Documente Academic
Documente Profesional
Documente Cultură
By
In the age of universal electronic Cryptography comes from the Greek words
connectivity, of viruses and hackers there for – “secret writing”. Cryptography is the
is indeed no time at which security does science of enabling secure communications
not matter. The issue of security and between a sender and one or more
privacy is not a new one however, and the recipients. It deals with a process associated
age-old science of cryptography has been with scrambling plain text (ordinary text, or
in use, since people had some information clear text) into cipher text (a process called
that they wish to hide. Cryptography has encryption) then back again (known as
naturally been extended into realm of decryption).
computers, and provides a solution
electronic security and privacy issue.
As the technology increases,
Smart Cards (e.g.: SIM cards, Bank
cards, Health cards) play very important
role in processing many transactions with
high level of security.
This security level achieved by means of
Cryptography. In this paper we are
presenting an introduction to Fig:Encryption model
cryptography, basics of Smart Cards, the An intruder is hacker or cracker who
role of cryptography in Smart Cards, and hears and accurately copies down the
the processing of an example transaction complete cipher text. Passive intruder only
involving security (Bank Card). listens to the communication channel. But,
active intruder can also record messages and
play them back later, inject his own
messages, or modify legitimate messages
before they get to the receiver.
3
compromised then both Alice and Bob know to generate digital signatures using the RSA.
3. APPLICATIONS OF
CRYPTOGRAPHY:
The following are some of the
applications of cryptography.
• Digital Signatures
• Digital Certificates.
• Message Digest.
• Secure Socket Layer.
• Secure E-Business
• Secure IP.
• Challenge/Response
systems (Smart cards). Fig: Contact chip and Smart card
In this paper we are concentrating architecture
on Smart Cards.
5
with a secret key by the smart card to access management key is also called a
the information. Key Encrypting Key (KEK).
The smart card is also able to An operational key is used by the smart card
compute a Message Authentication Code to perform data cryptographic operations
(MAC) over data that is stored on the smart
card. A MAC that is computed by the smart 5. APPLICATIONS OF SMART CARD:
card is also called a stamp. Smart cards are used for huge range
All data is stored unencrypted on a of applications today. A few common
smart card. A smart card can encrypt data examples of applications are briefly
that is stored in specific files on the smart described here.
card. The encryption is possible for a file
that has access condition ENC (ENCrypted) i) SIM cards:
for the read command. A common application for Smart
d) Storage of Secret keys on Smart Card Cards is for mobile phones. The central
The architecture of smart cards security processor of a mobile phone is
allows storing secret cryptographic keys in provided by a global system for mobile
safe manner. The stored keys can only be communication SIM (Subscriber Identity
used to perform cryptographic computations Module). The use of SIM cards has radically
but not for reading. The keys are stored in improved security of digital phones
specific data files called EF_KEY. The compared to the older analogue devices.
initial secret keys are written on the smart
card during the initialization process
performed by the card issuer. To write a new ii) Bank Cards:
secret key Knew on the smart card, secret Increasingly credit and debit cards
keys are needed that are (already) stored in are being used, using the contact chip rather
the smart card. than being swiped. The security feature
Smart card makes use of two kinds offered by Smart Cards protect consumers
of secret keys from their cards being cloned as it is much
Management key more difficult to copy a chip protected
Operational key. cryptographically than a magnetic strip.
A management key is used to iii) Health Cards:
encrypt another management key or Increasingly, Smart Cards are being
an operational key that have to be used to store a citizen’s medical data. The
written on the smart card. A cards are carried by the citizen and can
7
contain information such as list of allergies, customer’s account. Finally the wallet value
current and past medications, past treatment is updated.
history, disease history and doctors notes.
This enables medical information to be 6. MERITS AND DEMERITS:
easily accessed in an emergency. High-level security can be achieved
using cryptography in smart cards. Data
Consider the scenario how a smart card present in the smart card is more secured
works for banking. and can be viewed only by the authorized
persons only.
Stage 1: This is the initial process where the Although this system is very
enrollment of customer can takes place; the effective as protection, due to the large
image and details of customer are saved on amount processing power needed to run this
card. system it is impossible for use on older,
slower computers without the necessary
processing power to use such an extensive
encryption system. Weak-authentication
may break the security provided by the
smart card.
7. CONCLUSION:
Cryptography provides a solution to
the problem of security and privacy issues.
The usage of cryptography in Smart Cards
became very popular. Smart card technology
can be implemented for multi-applications
Fig: Evaluation Scenario of Smart cards
such as Bankcards, SIM cards, and Health
Stage 2: After the enrollment process
cards.
money loaded and wallet value is updated.
As card technologies continue to
Stage 3: When customer inserts the card for
develop we can expect to see advanced
money, the system read the data from the
cards interacting directly with users through
card, to verify the validity of customer.
displays, biometric sensors and buttons. This
Stage 4: After verification the machine
will open up many exciting novel
facilitates to credit or debit on the
applications, and further increase the
usability of Smart Cards.
8
8. REFERENCES:
1. http://www.cryptography.com
2. http://www.smartcardbasics.com
3.http://www.faqs.org/faqs/cryptography-
faq