DOC PREVIEW
MASON ECE 636 - Survey of Cryptographic Smart Card Capabilities and Vulnerabilities

This preview shows page 1-2-22-23 out of 23 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 23 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Survey of Cryptographic Smart CardCapabilities and Vulnerabilitiesby Ronald WardSecure Telecommunications, ECE 636May 5, 2001iiTable of Contents1. Introduction .................................................................................................................................... 12. Smart Card Interface and Readers.................................................................................................... 13. Smart Card Applications ................................................................................................................. 23.1. General Applications .................................................................................................................. 23.2. Multiple Application Smart Cards............................................................................................... 33.3. Future Applications .................................................................................................................... 44. Smart Card Markets ........................................................................................................................ 55. Smart Card Vendors........................................................................................................................ 66. Smart Card Reliability..................................................................................................................... 77. Smart Card Cryptographic Co-Processors........................................................................................ 87.1. Manufactures of Cryptographic Co-Processors............................................................................ 87.2. Comparison of Cryptographic Co-Processors .............................................................................. 97.3. RSA, DSA and ECC................................................................................................................. 128. Smart Card Security Attacks.......................................................................................................... 138.1. Non-invasive Attacks................................................................................................................ 138.2. Invasive Attacks ....................................................................................................................... 148.3. Smart Cards and Trust Splits..................................................................................................... 169. Conclusions .................................................................................................................................. 1710. References .................................................................................................................................... 19Table of Figures and TablesFigure 1: ISO 7816-2 Smart Card Physical Interface ................................................................................. 2Figure 2: Millions of Smart Card Shipments per Market Sector in 1999 [ES99a]....................................... 5Figure 3: Geographic Distribution of Smart Card Shipments [ES99b]........................................................ 6Table 1: Smart Card Vendors.................................................................................................................... 6Figure 4: Percentage of cards returned over time....................................................................................... 8Figure 5: Comparison of Characteristics of Crypto Co-Processors 1996 vs 1998........................................ 9Figure 6: Time of Cryptographic Operations in Siemens Chips 1996 vs 1998.......................................... 10Figure 7: Time of Cryptographic Operations in Philips Chips 1996 vs 1998 ............................................ 10Figure 8: Time of Cryptographic Operations in Thomson's Chips 1996 vs 1998....................................... 11Figure 9: Average Time of Cryptographic Operations 1996 vs 1998........................................................ 11Table 2: Projections for Cryptographic Co-Processors Available in 2000................................................. 12Figure 10: Shamir's Countermeasure for Power Analysis [Sh00] ............................................................. 14Figure 11: Hot fuming nitric acid dissolves the package [KK99] ............................................................. 15Figure 12: The chip is glued to a test package using a manual bonding machine [KK99]......................... 15Figure 13: Smart card processor ready for microprobing experiments. [KA96] ....................................... 1511. IntroductionIn "The dawn of time " (La nuit des temps) the science fiction writer René Barjavelwrote about the Gondas- a civilization thousands of years old, but highly advanced,-usinga magic ring endowed with the power of memorization and telecommunication. "Everytime a Gonda wanted something new, some clothes, a trip, some objects, he would paywith his key. He would bend his middle finger, would enter his key and his account at thecentral computer would immediately be reduced by the value of the merchandise or therequested service." [Ugo01]Smart cards made their debut in the 1970s. They are practically ubiquitous in certainparts of the world now, and the concept of embedding computer chips in other portabledevices has really caught on in the last decade. Sun Microsystems, for instance,advertises iButton, which can be used for data storage, encryption and temperaturemeasurements. It can be mounted on almost anything including a “magic” ring asconceptualized by Barjavel. Over the last few decades the demand for smart cards andsimilar devices has steadily increased. The demand has mostly come from largeorganizations such as mobile telephone companies, national administrations andinsurance companies. More recently, demand for smart cards and their innovativecapabilities has come from the growing e-commerce and home-networking industries.The capabilities and processing speeds of smart cards have also increased to meet thedemand.A recent article in Scientific American reported that cryptographic smart cards rangein price from less than $1 to about $20 [Fa96]. Another source indicates that acryptographic smart card generally costs $12 to $15 [Kin99]. By comparison, a typicalmagnetic stripe card costs 10 to 50 cents. A smart card reader generally costs $500[Kin99].A typical


View Full Document

MASON ECE 636 - Survey of Cryptographic Smart Card Capabilities and Vulnerabilities

Documents in this Course
Load more
Download Survey of Cryptographic Smart Card Capabilities and Vulnerabilities
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Survey of Cryptographic Smart Card Capabilities and Vulnerabilities and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Survey of Cryptographic Smart Card Capabilities and Vulnerabilities 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?