Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Smart Cards: Technology for Secure Management of Information ppt
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Smart Cards: Technology for Secure Management of Information



[attachment=47737]

What are smart cards?

Credit card sized plastic card
with an embedded chip.
The standard definition of
a smart card, or integrated
circuit card (ICC), is any
pocket sized card with
embedded integrated circuits.

History of Smart Cards:

Smart Card has its origin in 1970s by inventors from Germany, Japan and France.
First use was with the integration of microchips into all French debit cards.
The major use of smart card came in the 1990s, with the introduction of the smart-card-based SIM used in GSM mobile phone.
The manufacturers of Smart Cards are IBM,
Siemens, Telesec and many more..

What is SMART about the Smart Cards ?

Smart Cards are capable of not just storing data but also have processing power.
The data stored can be protected against unauthorized access.
They are appropriate for secure and convenient data storage.
Smart cards have the property of multifunctionality.

Password Verification

Terminal asks the user to provide a password.
Password is sent to Card for verification.
Scheme can be used to permit user authentication.
Not a person identification scheme

Cryptographic Verification

Terminal verify card (INTERNAL AUTH)
Terminal sends a random number to card to be hashed or encrypted using a key.
Card provides the hash or cyphertext.
Terminal can know that the card is authentic.
Card needs to verify (EXTERNAL AUTH)
Terminal asks for a challenge and sends the response to card to verify
Card thus know that terminal is authentic.
Primarily for the “Entity Authentication”

CAIN

Confidentiality is obtained by the encryption of the information on the card.
Authenticity is gained by using the PKI algorithm and the two/three factor authentication.
Integrity is maintained through error-checking and enhanced firmware.
Repudiation is lower because each transaction is authenticated and recorded.

Application of Smart Cards

Financial Services
Affinity Services
Cellular phones
Set Top Boxes
Government Programs
Information Security
Communications Applications
Transportation