Sunteți pe pagina 1din 8

DEPARTMENT OF

INFORMATION SCIENCE AND TECHNOLOGY


KONERU LAKSHMAIAH COLLEGE OF ENGINEERING
GREEN FIELDS,VADDESWARAM,GUNTUR-522502.

By

NAME : P.Sravan Kumar(III/IV B.Tech) NAME : M.Venkata Rao(III/IV B.Tech)


ADDRESS : S/O P.Nagendra Rao, ADDRESS : s/o M.Prabhakara Rao,
D-NO: 43-148-11, TYPE -3 138/E RAILWAY
Macca Masjid Road , WAGON WORK SHOP COLONY,
Ajith Singh Nagar, GUNTUPALLI,VIJAYAWADA-521241
VIJAYAWADA-15, ANDHRA PRADESH.
ANDHRA PRADESH.

Ph.no : 0866-2400774 Ph. no : 9985882394

E-mail : sravan_ssr@yahoo.co.in E-mail : venkatarao.mynampati@gmail.com


ABSTRACT:
1. INTRODUCTION

In the age of universal electronic Cryptography comes from the Greek words
connectivity, of viruses and hackers there for – “secret writing”. Cryptography is the
is indeed no time at which security does science of enabling secure communications
not matter. The issue of security and between a sender and one or more
privacy is not a new one however, and the recipients. It deals with a process associated
age-old science of cryptography has been with scrambling plain text (ordinary text, or
in use, since people had some information clear text) into cipher text (a process called
that they wish to hide. Cryptography has encryption) then back again (known as
naturally been extended into realm of decryption).
computers, and provides a solution
electronic security and privacy issue.
As the technology increases,
Smart Cards (e.g.: SIM cards, Bank
cards, Health cards) play very important
role in processing many transactions with
high level of security.
This security level achieved by means of
Cryptography. In this paper we are
presenting an introduction to Fig:Encryption model
cryptography, basics of Smart Cards, the An intruder is hacker or cracker who
role of cryptography in Smart Cards, and hears and accurately copies down the
the processing of an example transaction complete cipher text. Passive intruder only
involving security (Bank Card). listens to the communication channel. But,
active intruder can also record messages and
play them back later, inject his own
messages, or modify legitimate messages
before they get to the receiver.
3

In symmetric encryption, same key is used


Cryptography concerns itself with four for both encryption and decryption.
objectives: Consider a situation where Alice, a user
1. Confidentiality (the information cannot be from company A, is electronically
understood by any one for whom it was communicating with Bob, a user of
unintended) company B
2. Integrity (the information cannot be In the figure of Symmetric communication
altered in storage or transit between between Alice and bob Alice would encrypt
sender and intended receiver her message using a key, and then send a
without the alteration being message to Bob. Alice would separately
detected). communicate the key to Bob to allow him to
3. Non-repudiation (the creator/sender decrypt the message. To maintain security
of the information cannot deny at a and privacy, Alice and Bob need to ensure
later stage his or her intentions in that the key remains private to them.
the creation or transmission of the Symmetric encryption can be
information). implemented by
4. Authentication (the sender and receiver  DES – The Data
can confirm each others identity and the Encryption
origin/destination of the information). Standard
 AES – The
Advanced
Encryption
Standard
 Cipher modes
In Asymmetric encryption, separate keys
are used for encryption and decryption

Fig: Asymmetric communication between


2. TYPES OF ENCRYPTION Bob and Alice
We have two variations Here, Alice is sending a message to
• Symmetric Bob. Alice creates her message then
encryption encrypts it using Bob’s public key. When
• Asymmetric Bob receives the encrypted message, he uses
encryption
4

his secret, private key to decrypt it. As long 4. SMART CARDS:


as Bob’s private key has not been Smart cards are an ideal means to
provide the required level of security. In
recent years, smart card technology has
quickly advanced and by now reached a
state where smart cards easily integrate into
public key infrastructures. Today's smart
cards provide memory, and they have
cryptographic coprocessors that allow them

compromised then both Alice and Bob know to generate digital signatures using the RSA.

that the message is secure.


Asymmetric Encryption can be implemented a) Architecture:

by A smart card is a credit card sized

 RSA (Rivest, plastic card with an integrated circuit (IC)

Shamir, Adleman) contained inside. The IC contains a

Other public key Algorithms microprocessor and memory, which gives


smart cards the ability to process, as well as
store more information.

3. APPLICATIONS OF
CRYPTOGRAPHY:
The following are some of the
applications of cryptography.
• Digital Signatures
• Digital Certificates.
• Message Digest.
• Secure Socket Layer.
• Secure E-Business
• Secure IP.
• Challenge/Response
systems (Smart cards). Fig: Contact chip and Smart card
In this paper we are concentrating architecture
on Smart Cards.
5

capability structure is comparable with


The figure shows the architecture of directory structure of disk media.
smart card, which contains RAM, ROM, The main structure is based on three
FLASH memory, and a Coprocessor. Smart component types:
cards uses RAM for temporary storage and • Master File (MF), the root directory
ROM as a bootstrap for loading the • Dedicated file (DF), application
operating system. FLASH memory allows directories or sub-directories
much higher data storage capacity on the • Elementary file (EF), data files.
card. It has an on-chip dedicate Coprocessor On the smart card there is only one
called Crypto Processor with key Master File that contains some data files
generation and asymmetric algorithm with global information about the smart card
acceleration. and its holder.
Contact chip is a standard transistor Dedicated files are directories that
that was created from a lithographic process can be set under the root directory. Each
as a series of etched and plated regions on a application has a directory of its own. An
tiny sheet of silicon. application directory can have one or more
A smart card can be used for sub directories.
payment transactions, such as purchases, Each directory has some specific
and non-payment transaction, such as elementary files, which contains secret
information storage and exchange. cryptographic keys. All Dedicated and
Elementary files have access conditions to
b) Role of Cryptography: execute a command on a file.
The smart card provides two types c) Cryptographic computations by Smart
of security services user authentication and Cards:
digital signature generation. Smart cards are The maximal length of data that can be
specifically designed to perform these encrypted by the smart card and that is not
services with a high level of security. stored on the smart card is 8 bytes. The
Authentication of users means proving that command that provides the encryption is
users are who they say they are. There are called INTERNAL AUTHENTICATION
various ways to implement authentication and is developed to authenticate the smart
using a smart card, but in this paper we are card to the outside world. The command
presenting smart cards with crypto requires a random number from the outside
processors.Smart cards data storage world and a secret key that is stored on the
smart card. The random number is encrypted
6

with a secret key by the smart card to access management key is also called a
the information. Key Encrypting Key (KEK).
The smart card is also able to An operational key is used by the smart card
compute a Message Authentication Code to perform data cryptographic operations
(MAC) over data that is stored on the smart
card. A MAC that is computed by the smart 5. APPLICATIONS OF SMART CARD:
card is also called a stamp. Smart cards are used for huge range
All data is stored unencrypted on a of applications today. A few common
smart card. A smart card can encrypt data examples of applications are briefly
that is stored in specific files on the smart described here.
card. The encryption is possible for a file
that has access condition ENC (ENCrypted) i) SIM cards:
for the read command. A common application for Smart
d) Storage of Secret keys on Smart Card Cards is for mobile phones. The central
The architecture of smart cards security processor of a mobile phone is
allows storing secret cryptographic keys in provided by a global system for mobile
safe manner. The stored keys can only be communication SIM (Subscriber Identity
used to perform cryptographic computations Module). The use of SIM cards has radically
but not for reading. The keys are stored in improved security of digital phones
specific data files called EF_KEY. The compared to the older analogue devices.
initial secret keys are written on the smart
card during the initialization process
performed by the card issuer. To write a new ii) Bank Cards:
secret key Knew on the smart card, secret Increasingly credit and debit cards
keys are needed that are (already) stored in are being used, using the contact chip rather
the smart card. than being swiped. The security feature
Smart card makes use of two kinds offered by Smart Cards protect consumers
of secret keys from their cards being cloned as it is much
 Management key more difficult to copy a chip protected
 Operational key. cryptographically than a magnetic strip.
A management key is used to iii) Health Cards:
encrypt another management key or Increasingly, Smart Cards are being
an operational key that have to be used to store a citizen’s medical data. The
written on the smart card. A cards are carried by the citizen and can
7

contain information such as list of allergies, customer’s account. Finally the wallet value
current and past medications, past treatment is updated.
history, disease history and doctors notes.
This enables medical information to be 6. MERITS AND DEMERITS:
easily accessed in an emergency. High-level security can be achieved
using cryptography in smart cards. Data
Consider the scenario how a smart card present in the smart card is more secured
works for banking. and can be viewed only by the authorized
persons only.
Stage 1: This is the initial process where the Although this system is very
enrollment of customer can takes place; the effective as protection, due to the large
image and details of customer are saved on amount processing power needed to run this
card. system it is impossible for use on older,
slower computers without the necessary
processing power to use such an extensive
encryption system. Weak-authentication
may break the security provided by the
smart card.

7. CONCLUSION:
Cryptography provides a solution to
the problem of security and privacy issues.
The usage of cryptography in Smart Cards
became very popular. Smart card technology
can be implemented for multi-applications
Fig: Evaluation Scenario of Smart cards
such as Bankcards, SIM cards, and Health
Stage 2: After the enrollment process
cards.
money loaded and wallet value is updated.
As card technologies continue to
Stage 3: When customer inserts the card for
develop we can expect to see advanced
money, the system read the data from the
cards interacting directly with users through
card, to verify the validity of customer.
displays, biometric sensors and buttons. This
Stage 4: After verification the machine
will open up many exciting novel
facilitates to credit or debit on the
applications, and further increase the
usability of Smart Cards.
8

8. REFERENCES:
1. http://www.cryptography.com
2. http://www.smartcardbasics.com
3.http://www.faqs.org/faqs/cryptography-
faq

S-ar putea să vă placă și