bulk is less than US$1.
Smart Card Readers
Dedicated terminals
Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
Terminal/PC Card Interaction
The terminal/PC sends commands to the card (through the serial line).
The card executes the command and sends back the reply.
The terminal/PC cannot directly access memory of the card
data in the card is protected from unauthorized access. This is what makes the card smart.
Communication mechanisms
Communication between smart card and reader is standardized
ISO 7816 standard
Commands are initiated by the terminal
Interpreted by the card OS
Card state is updated
Response is given by the card.
Commands have the following structure
Response from the card include 1..Le bytes followed by Response Code
Security Mechanisms
Password
Card holder’s protection
Cryptographic challenge Response
Entity authentication
Biometric information
Person’s identification
A combination of one or more
Password Verification
Terminal asks the user to provide a password.
Password is sent to Card for verification.
Scheme can be used to permit user authentication.
Not a person identification scheme
Cryptographic verification
Terminal verify card (INTERNAL AUTH)
Terminal sends a random number to card to be hashed or encrypted using a key.
Card provides the hash or cyphertext.
Terminal can know that the card is authentic.
Card needs to verify (EXTERNAL AUTH)
Terminal asks for a challenge and sends the response to card to verify
Card thus know that terminal is authentic.
Primarily for the “Entity Authentication”
Biometric techniques
Finger print identification.
Features of finger prints can be kept on the card (even verified on the card)
Photograph/IRIS pattern etc.
Such information is to be verified by a person. The information can be stored in the card securely.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: project management information technology, hardware kit for gsm based smart information for lost atm cards, gsm based smart information system for lost atm cards abstract, smart cards technology, overview of gsm based smart information system for lost atm cards abstract, gsm based smart information for lost atm cards, smart information systems,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Information Technology Projects? shakir_ali 0 8,908 30-10-2014, 01:31 AM
Last Post: shakir_ali
Rainbow 3G Wireless Technology seminar projects crazy 8 17,083 27-06-2013, 07:58 PM
Last Post: Ashley Brownile
  IEEE based Seminar topics for Information Technology project topics 2 13,320 14-01-2013, 11:12 PM
Last Post: Guest
  Introduction of CDMA TECHNOLOGY computer girl 1 8,753 08-11-2012, 11:53 AM
Last Post: seminar details
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 1 3,089 29-10-2012, 05:31 PM
Last Post: seminar details
  DOMAIN DIMENTIONAL INFORMATION RETRIEVAL SYSTEM computer girl 0 8,610 06-06-2012, 05:03 PM
Last Post: computer girl
  MIMO Technology for Advanced Wireless Local Area Networks project report helper 2 9,726 13-02-2012, 09:56 AM
Last Post: seminar paper
  information technology seminars topics computer science technology 4 72,220 11-02-2012, 12:07 PM
Last Post: seminar addict
  SECURE COGNITIVE MOBILE HOTSPOT seminar class 2 3,044 08-08-2011, 09:54 AM
Last Post: seminar addict
  smart card full report computer science technology 11 10,420 20-06-2011, 10:09 AM
Last Post: smart paper boy

Forum Jump: