SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Cutting Edge 2005 workshop, IIT Kanpur




                   Smart Cards: Technology
                   for Secure Management
                   of Information
                   Rajat Moona
                   Computer Science and Engineering
                   IIT Kanpur
                   moona@iitk.ac.in
Agenda

                                          Machine readable plastic cards
Cutting Edge 2005 workshop, IIT Kanpur




                                          What are smart cards

                                          Security mechanisms

                                          Applications

                                          SCOSTA experience

                                          Indian Driving License application
Plastic Cards
                                            Visual identity application
                                              Plain   plastic card is enough
Cutting Edge 2005 workshop, IIT Kanpur




                                            Magnetic strip (e.g. credit cards)
                                              Visualdata also available in machine
                                               readable form
                                              No security of data

                                            Electronic memory cards
                                              Machine readable data
                                              Some security (vendor specific)
Smart Cards
                                            Processor cards (and therefore memory too)
                                             Credit card size
Cutting Edge 2005 workshop, IIT Kanpur




                                         
                                              With   or without contacts.
                                            Cards have an operating system too.
                                            The OS provides
                                             A  standard way of interchanging information
                                              An interpretation of the commands and data.

                                            Cards must interface to a computer or
                                             terminal through a standard card reader.
Smart Cards devices
Cutting Edge 2005 workshop, IIT Kanpur




                                                                  GND
                                                          VCC
                                                                  VPP
                                                          Reset
                                                                  I/O
                                                         Clock
                                                     Reserved
What’s in a Card?
Cutting Edge 2005 workshop, IIT Kanpur




                                                     CL   RST
                                                     K          Vcc
                                           RFU

                                           GND


                                           RFU
                                                                Vpp
                                            I/O
Typical Configurations
                                            256 bytes to 4KB RAM.
                                            8KB to 32KB ROM.
Cutting Edge 2005 workshop, IIT Kanpur




                                            1KB to 32KB EEPROM.
                                            Crypto-coprocessors (implementing 3DES,
                                             RSA etc., in hardware) are optional.
                                            8-bit to 16-bit CPU. 8051 based designs are
                                             common.

                                         The price of a mid-level chip when produced
                                           in bulk is less than US$1.
Smart Card Readers

                                                                           Computer based readers
                                                                            Connect through USB or
Cutting Edge 2005 workshop, IIT Kanpur




                                                                            COM (Serial) ports



                                            Dedicated terminals
                                             Usually with a small screen,
                                             keypad, printer, often also
                                             have biometric devices such
                                             as thumb print scanner.
Terminal/PC Card Interaction
                                          The terminal/PC sends commands to
                                           the card (through the serial line).
Cutting Edge 2005 workshop, IIT Kanpur




                                          The card executes the command and
                                           sends back the reply.
                                          The terminal/PC cannot directly access
                                           memory of the card
                                              data
                                                  in the card is protected from
                                              unauthorized access. This is what
                                              makes the card smart.
Communication mechanisms
                                            Communication between smart card and reader is
                                             standardized
Cutting Edge 2005 workshop, IIT Kanpur




                                               ISO 7816 standard
                                            Commands are initiated by the terminal
                                               Interpreted by the card OS
                                               Card state is updated
                                               Response is given by the card.
                                            Commands have the following structure
                                         CLA      INS     P1     P2      Lc    1..Lc    Le

                                            Response from the card include 1..Le bytes followed by
                                             Response Code
Security Mechanisms

                                            Password
Cutting Edge 2005 workshop, IIT Kanpur




                                              Card   holder’s protection
                                            Cryptographic challenge Response
                                              Entity   authentication
                                            Biometric information
                                              Person’s   identification
                                            A combination of one or more
Password Verification

                                          Terminal asks the user to provide a
                                           password.
Cutting Edge 2005 workshop, IIT Kanpur




                                          Password is sent to Card for
                                           verification.
                                          Scheme can be used to permit user
                                           authentication.
                                              Not   a person identification scheme
Cryptographic verification
                                            Terminal verify card (INTERNAL AUTH)
                                              Terminal sends a random number to card to
Cutting Edge 2005 workshop, IIT Kanpur




                                               be hashed or encrypted using a key.
                                              Card provides the hash or cyphertext.
                                            Terminal can know that the card is
                                             authentic.
                                            Card needs to verify (EXTERNAL AUTH)
                                              Terminal asks for a challenge and sends the
                                               response to card to verify
                                              Card thus know that terminal is authentic.
                                            Primarily for the “Entity Authentication”
Biometric techniques

                                            Finger print identification.
Cutting Edge 2005 workshop, IIT Kanpur




                                              Features of finger prints can be kept on
                                               the card (even verified on the card)
                                            Photograph/IRIS pattern etc.
                                              Such  information is to be verified by a
                                               person. The information can be stored
                                               in the card securely.
Data storage
                                             Data is stored in smart cards in
                                              E2PROM
Cutting Edge 2005 workshop, IIT Kanpur




                                                Card   OS provides a file structure
                                                    mechanism
                                                         MF              File types
                                                                         Binary file (unstructured)
                                              DF        DF    EF    EF
                                                                         Fixed size record file
                                         DF             EF               Variable size record file

                                         EF        EF
File Naming and Selection
                                            Each files has a 2 byte file ID and an optional 5-bit
                                             SFID (both unique within a DF). DFs may optionally
Cutting Edge 2005 workshop, IIT Kanpur




                                             have (globally unique) 16 byte name.
                                            OS keeps tack of a current DF and a current EF.
                                            Current DF or EF can be changed using SELECT FILE
                                             command. Target file specified as either:
                                                DF name
                                                File ID
                                                SFID
                                                Relative or absolute path (sequence of File IDs).
                                                Parent DF
Basic File Related Commands
                                            Commands for file creation, deletion etc.,
                                             File size and security attributes specified at
Cutting Edge 2005 workshop, IIT Kanpur




                                             creation time.
                                            Commands for reading, writing, appending
                                             records, updating etc.
                                              Commands   work on the current EF.
                                              Execution only if security conditions are met.
                                            Each file has a life cycle status indicator
                                             (LCSI), one of: created, initialized, activated,
                                             deactivated, terminated.
Access control on the files

                                            Applications may specify the access
                                             controls
Cutting Edge 2005 workshop, IIT Kanpur




                                             A   password (PIN) on the MF selection
                                                • For example SIM password in mobiles
                                              Multiple  passwords can be used and
                                               levels of security access may be given
                                            Applications may also use
                                             cryptographic authentication
An example scenario (institute
                                                 ID card)               Read: Free
                                                                 What happens if the user
                                            Select: P2                                   forgets hisupon verification
                                                                                             Write: requirements:
                                                                                           Security password?
                                            verification          EF1 (personal data)           by K1, K2 or K3
                                                                                           EF1:
                                                                                         Solution1: Add supervisor
                                                                  Name: Rajat Moona
                                                                  PF/Roll: 2345          passwordbe modified only by
Cutting Edge 2005 workshop, IIT Kanpur




                                                                                           Should
                                              MF                                                  Read: Free
                                                                                           the DOSA/DOFA/Registrar
                                                                                         Solution2: Allow
                                                                  EF2 (Address)                Write: Password
                                                                                         DOSA/DOFA/Registrar to
                                                                                           Readable to all (P1)
                                                                                                Verification
                                                                  #320, CSE (off)        modify EF3
                                                                  475, IIT (Res)           EF2:
                                                                                         Solution3: Allow both to
                                                                                           Card holder should be able
                                                                                         happen
                                                                                           to modify
                                         EF3 (password)           EF4 (keys)
                                         EF3 (password)           K1 (DOSA’s key)
                                         P1 (User password)                                      Read: Never
                                         P1 (User password)       K2 (DOFA’s key)
                                         P2 (sys password)                                       Write: Once
                                                                  K3 (Registrar’s key)

                                                     Read: Never
                                                    Write: Password
                                                    Verification (P1)
An example scenario (institute
                                            ID card)
                                                          EF1 (personal data)     Library manages its
                                                                                  own keys in EF3
                                                          EF2 (Address)
Cutting Edge 2005 workshop, IIT Kanpur




                                                                                  under DF1
                                         MF
                                                          EF3 (password)
                                                                                  Institute manages its
                                                          EF4 (keys)              keys and data under
                                                                                      Modifiable: By
                                         DF1 (Lib)                                MFadmin staff. Read:
                                                        EF2 (Privilege info)               all
                                                                                  Thus library can
                                 EF1 (Issue record)
                                                        Max Duration: 20 days     develop applications
                                                        Max Books: 10             independent of the
                                 Bk# dt issue dt retn   Reserve Collection: Yes   rest. Keys
                                                                                   EF3:
                                 Bk# dt issue dt retn
                                                                                  K1: Issue staff key
                                                                                  K2: Admin staff key
                                 Bk# dt issue dt retn         Modifiable: By
                                 Bk# dt issue dt retn       issue staff. Read
                                                                    all
How does it all work?
                                    Card is inserted in the terminal
                                                                       Card gets power. OS boots up.
                                                                       Sends ATR (Answer to reset)
                                    ATR negotiations take place to
Cutting Edge 2005 workshop, IIT Kanpur




                                    set up data transfer speeds,
                                    capability negotiations etc.

                                    Terminal sends first command to    Card responds with an error
                                    select MF                          (because MF selection is only on
                                                                       password presentation)
                                    Terminal prompts the user to
                                    provide password
                                    Terminal sends password for        Card verifies P2. Stores a status
                                    verification                       “P2 Verified”. Responds “OK”
                                    Terminal sends command to          Card responds “OK”
                                    select MF again                    Card supplies personal data and
                                                                       responds “OK”
                         Terminal sends command to read EF1
Another Application Scenario
                                                                                   1. Authenticate user to bank
                                                      Terminal with                officer card:
                                                        two card                     1a. Get challenge from
Cutting Edge 2005 workshop, IIT Kanpur




                                                         readers                   banker card.
                                 Banker’s card                          User’s card 1b. Obtain response for the
                                                       Application                 challenge from passport
                                                      software runs                (IAUTH).
                                                           here                      1c. Validate response with
                                                                                   officer card (EAUTH)
                                                                                   2. Authenticate officer card
                                                                                   to passport.
                                                                                   3. Transfer money to the
                                                                                   user’s card

                                         The terminal itself does not store any keys, it’s the two cards that
                                         really authenticate each other. The terminal just facilitates the
                                         process.
Status of smart card
                                         deployments
                                            Famous Gujarat Dairy card
                                               Primarily an ID card
Cutting Edge 2005 workshop, IIT Kanpur




                                            GSM cards (SIM cards for mobiles)
                                               Phone book etc. + authentication.
                                            Cards for “credit card” applications.
                                               By 2007 end all credit cards will be smart.
                                               EMV standard
                                            Card for e-purse applications
                                               Bank cards
                                            Card technology has advanced
                                               Contactless smart cards,
                                               32-bit processors and bigger memories
                                               JAVA cards
SCOSTA Experience
                                             Part of E-governance initiative of the
                                              Government.
Cutting Edge 2005 workshop, IIT Kanpur




                                             Government decided to
                                               Create   Smart driving licenses/registration
                                                certificate
                                               Backend system is already in place
                                             Various smart card vendors in the country
                                               All with their own proprietary solutions
                                               In a national case, proprietary solution was
                                                not acceptable.
                                             NIC decides to ask IIT Kanpur to help.
                                    SCOSTA: Smart Card OS for Transport Applications
Goals of this Project
                                            To define a standard set of commands for smart
                                             cards for use in Indian applications.
Cutting Edge 2005 workshop, IIT Kanpur




                                            To provide a reference implementation of this
                                             standard.
                                            Transport Applications (Driving License and Vehicle
                                             Registration Certificate) were the pilot projects.
                                            Hence the OS standard is named SCOSTA.
                                            SCOSTA is defined by IIT Kanpur along with a
                                             technical subcommittee of SCAFI (Smart Card Forum
                                             of India).
                                            The OS is not really restricted to the transport
                                             applications and can be used in any ID application
The SCOSTA Standard
                                          Based on ISO 7816-4, -8, and -9.
                                          Removes ambiguities in ISO 7816.
Cutting Edge 2005 workshop, IIT Kanpur




                                          Has support for symmetric key
                                           cryptography (Triple DES algorithm)
                                           and internal and external
                                           authentication.
                                          Encryption/decryption and crypto
                                           checksum computation and
                                           verification using 3DES are also
                                           supported.
SCOSTA Implementation -
                                         Challenges
                                          Portability – should be easy to port to
                                           different processors.
Cutting Edge 2005 workshop, IIT Kanpur




                                          Resource Constraints – very limited
                                           memory (32 KB ROM, 512 byte RAM
                                           are typical). Usually 8 bit processors
                                           are used.
                                          Government processes

                                          Vendors and their business interests.
Challenges of the application
                                            System must work nation wide
                                            Cards are issued by the RTO
Cutting Edge 2005 workshop, IIT Kanpur




                                            RTO officials may not be all that “clean”
                                            Challans are done by police “on behalf of”
                                             RTO
                                              “Clean”??
                                            Challans are settled by the Judiciary.
                                            RTOs are administered by the STA
                                              But   under the Union Ministry
Solution

                                          A robust key management scheme was
                                           needed.
Cutting Edge 2005 workshop, IIT Kanpur




                                          Solution was based on
                                              Key   derivations, usage counters etc.
Solution

                                          The entire system is based on few
                                           “nation wide” generator keys.
Cutting Edge 2005 workshop, IIT Kanpur




                                          Safely housed with the government.

                                          Say the keys are k1, k2, k3, k4.

                                          Keys are themselves never stored any
                                           where.
                                              Instead   five out of seven card scheme
                                              is used.
5 out of 7 scheme
                                            Consider a polynomial
                                             k1 + k2.x + k3.x2 + k4.x3 + k5.x4 = b
Cutting Edge 2005 workshop, IIT Kanpur




                                            If b1, b2, b3, b4, b5 are known for x = 1, 2,
                                             3.., the system of equations can be solved
                                             and all k’s can be found.
                                            We use the SCOSTA cards to store (x1, b1),
                                             (x2, b2) etc.
                                            At any point in time, five such pairs are
                                             needed.
                                            For robustness, seven cards are generated
                                             and kept at 7 different locations.
Operations

                                            At RTOs, two RTO officers are
                                             required to create a DL
Cutting Edge 2005 workshop, IIT Kanpur




                                              These two work in pair.
                                              Have a usage counter of key built in.
                                              RTO keys are generated and given in
                                               the RTO cards
                                          STA can revalidate the usage counter.
                                          STA keys are also generated.
Operations
                                          DL can be completely given by the
                                           RTO.
Cutting Edge 2005 workshop, IIT Kanpur




                                          Some information is public readable
                                           on the DL.
                                          Some information is once writable by
                                           the police (challans) and readable by
                                           the police.
                                          The same information is updatable by
                                           the judiciary. (but can not be deleted)
Operations
                                            Therefore the DLs must carry
                                              Police   key, RTO keys and judiciary keys.
Cutting Edge 2005 workshop, IIT Kanpur




                                                • A big security risk.
                                              Instead  these keys for the DL are card specific.
                                              Police has a master key to generate DL
                                               specific police key. Ditto with RTO and
                                               Judiciary.
                                            NIC generates the cards (and therefore
                                             master keys) for RTO, Police and Judiciary.
Current State

                                          DL/RC are being issued in Calcutta,
                                           Delhi on SCOSTA cards (pilot basis)
Cutting Edge 2005 workshop, IIT Kanpur




                                          Governments such as Jharkhand,
                                           Maharastra, Gujarat, WB have already
                                           started the process rolling.
                                          Various other states will follow.
Acknowledgements
                                          Prof. Deepak Gupta and Manindra Agrawal
                                           (CSE)
Cutting Edge 2005 workshop, IIT Kanpur




                                          S. Ravinder and Kapileshwar Rao (MTech
                                           students of CSE who worked on this project)
                                          National Informatics Centre (NIC) Delhi
                                          MCIT and MoST

                                         References:
                                          Smart Card Handbook
                                          ISO7816 standards
                                          www.parivahan.nic.in

Weitere ähnliche Inhalte

Andere mochten auch

Tech Nation presentation
Tech Nation presentationTech Nation presentation
Tech Nation presentationNewsworks
 
Newsbrands and social media
Newsbrands and social mediaNewsbrands and social media
Newsbrands and social mediaNewsworks
 
John Lewis and Newsbrands - The untold story
John Lewis and Newsbrands - The untold story John Lewis and Newsbrands - The untold story
John Lewis and Newsbrands - The untold story Newsworks
 
#NewsOnTheTweet
#NewsOnTheTweet#NewsOnTheTweet
#NewsOnTheTweetNewsworks
 
Spotlight on UK newspapers
Spotlight on UK newspapersSpotlight on UK newspapers
Spotlight on UK newspapersNewsworks
 
Truly Madly Deeply
Truly Madly DeeplyTruly Madly Deeply
Truly Madly DeeplyNewsworks
 
Day of influence - The results
Day of influence - The resultsDay of influence - The results
Day of influence - The resultsNewsworks
 
The Tablet Project: Charts
The Tablet Project: ChartsThe Tablet Project: Charts
The Tablet Project: ChartsNewsworks
 
Kia case study
Kia case studyKia case study
Kia case studyNewsworks
 
John lewis case study
John lewis case studyJohn lewis case study
John lewis case studyNewsworks
 
Unilever case study
Unilever case studyUnilever case study
Unilever case studyNewsworks
 
Microsoft Xbox case study
Microsoft Xbox case studyMicrosoft Xbox case study
Microsoft Xbox case studyNewsworks
 
Wake up and smell the bacon
Wake up and smell the baconWake up and smell the bacon
Wake up and smell the baconNewsworks
 
McArthurGlen case study
McArthurGlen case studyMcArthurGlen case study
McArthurGlen case studyNewsworks
 
The multi-platform study
The multi-platform studyThe multi-platform study
The multi-platform studyNewsworks
 
The commercial influence of newsbrands
The commercial influence of newsbrandsThe commercial influence of newsbrands
The commercial influence of newsbrandsNewsworks
 
The IPA Databank study
The IPA Databank studyThe IPA Databank study
The IPA Databank studyNewsworks
 

Andere mochten auch (18)

Tech Nation presentation
Tech Nation presentationTech Nation presentation
Tech Nation presentation
 
Newsbrands and social media
Newsbrands and social mediaNewsbrands and social media
Newsbrands and social media
 
John Lewis and Newsbrands - The untold story
John Lewis and Newsbrands - The untold story John Lewis and Newsbrands - The untold story
John Lewis and Newsbrands - The untold story
 
#NewsOnTheTweet
#NewsOnTheTweet#NewsOnTheTweet
#NewsOnTheTweet
 
Spotlight on UK newspapers
Spotlight on UK newspapersSpotlight on UK newspapers
Spotlight on UK newspapers
 
Truly Madly Deeply
Truly Madly DeeplyTruly Madly Deeply
Truly Madly Deeply
 
Day of influence - The results
Day of influence - The resultsDay of influence - The results
Day of influence - The results
 
The Tablet Project: Charts
The Tablet Project: ChartsThe Tablet Project: Charts
The Tablet Project: Charts
 
Kia case study
Kia case studyKia case study
Kia case study
 
John lewis case study
John lewis case studyJohn lewis case study
John lewis case study
 
Unilever case study
Unilever case studyUnilever case study
Unilever case study
 
Microsoft Xbox case study
Microsoft Xbox case studyMicrosoft Xbox case study
Microsoft Xbox case study
 
McCain
McCainMcCain
McCain
 
Wake up and smell the bacon
Wake up and smell the baconWake up and smell the bacon
Wake up and smell the bacon
 
McArthurGlen case study
McArthurGlen case studyMcArthurGlen case study
McArthurGlen case study
 
The multi-platform study
The multi-platform studyThe multi-platform study
The multi-platform study
 
The commercial influence of newsbrands
The commercial influence of newsbrandsThe commercial influence of newsbrands
The commercial influence of newsbrands
 
The IPA Databank study
The IPA Databank studyThe IPA Databank study
The IPA Databank study
 

Ähnlich wie Smartcards

Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010
Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010
Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010Altera Corporation
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesIRJET Journal
 
Embedded systems unit3
Embedded systems unit3Embedded systems unit3
Embedded systems unit3baskaransece
 
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...mentoresd
 
Http Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...
Http   Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...Http   Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...
Http Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...qedanne
 
Ball Systems Capabilities
Ball Systems CapabilitiesBall Systems Capabilities
Ball Systems Capabilitiesamhoff
 
ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
Intel Roadmap 2010
Intel Roadmap 2010Intel Roadmap 2010
Intel Roadmap 2010Umair Mohsin
 
Introduction To Sonalysts Engineering
Introduction To Sonalysts EngineeringIntroduction To Sonalysts Engineering
Introduction To Sonalysts EngineeringArmandHalter
 

Ähnlich wie Smartcards (20)

Smart card
Smart cardSmart card
Smart card
 
Java Ring
Java Ring Java Ring
Java Ring
 
Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010
Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010
Adv. FPGA Motor Control--EBV & Univ. of Koln: Embedded World 2010
 
Java card
Java cardJava card
Java card
 
Real Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille DevicesReal Time Character Recognition on FPGA for Braille Devices
Real Time Character Recognition on FPGA for Braille Devices
 
Embedded systems unit3
Embedded systems unit3Embedded systems unit3
Embedded systems unit3
 
Appl 1340
Appl 1340Appl 1340
Appl 1340
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
ACR38 Series PC-Linked Readers
ACR38 Series PC-Linked ReadersACR38 Series PC-Linked Readers
ACR38 Series PC-Linked Readers
 
News-letter-July15
News-letter-July15News-letter-July15
News-letter-July15
 
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
Meeting SEP 2.0 Compliance: Developing Power Aware Embedded Systems for the M...
 
Http Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...
Http   Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...Http   Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...
Http Jaoo.Com.Au Sydney 2008 File Path= Jaoo Aus2008 Slides Dave Thomas Lif...
 
Ball Systems Capabilities
Ball Systems CapabilitiesBall Systems Capabilities
Ball Systems Capabilities
 
Vinay_CV
Vinay_CVVinay_CV
Vinay_CV
 
ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.
 
Intel Roadmap 2010
Intel Roadmap 2010Intel Roadmap 2010
Intel Roadmap 2010
 
Java Ring
Java RingJava Ring
Java Ring
 
Introduction To Sonalysts Engineering
Introduction To Sonalysts EngineeringIntroduction To Sonalysts Engineering
Introduction To Sonalysts Engineering
 
513 516
513 516513 516
513 516
 
Smart Cards Evolution
Smart Cards EvolutionSmart Cards Evolution
Smart Cards Evolution
 

Kürzlich hochgeladen

Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Kürzlich hochgeladen (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

Smartcards

  • 1. Cutting Edge 2005 workshop, IIT Kanpur Smart Cards: Technology for Secure Management of Information Rajat Moona Computer Science and Engineering IIT Kanpur moona@iitk.ac.in
  • 2. Agenda  Machine readable plastic cards Cutting Edge 2005 workshop, IIT Kanpur  What are smart cards  Security mechanisms  Applications  SCOSTA experience  Indian Driving License application
  • 3. Plastic Cards  Visual identity application  Plain plastic card is enough Cutting Edge 2005 workshop, IIT Kanpur  Magnetic strip (e.g. credit cards)  Visualdata also available in machine readable form  No security of data  Electronic memory cards  Machine readable data  Some security (vendor specific)
  • 4. Smart Cards  Processor cards (and therefore memory too) Credit card size Cutting Edge 2005 workshop, IIT Kanpur   With or without contacts.  Cards have an operating system too.  The OS provides A standard way of interchanging information  An interpretation of the commands and data.  Cards must interface to a computer or terminal through a standard card reader.
  • 5. Smart Cards devices Cutting Edge 2005 workshop, IIT Kanpur GND VCC VPP Reset I/O Clock Reserved
  • 6. What’s in a Card? Cutting Edge 2005 workshop, IIT Kanpur CL RST K Vcc RFU GND RFU Vpp I/O
  • 7. Typical Configurations  256 bytes to 4KB RAM.  8KB to 32KB ROM. Cutting Edge 2005 workshop, IIT Kanpur  1KB to 32KB EEPROM.  Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional.  8-bit to 16-bit CPU. 8051 based designs are common. The price of a mid-level chip when produced in bulk is less than US$1.
  • 8. Smart Card Readers  Computer based readers Connect through USB or Cutting Edge 2005 workshop, IIT Kanpur COM (Serial) ports  Dedicated terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner.
  • 9. Terminal/PC Card Interaction  The terminal/PC sends commands to the card (through the serial line). Cutting Edge 2005 workshop, IIT Kanpur  The card executes the command and sends back the reply.  The terminal/PC cannot directly access memory of the card  data in the card is protected from unauthorized access. This is what makes the card smart.
  • 10. Communication mechanisms  Communication between smart card and reader is standardized Cutting Edge 2005 workshop, IIT Kanpur  ISO 7816 standard  Commands are initiated by the terminal  Interpreted by the card OS  Card state is updated  Response is given by the card.  Commands have the following structure CLA INS P1 P2 Lc 1..Lc Le  Response from the card include 1..Le bytes followed by Response Code
  • 11. Security Mechanisms  Password Cutting Edge 2005 workshop, IIT Kanpur  Card holder’s protection  Cryptographic challenge Response  Entity authentication  Biometric information  Person’s identification  A combination of one or more
  • 12. Password Verification  Terminal asks the user to provide a password. Cutting Edge 2005 workshop, IIT Kanpur  Password is sent to Card for verification.  Scheme can be used to permit user authentication.  Not a person identification scheme
  • 13. Cryptographic verification  Terminal verify card (INTERNAL AUTH)  Terminal sends a random number to card to Cutting Edge 2005 workshop, IIT Kanpur be hashed or encrypted using a key.  Card provides the hash or cyphertext.  Terminal can know that the card is authentic.  Card needs to verify (EXTERNAL AUTH)  Terminal asks for a challenge and sends the response to card to verify  Card thus know that terminal is authentic.  Primarily for the “Entity Authentication”
  • 14. Biometric techniques  Finger print identification. Cutting Edge 2005 workshop, IIT Kanpur  Features of finger prints can be kept on the card (even verified on the card)  Photograph/IRIS pattern etc.  Such information is to be verified by a person. The information can be stored in the card securely.
  • 15. Data storage  Data is stored in smart cards in E2PROM Cutting Edge 2005 workshop, IIT Kanpur  Card OS provides a file structure mechanism MF File types Binary file (unstructured) DF DF EF EF Fixed size record file DF EF Variable size record file EF EF
  • 16. File Naming and Selection  Each files has a 2 byte file ID and an optional 5-bit SFID (both unique within a DF). DFs may optionally Cutting Edge 2005 workshop, IIT Kanpur have (globally unique) 16 byte name.  OS keeps tack of a current DF and a current EF.  Current DF or EF can be changed using SELECT FILE command. Target file specified as either:  DF name  File ID  SFID  Relative or absolute path (sequence of File IDs).  Parent DF
  • 17. Basic File Related Commands  Commands for file creation, deletion etc., File size and security attributes specified at Cutting Edge 2005 workshop, IIT Kanpur creation time.  Commands for reading, writing, appending records, updating etc.  Commands work on the current EF.  Execution only if security conditions are met.  Each file has a life cycle status indicator (LCSI), one of: created, initialized, activated, deactivated, terminated.
  • 18. Access control on the files  Applications may specify the access controls Cutting Edge 2005 workshop, IIT Kanpur A password (PIN) on the MF selection • For example SIM password in mobiles  Multiple passwords can be used and levels of security access may be given  Applications may also use cryptographic authentication
  • 19. An example scenario (institute ID card) Read: Free What happens if the user Select: P2 forgets hisupon verification Write: requirements: Security password? verification EF1 (personal data) by K1, K2 or K3 EF1: Solution1: Add supervisor Name: Rajat Moona PF/Roll: 2345 passwordbe modified only by Cutting Edge 2005 workshop, IIT Kanpur Should MF Read: Free the DOSA/DOFA/Registrar Solution2: Allow EF2 (Address) Write: Password DOSA/DOFA/Registrar to Readable to all (P1) Verification #320, CSE (off) modify EF3 475, IIT (Res) EF2: Solution3: Allow both to Card holder should be able happen to modify EF3 (password) EF4 (keys) EF3 (password) K1 (DOSA’s key) P1 (User password) Read: Never P1 (User password) K2 (DOFA’s key) P2 (sys password) Write: Once K3 (Registrar’s key) Read: Never Write: Password Verification (P1)
  • 20. An example scenario (institute ID card) EF1 (personal data) Library manages its own keys in EF3 EF2 (Address) Cutting Edge 2005 workshop, IIT Kanpur under DF1 MF EF3 (password) Institute manages its EF4 (keys) keys and data under Modifiable: By DF1 (Lib) MFadmin staff. Read: EF2 (Privilege info) all Thus library can EF1 (Issue record) Max Duration: 20 days develop applications Max Books: 10 independent of the Bk# dt issue dt retn Reserve Collection: Yes rest. Keys EF3: Bk# dt issue dt retn K1: Issue staff key K2: Admin staff key Bk# dt issue dt retn Modifiable: By Bk# dt issue dt retn issue staff. Read all
  • 21. How does it all work? Card is inserted in the terminal Card gets power. OS boots up. Sends ATR (Answer to reset) ATR negotiations take place to Cutting Edge 2005 workshop, IIT Kanpur set up data transfer speeds, capability negotiations etc. Terminal sends first command to Card responds with an error select MF (because MF selection is only on password presentation) Terminal prompts the user to provide password Terminal sends password for Card verifies P2. Stores a status verification “P2 Verified”. Responds “OK” Terminal sends command to Card responds “OK” select MF again Card supplies personal data and responds “OK” Terminal sends command to read EF1
  • 22. Another Application Scenario 1. Authenticate user to bank Terminal with officer card: two card 1a. Get challenge from Cutting Edge 2005 workshop, IIT Kanpur readers banker card. Banker’s card User’s card 1b. Obtain response for the Application challenge from passport software runs (IAUTH). here 1c. Validate response with officer card (EAUTH) 2. Authenticate officer card to passport. 3. Transfer money to the user’s card The terminal itself does not store any keys, it’s the two cards that really authenticate each other. The terminal just facilitates the process.
  • 23. Status of smart card deployments  Famous Gujarat Dairy card  Primarily an ID card Cutting Edge 2005 workshop, IIT Kanpur  GSM cards (SIM cards for mobiles)  Phone book etc. + authentication.  Cards for “credit card” applications.  By 2007 end all credit cards will be smart.  EMV standard  Card for e-purse applications  Bank cards  Card technology has advanced  Contactless smart cards,  32-bit processors and bigger memories  JAVA cards
  • 24. SCOSTA Experience  Part of E-governance initiative of the Government. Cutting Edge 2005 workshop, IIT Kanpur  Government decided to  Create Smart driving licenses/registration certificate  Backend system is already in place  Various smart card vendors in the country  All with their own proprietary solutions  In a national case, proprietary solution was not acceptable.  NIC decides to ask IIT Kanpur to help. SCOSTA: Smart Card OS for Transport Applications
  • 25. Goals of this Project  To define a standard set of commands for smart cards for use in Indian applications. Cutting Edge 2005 workshop, IIT Kanpur  To provide a reference implementation of this standard.  Transport Applications (Driving License and Vehicle Registration Certificate) were the pilot projects.  Hence the OS standard is named SCOSTA.  SCOSTA is defined by IIT Kanpur along with a technical subcommittee of SCAFI (Smart Card Forum of India).  The OS is not really restricted to the transport applications and can be used in any ID application
  • 26. The SCOSTA Standard  Based on ISO 7816-4, -8, and -9.  Removes ambiguities in ISO 7816. Cutting Edge 2005 workshop, IIT Kanpur  Has support for symmetric key cryptography (Triple DES algorithm) and internal and external authentication.  Encryption/decryption and crypto checksum computation and verification using 3DES are also supported.
  • 27. SCOSTA Implementation - Challenges  Portability – should be easy to port to different processors. Cutting Edge 2005 workshop, IIT Kanpur  Resource Constraints – very limited memory (32 KB ROM, 512 byte RAM are typical). Usually 8 bit processors are used.  Government processes  Vendors and their business interests.
  • 28. Challenges of the application  System must work nation wide  Cards are issued by the RTO Cutting Edge 2005 workshop, IIT Kanpur  RTO officials may not be all that “clean”  Challans are done by police “on behalf of” RTO  “Clean”??  Challans are settled by the Judiciary.  RTOs are administered by the STA  But under the Union Ministry
  • 29. Solution  A robust key management scheme was needed. Cutting Edge 2005 workshop, IIT Kanpur  Solution was based on  Key derivations, usage counters etc.
  • 30. Solution  The entire system is based on few “nation wide” generator keys. Cutting Edge 2005 workshop, IIT Kanpur  Safely housed with the government.  Say the keys are k1, k2, k3, k4.  Keys are themselves never stored any where.  Instead five out of seven card scheme is used.
  • 31. 5 out of 7 scheme  Consider a polynomial k1 + k2.x + k3.x2 + k4.x3 + k5.x4 = b Cutting Edge 2005 workshop, IIT Kanpur  If b1, b2, b3, b4, b5 are known for x = 1, 2, 3.., the system of equations can be solved and all k’s can be found.  We use the SCOSTA cards to store (x1, b1), (x2, b2) etc.  At any point in time, five such pairs are needed.  For robustness, seven cards are generated and kept at 7 different locations.
  • 32. Operations  At RTOs, two RTO officers are required to create a DL Cutting Edge 2005 workshop, IIT Kanpur  These two work in pair.  Have a usage counter of key built in.  RTO keys are generated and given in the RTO cards  STA can revalidate the usage counter.  STA keys are also generated.
  • 33. Operations  DL can be completely given by the RTO. Cutting Edge 2005 workshop, IIT Kanpur  Some information is public readable on the DL.  Some information is once writable by the police (challans) and readable by the police.  The same information is updatable by the judiciary. (but can not be deleted)
  • 34. Operations  Therefore the DLs must carry  Police key, RTO keys and judiciary keys. Cutting Edge 2005 workshop, IIT Kanpur • A big security risk.  Instead these keys for the DL are card specific.  Police has a master key to generate DL specific police key. Ditto with RTO and Judiciary.  NIC generates the cards (and therefore master keys) for RTO, Police and Judiciary.
  • 35. Current State  DL/RC are being issued in Calcutta, Delhi on SCOSTA cards (pilot basis) Cutting Edge 2005 workshop, IIT Kanpur  Governments such as Jharkhand, Maharastra, Gujarat, WB have already started the process rolling.  Various other states will follow.
  • 36. Acknowledgements  Prof. Deepak Gupta and Manindra Agrawal (CSE) Cutting Edge 2005 workshop, IIT Kanpur  S. Ravinder and Kapileshwar Rao (MTech students of CSE who worked on this project)  National Informatics Centre (NIC) Delhi  MCIT and MoST References:  Smart Card Handbook  ISO7816 standards  www.parivahan.nic.in