Mayes / Markantonakis | Smart Cards, Tokens, Security and Applications | E-Book | www.sack.de
E-Book

E-Book, Englisch, 392 Seiten

Mayes / Markantonakis Smart Cards, Tokens, Security and Applications


1. Auflage 2007
ISBN: 978-0-387-72198-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 392 Seiten

ISBN: 978-0-387-72198-9
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Providing a broad overview of the many card systems and solutions in practical use today, this state-of-the art work is written by contributing authors who are active researchers and acknowledged experts in their field. A single book cannot be found to match both the breadth and depth of content. The book combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study. A step-by-step approach educates the reader and by the end of the book the reader should be able to play an educated role in a smart card related project.

Mayes / Markantonakis Smart Cards, Tokens, Security and Applications jetzt bestellen!

Weitere Infos & Material


1;Founders Message;6
2;Foreword;7
3;Preface;9
3.1;Structure of the book;9
4;Acknowledgements;12
5;Contents;13
6;List of Figures;21
7;List of Tables;25
8;List of Contributors;27
9;List of Reviewers;32
10;An Introduction to Smart Cards;33
10.1;1.1 Introduction;33
10.2;1.2 What is a Smart Card?;34
10.2.1;1.2.1 Magnetic Stripe Cards;34
10.2.2;1.2.2 Chip Cards;37
10.2.3;1.2.3 Microprocessor Chip Cards;38
10.2.4;1.2.4 Contact-less Smart Cards and RFIDs;38
10.2.5;1.2.5 Smart Tokens;39
10.3;1.3 Smart Card Chips;40
10.4;1.4 Tamper Resistance;43
10.5;1.5 Smart Card Characteristics;44
10.6;1.6 Issuer Control;45
10.7;1.7 Current Applications for Smart Cards;46
10.7.1;1.7.1 Mobile Telephony;47
10.7.2;1.7.2 Banking;49
10.7.3;1.7.3 Transport;49
10.7.4;1.7.4 Identity and Passports;50
10.7.5;1.7.5 Entitlement and Health;50
10.7.6;1.7.6 Physical and IT Access Control;51
10.7.7;1.7.7 Satellite TV;52
10.8;1.8 Smart Card Application Development;52
10.9;1.9 Development, Roll-Out and Lifecycle Management Issues;54
10.10;1.10 In Conclusion;55
10.11;Acknowledgement;56
10.12;References;56
11;Smart Card Production Environment;58
11.1;2.1 Introduction;58
11.2;2.2 Smart Card Production Steps ;60
11.2.1;2.2.1 Overview;60
11.2.2;2.2.2 Card Body Manufacturing;60
11.2.3;2.2.3 Personalization and related Services;66
11.2.4;2.2.4 Security and Quality;75
11.2.5;2.2.5 Current Trends;77
11.3;2.3 In Conclusion;79
11.4;Useful Websites;79
11.5;Glossary;80
11.6;References;81
12;Multi Application Smart Card Platforms and Operating Systems;82
12.1;3.1 Introduction;82
12.1.1;3.1.1 Smart card Platform Evolution;83
12.2;3.2 Java Card;86
12.2.1;3.2.1 Java Card Forum;86
12.2.2;3.2.2 Java Card Technology;87
12.3;3.3 GlobalPlatform;95
12.3.1;3.3.1 The GlobalPlatform Association;95
12.3.2;3.3.2 The GlobalPlatform Card Specification;96
12.4;3.4 Multos;103
12.4.1;3.4.1 The MULTOS Consortium;103
12.4.2;3.4.2 MULTOS Specification;104
12.4.3;3.4.3 The Multos Card Architecture;104
12.4.4;3.4.4 Multos Executable Language (MEL);104
12.4.5;3.4.5 The Application Abstract Machine;106
12.4.6;3.4.6 Application Loading and Deletion;106
12.4.7;3.4.7 Communicating with a Multos Smart Card;107
12.4.8;3.4.8 Multos Files;107
12.4.9;3.4.9 Multos Security Features;107
12.5;3.5 Smartcard.NET Card;108
12.6;3.6 BasicCard;109
12.7;3.7 WfSC;109
12.8;3.8 Conclusions;110
12.9;Acknowledgement;111
12.10;References;111
13;Smart Cards for Mobile Communications;115
13.1;4.1 Introduction;115
13.2;4.2 SIM/USIM Standards;117
13.3;4.3 Subscriber Identity and Authentication;119
13.3.1;4.3.1 So how does SIM Authentication Work?;121
13.3.2;4.3.2 3G/USIM Authentication/Ciphering;122
13.3.3;4.3.3 SIM/USIM Authentication Algorithms;126
13.4;4.4 General Added Features;127
13.4.1;4.4.1 Phone Book;127
13.4.2;4.4.2 Roaming list;128
13.4.3;4.4.3 SMS Settings and Storage;128
13.4.4;4.4.4 Last Dialled numbers;129
13.4.5;4.4.5 Access Control Class;129
13.4.6;4.4.6 GPRS Authentication and encryption files;129
13.5;4.5 File Types;129
13.6;4.6 SIMs and USIMs Some Practical Comparisons;130
13.7;4.7 (U)SIM Value Added Services;133
13.8;4.8 The (U)SIM as a Handset Security Module;137
13.9;4.9 The Future Evolution of the (U)SIM;138
13.10;4.10 Conclusions;141
13.11;References;142
14;Smart cards for Banking and Finance;144
14.1;5.1 Introduction;144
14.2;5.2 Payment Card Technologies;145
14.2.1;5.2.1 Magnetic Stripe Cards;147
14.3;5.3 Smart Cards and EMV;149
14.3.1;5.3.1 Card Authentication;150
14.4;5.4 Cardholder Not Present Transactions;154
14.4.1;5.4.1 Purchase from a Genuine Merchant Using Someone Else’s Payment Details;155
14.4.2;5.4.2 Genuine Purchaser Buying from a Rogue Merchant;155
14.4.3;5.4.3 Third Party Attacker;156
14.5;5.5 Dynamic Passcode Authentication;157
14.6;5.6 Could a Mobile Phone be a Token Reader?;160
14.7;5.7 Token Authentication Examples;161
14.8;5.8 E-Commerce Solutions;162
14.8.1;5.8.1 3D-Secure;162
14.8.2;5.8.2 Thoughts on 3D Secure;165
14.9;5.9 Just Wave Your Card to Pay;165
14.10;5.10 Concluding Remarks;166
14.11;References;166
15;Security For Video Broadcasting;168
15.1;6.1 Introduction;168
15.2;6.2 Digital Video Basics;170
15.3;6.3 Scrambling;171
15.4;6.4 Synchronisation;172
15.5;6.5 Key Delivery;173
15.6;6.6 Access Requirements;174
15.7;6.7 Key Hierarchy;175
15.8;6.8 Implementation;176
15.9;6.9 In Conclusion;181
15.10;References;182
16;Introduction to the TPM;184
16.1;7.1 Introduction;184
16.2;7.2 Trusted Platforms;185
16.2.1;7.2.1 Fundamental Features of a Trusted Platform;186
16.2.2;7.2.2 Additional Features;188
16.3;7.3 TPM Features;189
16.3.1;7.3.1 TPM Components;189
16.3.2;7.3.2 I/O Block;189
16.3.3;7.3.3 Non-Volatile Storage;190
16.3.4;7.3.4 Attestation Identity Keys;191
16.3.5;7.3.5 Platform Configuration Registers;192
16.3.6;7.3.6 Programme Code;192
16.3.7;7.3.7 Execution Engine;192
16.3.8;7.3.8 Random Number Generator;193
16.3.9;7.3.9 SHA-1 Engine;193
16.3.10;7.3.10 RSA Key Generation;193
16.3.11;7.3.11 RSA Engine;194
16.3.12;7.3.12 Opt-In;194
16.3.13;7.3.13 Other Features;196
16.4;7.4 TPM Services;196
16.4.1;7.4.1 Roots of Trust;196
16.4.2;7.4.2 Boot Process;197
16.4.3;7.4.3 Secure Storage;197
16.4.4;7.4.4 Attestation;198
16.5;7.5 In Conclusion;200
16.6;References;200
17;Common Criteria;202
17.1;8.1 Introduction;202
17.2;8.2 Evolution of National and International Standards;203
17.2.1;8.2.1 International Recognition;204
17.2.2;8.2.2 The need for security benchmarks;205
17.3;8.3 Evaluation Practicalities;206
17.3.1;8.3.1 Types of evaluation;207
17.3.2;8.3.2 Evaluation Assurance Levels;208
17.3.3;8.3.3 Augmentation of Assurance Levels;208
17.4;8.4 Evaluation Roles;209
17.4.1;8.4.1 Performing Evaluations;210
17.5;8.5 Developing Protection Profiles and Security Targets;211
17.5.1;8.5.1 Establish the security environment;211
17.5.2;8.5.2 Establish Security Objectives;212
17.5.3;8.5.3 Establish Security Requirements;212
17.5.4;8.5.4 Establish TOE Summary Specification;213
17.5.5;8.5.5 Establish Rationale;213
17.5.6;8.5.6 Claiming Compliance with Protection Profiles;214
17.6;8.6 An Example;214
17.6.1;8.6.1 Establish the Security Environment;215
17.6.2;8.6.2 Establish security objectives;215
17.6.3;8.6.3 Establish Security Requirements;216
17.6.4;8.6.4 Establish TOE summary specification;217
17.6.5;8.6.5 Establish Rationale;218
17.7;8.7 Deliverables;218
17.8;8.8 Evaluation Composition;219
17.9;8.9 In Conclusion;221
17.10;Useful Websites;221
17.11;Glossary;222
17.12;References;222
18;Smart Card Security;224
18.1;9.1 Introduction;224
18.2;9.2 Cryptographic Algorithms;226
18.2.1;9.2.1 Data Encryption Standard;226
18.2.2;9.2.2 RSA;228
18.3;9.3 Smart Card Security Features;231
18.3.1;9.3.1 Communication;231
18.3.2;9.3.2 Cryptographic Coprocessors;232
18.3.3;9.3.3 Random Number Generators;233
18.3.4;9.3.4 Anomaly Sensors;234
18.3.5;9.3.5 Chip Features;234
18.4;9.4 Side Channel Analysis;236
18.4.1;9.4.1 Timing Analysis;236
18.4.2;9.4.2 Power Analysis;237
18.4.3;9.4.3 Electromagnetic Analysis;242
18.4.4;9.4.4 Countermeasures;243
18.5;9.5 Fault Analysis;245
18.5.1;9.5.1 Fault Injection Mechanisms;246
18.5.2;9.5.2 Modelling the Effect of a Fault;247
18.5.3;9.5.3 Faults in Cryptographic Algorithms;247
18.5.4;9.5.4 Countermeasures;250
18.6;9.6 Embedded Software Design;251
18.6.1;9.6.1 PIN Verification;251
18.6.2;9.6.2 File Access;253
18.7;9.7 In Conclusion;254
18.8;References;254
19;Application Development Environments for Java and SIM Toolkit;258
19.1;10.1 Introduction;258
19.1.1;10.2.1 Limitations;260
19.2;10.2 Smart Cards Characteristics;259
19.3;10.3 SIM Cards;261
19.4;10.4 Java Card;262
19.4.1;10.4.1 The Java Card Framework;264
19.5;10.5 Java SIM;267
19.5.1;10.5.1 sim.toolkit;268
19.5.2;10.5.2 sim.access;271
19.6;10.6 Application Development Tools;272
19.6.1;10.6.1 Compilers & Integrated Development Environments;272
19.6.2;10.6.2 Simulators;273
19.6.3;10.6.3 Protocol Analysis (Spy) Tools;274
19.6.4;10.6.4 Utilities;275
19.7;10.7 Mobile Phone Applications and the (U)SIM;276
19.7.1;10.7.1 SATSA;277
19.7.2;10.7.2 A Word on Testing;279
19.7.3;10.7.3 SIM Dongle Example;280
19.8;10.8 Looking To The Future;282
19.9;10.9 Concluding Remarks;282
19.10;References;283
20;OTA and Secure SIM Lifecycle Management;285
20.1;11.1 Introduction;286
20.2;11.2 The SIM Card As A Managed Platform;286
20.2.1;11.2.1 Common Stored and Managed Data;287
20.2.2;11.2.2 SIM Application Toolkit Interface SAT;288
20.2.3;11.2.3 Main Differences Between a SIM and a UICC/USIM Card;292
20.3;11.3 OTA - Over-The-Air Management;293
20.3.1;11.3.1 OTA Server Capabilities;295
20.4;11.4 Limitations and Improvements;296
20.4.1;11.4.1 Customer Managed Applications;298
20.5;11.5 SIM Lifecycle Management;299
20.6;11.6 In Conclusion;302
20.7;References;303
21;Smart Card Reader APIS;304
21.1;12.1 Terminology: Smart Card Reader, IFD, CAD and Terminal;304
21.2;12.2 OCF: OpenCard Framework;306
21.2.1;12.2.1 Overview;306
21.2.2;12.2.2 Example;308
21.3;12.3 PC/SC;309
21.3.1;12.3.1 Overview;309
21.3.2;12.3.2 Architecture;309
21.3.3;12.3.3 Various Implementations;312
21.3.4;12.3.4 Wrappers;315
21.3.5;12.3.5 Examples;316
21.4;12.4 STIP;318
21.5;12.5 In Conclusion;318
21.6;Acknowledgement;319
21.7;References;319
22;RFID and Contactless Technology;321
22.1;13.1 Introduction;321
22.2;13.2 Contactless Technology;322
22.2.1;13.2.1 Applications;325
22.3;13.3 Radio Frequency Interface;327
22.3.1;13.3.1 Communication Theory;328
22.3.2;13.3.2 Inductive Coupling;331
22.4;13.4 Standards;337
22.4.1;13.4.1 ISO 14443;337
22.4.2;13.4.2 ISO 15693;343
22.4.3;13.4.3 ISO 18000;345
22.4.4;13.4.4 ISO 18092/NFC;346
22.5;13.5 Conclusion;347
22.6;References;347
23;ID CARDS AND PASSPORTS;349
23.1;14.1 Introduction;349
23.2;14.2 ID Cards;350
23.2.1;14.2.1 Requirements and Constituents of Modern National ID Cards;350
23.2.2;14.2.2 International Standards for ID Cards;357
23.2.3;14.2.3 Optical Personalisation of ID Cards;359
23.2.4;14.2.4 Countries and Their ID Cards;363
23.3;14.3 E-Passports ;365
23.3.1;14.3.1 Introduction;365
23.3.2;14.3.2 Constituents of Passports;367
23.3.3;14.3.3 EU and ICAO Requirements;369
23.3.4;14.3.4 Security Protocols;370
23.4;14.4 Conclusion;371
23.5;References;371
24;Smart Card Technology Trends;372
24.1;15.1 Trends In Smart Card Technology – Today And The Future;372
24.1.1;15.1.1 History;373
24.1.2;15.1.2 Technology Choices;376
24.1.3;15.1.3 Technology Drivers;380
24.1.4;15.1.4 Technology Trends;389
24.1.5;15.1.5 Emerging Applications;395
24.2;15.2 Conclusions;401
24.3;References;402
25;Source Code for Chapter 12;405
25.1;A.1 C Language;405
25.2;A.2 Perl Language;409
26;Index;411



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.