Smart Card Security

Michael Tunstall, Gemplus, France, and Royal Holloway, University of London

Sebastien Petit and Stephanie Porte, Gemplus, France

Introduction

Birth of the Smart Card

Different Types of Smart Cards

Smart Card Architecture

Smart Card Standardization

Hardware Security

Chip Decapsulation and Silicon Preparation

Chip Reverse Engineering

Retrieving Data from Memory

Chip Modification Techniques

Hardware Countermeasures

Side Channel Analysis

Timing Analysis

Simple Power Analysis

Statistical Power Analysis

Electromagnetic Analysis

Countermeasures

Fault Analysis

Injection Techniques

Attacking an Algorithm

Countermeasures

Application and Protocol Security

General Smart Card Security

3G Network Security

Other Uses

Security Evaluation

Common Criteria

FIPS 140-2

Conclusion

Glossary

Cross References

References

INTRODUCTION

The sheer convenience of smart cards has contributed to their becoming more and more prevalent in a number of sectors today. We use them to withdraw money, to make telephone calls, to access buildings, to pay for goods, or to authenticate ourselves to a computer.

Birth of the Smart Card

Banking needs were the real motivation behind the introduction of the smart card's ancestor, the credit card (Rankl & Effing, 2002). The main objective was to protect payment systems against fraud. The first credit cards were quite simple; only information such as the card's issuer, the cardholder's name, and the card number was printed or embossed on the card. These systems ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.