1 / 19

Smart Cards Application and Security

Smart Cards Application and Security Pooya Karimian Topics Introduction What is a Smart Card? Smart Card Applications Security and Privacy New Technologies Introduction Digital Money and E-Commerce From cash-oriented to cash-less society Security Issues Key Exchange

emily
Download Presentation

Smart Cards Application and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Smart CardsApplication and Security Pooya Karimian

  2. Topics • Introduction • What is a Smart Card? • Smart Card Applications • Security and Privacy • New Technologies

  3. Introduction • Digital Money and E-Commerce • From cash-oriented to cash-less society • Security Issues • Key Exchange

  4. What is a Smart Card? • Smart Card : • It’s small • It stores information • It’s secure • It’s cheap : 0.2$ to 15$

  5. Smart CardDifferent Types

  6. Smart CardConnection • Contact • Visacard / Mastercard • Contactless : • Radio Frequency ID Cards

  7. Smart Card Applications • Stored value for a specific application photocopying, telephones, … • Electronic purse, Digital money • Internet Commerce • Pay-TV • Identification • Portable data files • Security • GSM cellular phones

  8. Securityand Confidentiality • Smart Card: • Can be upgraded • Has a unique serial number • Store keys safely in their memory • Execute ciphering algorithms • Active authentication • Transfer Securely to host

  9. Securityand Confidentiality • Smart Card: • Using digital signatures • Execute ciphering algorithms • Active authentication • Transfer Securely to host

  10. Securityand Confidentiality • Transfer Methods : • No encryption • Sending a PIN • Encrypting PIN • Diffie Hellman / RSA Key Exchange • Encrypted Key Exchange (EKE)

  11. SecurityAuthentication • Authentication • Host by the card • Card by the host • User by the card • Host or Card Reader

  12. Privacy Control over the information about ourselves • Freedom • Anonymity : Blind Signatures • Security

  13. New Technologies • Multos : the multi-application operating system for smart cards • Java Cards

  14. Java Smart Card • Platform Independent • Multi-Application Capable • Post-Issuance of Applications • Flexible • Compatible with Existing Smart Card Standards

  15. Java Smart Card

  16. Java Smart Card

  17. Referencesand related documents • Links : • Visa Card : http://www.visa.com • Master Card : http://www.mastercard.com • Multos Cards : http://www.multos.com • JavaCard : http://java.sun.com/products/javacard/

  18. Electronic Purse • General Purpose • One card for all applications • Anonymous

More Related