Smart Card Security
Michael Tunstall, Gemplus, France, and Royal Holloway, University of London
Sebastien Petit and Stephanie Porte, Gemplus, France
Different Types of Smart Cards
Chip Decapsulation and Silicon Preparation
Application and Protocol Security
INTRODUCTION
The sheer convenience of smart cards has contributed to their becoming more and more prevalent in a number of sectors today. We use them to withdraw money, to make telephone calls, to access buildings, to pay for goods, or to authenticate ourselves to a computer.
Birth of the Smart Card
Banking needs were the real motivation behind the introduction of the smart card's ancestor, the credit card (Rankl & Effing, 2002). The main objective was to protect payment systems against fraud. The first credit cards were quite simple; only information such as the card's issuer, the cardholder's name, and the card number was printed or embossed on the card. These systems ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.