
Smart Card Handbook.
Title:
Smart Card Handbook.
Author:
Rankl, Wolfgang.
ISBN:
9780470660898
Personal Author:
Edition:
4th ed.
Physical Description:
1 online resource (1089 pages)
Contents:
Smart Card Handbook -- Contents -- Preface to the Fourth Edition -- Symbols and Notation -- Abbreviations -- 1 Introduction -- 1.1 The history of smart cards -- 1.2 Card types and applications -- 1.2.1 Memory cards -- 1.2.2 Processor cards -- 1.2.3 Contactless cards -- 1.3 Standardization -- 2 Card Types -- 2.1 Embossed cards -- 2.2 Magnetic-stripe cards -- 2.3 Smart cards -- 2.3.1 Memory cards -- 2.3.2 Contactless memory cards -- 2.3.3 Processor cards -- 2.3.4 Contactless processor cards -- 2.3.5 Multi-megabyte cards -- 2.3.6 Security tokens -- 2.4 Optical memory cards -- 3 Physical Properties -- 3.1 Card formats -- 3.2 Contact field -- 3.3 Card body -- 3.4 Card materials -- 3.5 Card components and security features -- 3.5.1 Guilloche patterns -- 3.5.2 Signature panel -- 3.5.3 Microtext -- 3.5.4 Ultraviolet text -- 3.5.5 Barcode -- 3.5.6 Hologram -- 3.5.7 Kinegram -- 3.5.8 Multiple Laser Image (MLI) -- 3.5.9 Embossing -- 3.5.10 Laser engraving -- 3.5.11 Scratch field -- 3.5.12 Thermochrome display -- 3.5.13 Moduliertes Merkmal (modulated feature) method -- 3.5.14 Security features -- 3.6 Chip modules -- 3.6.1 Electrical connections between the chip and the module -- 3.6.2 TAB modules -- 3.6.3 Chip-on-flex modules -- 3.6.4 Lead-frame modules -- 3.6.5 Special modules -- 4 Electrical Properties -- 4.1 Electrical connections -- 4.2 Supply voltage -- 4.3 Supply current -- 4.4 Clock supply -- 4.5 Data transmission with T = 0 or T =1 -- 4.6 Activation and deactivation sequences -- 5 Smart Card Microcontrollers -- 5.1 Semiconductor technology -- 5.2 Processor types -- 5.3 Memory types -- 5.3.1 ROM (read-only memory) -- 5.3.2 EPROM (erasable read-only memory) -- 5.3.3 EEPROM (electrically erasable read-only memory) -- 5.3.4 Flash memory -- 5.3.5 RAM (random-access memory) -- 5.3.6 FRAM (ferroelectric random-access memory) -- 5.4 Supplementary hardware.
5.4.1 Communication with T = 0 or T = 1 -- 5.4.2 Communication with USB -- 5.4.3 Communication with MMC -- 5.4.4 Communication with SWP -- 5.4.5 Communication with I2C -- 5.4.6 Timer -- 5.4.7 CRC (cyclic redundancy check) calculation unit -- 5.4.8 Random number generator (RNG) -- 5.4.9 Clock generation and clock multiplication -- 5.4.10 DMA (direct memory access) -- 5.4.11 Memory management unit (MMU) -- 5.4.12 Java accelerator -- 5.4.13 Coprocessor for symmetric cryptographic algorithms -- 5.4.14 Coprocessor for asymmetric cryptographic algorithms -- 5.4.15 Error detection and correction for nonvolatile memory -- 5.4.16 Mass memory interface -- 5.4.17 Multichip module -- 5.4.18 Vertical system integration (VSI) -- 5.5 Extended temperature range -- 6 Information Technology Foundations -- 6.1 Data structures -- 6.2 Encoding alphanumeric data -- 6.2.1 Seven-bit code (ASCII) -- 6.2.2 Eight-bit code (PC ASCII) -- 6.2.3 Sixteen-bit code (Unicode) -- 6.2.4 Thirty-two-bit code (UCS) -- 6.3 SDL notation -- 6.4 State machines -- 6.4.1 Basic theory of state machines -- 6.4.2 Practical applications -- 6.5 Error detection and correction codes -- 6.5.1 XOR checksums -- 6.5.2 CRC checksums -- 6.5.3 Reed-Solomon codes -- 6.5.4 Error correction codes -- 6.6 Data compression -- 7 Security Foundations -- 7.1 Cryptology -- 7.1.1 Symmetric cryptographic algorithms -- 7.1.1.1 DES algorithm -- 7.1.1.2 AES algorithm -- 7.1.1.3 IDEA algorithm -- 7.1.1.4 COMP128 algorithms -- 7.1.1.5 Milenage algorithm -- 7.1.1.6 Operating modes of block encryption algorithms -- 7.1.1.7 Multiple encryption -- 7.1.2 Asymmetric cryptographic algorithms -- 7.1.2.1 RSA algorithm -- 7.1.2.2 Generating RSA keys -- 7.1.2.3 DSS algorithm -- 7.1.2.4 Elliptic curves as asymmetric cryptographic algorithms -- 7.1.3 Padding -- 7.1.4 Message authentication code and cryptographic checksum.
7.2 Hash functions -- 7.3 Random numbers -- 7.3.1 Generating random numbers -- 7.3.2 Testing random numbers -- 7.4 Authentication -- 7.4.1 Unilateral symmetric authentication -- 7.4.2 Mutual symmetric authentication -- 7.4.3 Static asymmetric authentication -- 7.4.4 Dynamic asymmetric authentication -- 7.5 Digital signatures -- 7.6 Certificates -- 7.7 Key management -- 7.7.1 Derived keys -- 7.7.2 Key diversification -- 7.7.3 Key versions -- 7.7.4 Dynamic keys -- 7.7.4.1 Generation with a symmetric cryptographic algorithm -- 7.7.4.2 Generation with an asymmetric cryptographic algorithm -- 7.7.5 Key data -- 7.7.6 Key management example -- 7.8 Identification of persons -- 7.8.1 Knowledge-based identification -- 7.8.2 Testing a secret number -- 7.8.3 The probability of guessing a PIN -- 7.8.4 Generating PIN codes -- 7.8.5 Verifying that a terminal is genuine -- 7.8.6 Biometric methods -- 8 Communication with Smart Cards -- 8.1 Answer to reset (ATR) -- 8.1.1 The initial character -- 8.1.2 The format character -- 8.1.3 The interface characters -- 8.1.3.1 Global interface character TA1 -- 8.1.3.2 Global interface character TAi -- 8.1.3.3 Global interface character TC1 -- 8.1.3.4 Specific interface character TC2 -- 8.1.3.5 Specific interface character TAi (i > 2) -- 8.1.3.6 Specific interface character TBi (i > 2) -- 8.1.3.7 Specific interface character TCi (i > 2) -- 8.1.3.8 Global interface character TA2 -- 8.1.4 The historical characters -- 8.1.5 The check character -- 8.1.6 Practical examples of ATRs -- 8.2 Protocol Parameter Selection (PPS) -- 8.3 Message structure: APDUS -- 8.3.1 Command APDU structure -- 8.3.2 Response APDU structure -- 8.4 Secure Data Transmission -- 8.4.1 Data objects for plaintext -- 8.4.2 Data objects for security mechanisms -- 8.4.3 Data objects for auxiliary functions -- 8.4.4 The authentic mode procedure.
8.4.5 The combined mode procedure -- 8.4.6 Send sequence counter -- 8.5 Logical channels -- 8.6 Logical protocols -- 8.6.1 TCP/IP protocol -- 8.6.2 HTTP protocol -- 8.6.3 Bearer Independent Protocol (BIP) -- 8.7 Connecting terminals to higher-level systems -- 8.7.1 PC/SC -- 8.7.1.1 ICC-aware application -- 8.7.1.2 Service provider -- 8.7.1.3 ICC resource manager -- 8.7.1.4 IFD handler -- 8.7.1.5 IFD (interface device) -- 8.7.1.6 ICC (integrated chip card) -- 8.7.2 OCF -- 8.7.3 MKT -- 8.7.4 MUSCLE -- 9 Data Transmission with Contact Cards -- 9.1 Physical transmission layer -- 9.2 Memory card protocols -- 9.2.1 Telephone chip protocol -- 9.2.1.1 Resetting the address pointer -- 9.2.1.2 Incrementing the address pointer and reading data -- 9.2.1.3 Writing to an address -- 9.2.1.4 Erasing bytes -- 9.2.2 I2C bus -- 9.2.2.1 Reading from an address -- 9.2.2.2 Writing to an address -- 9.3 ISO transmission protocols -- 9.3.1 The T = 0 transmission protocol -- 9.3.2 The T = 1 transmission protocol -- 9.3.2.1 Block structure -- 9.3.2.2 Send/receive sequence counter -- 9.3.2.3 Waiting times -- 9.3.2.4 Transmission protocol mechanisms -- 9.3.2.5 Example of data transmission with the T = 1 protocol -- 9.3.3 Comparison of the T = 0 and T = 1 transmission protocols -- 9.3.4 The T = 14 transmission protocol (Germany) -- 9.4 USB transmission protocol -- 9.4.1 Electrical connection -- 9.4.2 Logical connection -- 9.4.2.1 Transfer modes -- 9.4.2.2 Data packets -- 9.4.3 Device classes -- 9.4.4 Summary and prospects -- 9.5 MMC transmission protocol -- 9.6 Single-wire protocol (SWP) -- 10 Contactless Data Transmission -- 10.1 Inductive coupling -- 10.2 Power transmission -- 10.3 Data transmission -- 10.4 Capacitive coupling -- 10.5 Collision avoidance -- 10.6 State of standardization -- 10.7 Close-coupling cards (ISO/IEC 10536) -- 10.7.1 Power transmission.
10.7.2 Inductive data transmission -- 10.7.2.1 Transmission from the card to the terminal -- 10.7.2.2 Transmission from the terminal to the card -- 10.7.3 Capacitive data transmission -- 10.8 Remote coupling cards -- 10.9 Proximity cards (ISO/IEC 14443) -- 10.9.1 Physical properties -- 10.9.2 Power transmission and signal interface -- 10.9.3 Signal and communication interface -- 10.9.4 Type A communication interface -- 10.9.5 Type B communication interface -- 10.9.5.1 Data transmission from the terminal to the card -- 10.9.5.2 Data transmission from the card to the terminal -- 10.9.6 Initialization and anticollision (ISO/IEC 14443-3) -- 10.9.6.1 Type A initialization and anticollision -- 10.9.6.2 Type B initialization and anticollision -- 10.9.7 Transmission protocol (ISO/IEC 14433-4) -- 10.9.7.1 Protocol activation with Type A cards -- 10.9.7.2 Half-duplex block protocol (ISO/IEC 14433-4) -- 10.9.7.3 Deactivating a card -- 10.9.7.4 Error handling -- 10.10 Vicinity integrated circuit cards (ISO/IEC 15693) -- 10.11 Near field communication (NFC) -- 10.11.1 State of standardization -- 10.11.2 NFC protocol -- 10.11.3 NFC applications -- 10.11.3.1 Rapid access to information regarding services -- 10.11.3.2 Peer-to-peer information exchange -- 10.11.3.3 Mobile payment -- 10.11.3.4 Secure NFC -- 10.12 FeliCa -- 10.13 Mifare -- 11 Smart Card Commands -- 11.1 File selection commands -- 11.2 Read and write commands -- 11.3 Search commands -- 11.4 File operation commands -- 11.5 Commands for authenticating persons -- 11.6 Commands for authenticating devices -- 11.7 Commands for cryptographic algorithms -- 11.8 File management commands -- 11.9 Application management commands -- 11.10 Completion commands -- 11.11 Commands for hardware testing -- 11.12 Commands for data transmission -- 11.13 Database commands (SCQL) -- 11.14 Commands for electronic purses.
11.15 Commands for credit and debit cards.
Abstract:
Preface to the Fourth Edition. Symbols and Notation. Abbreviations. 1 Introduction. 1.1 The history of smart cards. 1.2 Card types and applications. 1.3 Standardization. 2 Card Types. 2.1 Embossed cards. 2.2 Magnetic-stripe cards. 2.3 Smart cards. 2.4 Optical memory cards. 3 Physical Properties. 3.1 Card formats. 3.2 Contact field. 3.3 Card body. 3.4 Card materials. 3.5 Card components and security features. 3.6 Chip modules. 4 Electrical Properties. 4.1 Electrical connections. 4.2 Supply voltage. 4.3 Supply current. 4.4 Clock supply. 4.5 Data transmission with T = 0 or T =1. 4.6 Activation and deactivation sequences. 5 Smart Card Microcontrollers. 5.1 Semiconductor technology. 5.2 Processor types. 5.3 Memory types. 5.4 Supplementary hardware. 5.5 Extended temperature range. 6 Information Technology Foundations. 6.1 Data structures. 6.2 Encoding alphanumeric data. 6.3 SDL notation. 6.4 State machines. 6.5 Error detection and correction codes. 6.6 Data compression. 7 Security Foundations. 7.1 Cryptology. 7.2 Hash functions. 7.3 Random numbers. 7.4 Authentication. 7.5 Digital signatures. 7.6 Certificates. 7.7 Key management. 7.8 Identification of persons. 8 Communication with Smart Cards. 8.1 Answer to reset (ATR). 8.2 Protocol Parameter Selection (PPS). 8.3 Message structure: APDUS. 8.4 Secure Data Transmission. 8.5 Logical channels. 8.6 Logical protocols. 8.7 Connecting terminals to higher-level systems. 9 Data Transmission with Contact Cards. 9.1 Physical transmission layer. 9.2 Memory card protocols. 9.3 ISO transmission protocols. 9.4 USB transmission protocol. 9.5 MMC transmission protocol. 9.6 Single-wire protocol (SWP). 10 Contactless Data Transmission. 10.1 Inductive coupling. 10.2 Power transmission. 10.3
Data transmission. 10.4 Capacitive coupling. 10.5 Collision avoidance. 10.6 State of standardization. 10.7 Close-coupling cards (ISO/IEC 10536). 10.8 Remote coupling cards. 10.9 Proximity cards (ISO/IEC 14443). 10.10 Vicinity integrated circuit cards (ISO/IEC 15693). 10.11 Near field communication (NFC). 10.12 FeliCa. 10.13 Mifare. 11 Smart Card Commands. 11.1 File selection commands. 11.2 Read and write commands. 11.3 Search commands. 11.4 File operation commands. 11.5 Commands for authenticating persons. 11.6 Commands for authenticating devices. 11.7 Commands for cryptographic algorithms. 11.8 File management commands. 11.9 Application management commands. 11.10 Completion commands. 11.11 Commands for hardware testing. 11.12 Commands for data transmission. 11.13 Database commands (SCQL). 11.14 Commands for electronic purses. 11.15 Commands for credit and debit cards. 11.16 Application-specific commands. 11.17 Command processing times. 12 Smart Card File Management. 12.1 File structure. 12.2 The life cycle of files. 12.3 File types. 12.4 Application files. 12.5 File names. 12.6 File selection. 12.7 EF file structures. 12.8 File access conditions. 12.9 File attributes. 13 Smart Card Operating Systems. 13.1 Evolution of smart card operating systems. 13.2 Fundamental aspects and tasks. 13.3 Command processing. 13.4 Design and implementation principles. 13.5 Operating system completion. 13.6 Memory organization and memory management. 13.7 File management. 13.8 Sequence control. 13.9 ISO/IEC 7816-9 resource access. 13.10 Atomic operations. 13.11 Multitasking. 13.12 Performance. 13.13 Application management with global platform. 13.14 Downloadable program code. 13.15 Executable native code. 13.16 Open platforms. 13.17 The small-OS smart card
operating system. 14 Smart Card Production. 14.1 Tasks and roles in the production process. 14.2 The smart card life cycle. 14.3 Chip and module production. 14.4 Card Body production. 14.5 Combining the card body and the chip. 14.6 Electrical testing of modules. 14.7 Loading static data. 14.8 Loading individual data. 14.9 Envelope stuffing and dispatching. 14.10 Special types of production. 14.11 Termination of card usage. 15 Quality Assurance. 15.1 Card body tests. 15.2 Microcontroller hardware tests. 15.3 Test methods for contactless smart cards. 15.5 Evaluation of hardware and software. 16 Smart Card Security. 16.1 Classification of attacks and attackers. 16.2 A history of attacks. 16.3 Attacks and defense measures during development. 16.4 Attacks and defense measures during production. 16.5 Attacks and defense measures during card usage. 17 Smart Card Terminals. 17.1 Mechanical properties. 17.2 Electrical properties. 17.3 User interface. 17.4 Application interface. 17.5 Security. 18 Smart Cards in Payment Systems. 18.1 Payment transactions with cards. 18.2 Prepaid memory cards. 18.3 Electronic purses. 18.4 EMV Application. 18.5 PayPass and payWave. 18.6 The Eurocheque System in Germany. 19 Smart Cards in Telecommunication Systems. 19.1 Public card phones in Germany. 19.2 Telecommunication. 19.3 Overview of mobile telecommunication systems. 19.4 The GSM system. 19.5 The UMTS system. 19.6 The wireless identification module (WIM). 19.7 Microbrowsers. 20 Smart Cards in Health Care Systems. 20.1 Health insurance cards in Germany. 20.2 Electronic health care cards in Germany. 21 Smart Cards in Transportation Systems. 21.1 Electronic tickets. 21.2 Ski Passes. 21.3 Tachosmart. 21.4 Electronic toll systems. 22 Smart Cards for Identification and
Passports. 22.1 FINEID personal ID card. 22.2 ICAO-compliant passports. 23 Smart Cards for IT Security. 23.1 Digital signatures. 23.2 Signature applications compliant with PKCS #15. 23.3 Smart Card Web Server (SCWS). 24 Application Design. 24.1 General information and characteristic data. 24.2 Application generation tools. 24.3 Analyzing an unknown smart card. 25 Appendix. 25.1 Glossary. 25.2 Related reading. 25.3 Bibliography. 25.4 Directory of standards and specifications. 25.5 Web addresses. Index.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Genre:
Added Author:
Electronic Access:
Click to View