Smart Cards, Tokens, Security and Applications / Edition 2

Smart Cards, Tokens, Security and Applications / Edition 2

ISBN-10:
3319844121
ISBN-13:
9783319844121
Pub. Date:
07/27/2018
Publisher:
Springer International Publishing
ISBN-10:
3319844121
ISBN-13:
9783319844121
Pub. Date:
07/27/2018
Publisher:
Springer International Publishing
Smart Cards, Tokens, Security and Applications / Edition 2

Smart Cards, Tokens, Security and Applications / Edition 2

$89.99
Current price is , Original price is $89.99. You
$89.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverseindustry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.


Product Details

ISBN-13: 9783319844121
Publisher: Springer International Publishing
Publication date: 07/27/2018
Edition description: Softcover reprint of the original 2nd ed. 2017
Pages: 531
Product dimensions: 6.10(w) x 9.25(h) x (d)

About the Author

Prof. Keith Mayes, B.Sc., Ph.D. CEng FIET A. Inst. ISP is the Director of the Information Security Group (ISG), and Head of the School of Mathematics and Information Security at Royal Holloway, University of London, which has been pioneering information/cybersecurity research and education since 1990. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His current research interests are diverse, including mobile communications, Near-Field Communication (NFC), mobile platform security, smart cards, Radio Frequency IDs (RFIDS), the Internet of Things, transport ticketing/system security, embedded systems and e-commerce. Keith joined the ISG in 2002, originally as the founder Director of the ISG Smart Card Centre, following a career in industry working for Pye TVT, Honeywell Aerospace and Defence, Racal Research and Vodafone. Keith is a Chartered Engineer, a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and an experienced company director and consultant.

Prof. Konstantinos Markantonakis B.Sc., M.Sc., MBA, Ph.D. (London) received his B.Sc. in Computer Science from Lancaster University in 1995, his M.Sc. in Information Security in 1996, his Ph.D. in 2000 and his MBA in International Management in 2005 from Royal Holloway, University of London. He is currently a Professor of Information Security in the Information Security Group in Royal Holloway, University of London. He is also the Director of the Information Security Group Smart Card Centre (SCC). His main research interests include smart card security and applications, secure cryptographic prool design, key management, embedded system security and trusted execution environments, mobile phone operating systems/platform security, NFC/RFID/HCE security, grouping proofs, electronic voting prools. He has published more than 140 papers in international conferences and journals. Since completing his Ph.D., he has worked as an independent consultant in a number of information security and smart card related projects. He has worked as multiapplication smart card manager in VISA International EU and as a Senior Information Security Consultant for Steer Davies Gleave. He is a member of the IFIP Working Group 8.8 on Smart Cards. Since June 2014, he is the vice-chair of IFIP WG 11.2 Pervasive Systems Security. He continues to act as a consultant on a variety of topics including smart card security, key management, information security prools, mobile devices, smart card migration program planning/project management for financial institutions, transport operators and technology integrators.

Table of Contents

An Introduction to Smart Cards   Keith Mayes     1
Introduction     1
What is a Smart Card?     2
Magnetic Stripe Cards     2
Chip Cards     5
Microprocessor Chip Cards     6
Contact-less Smart Cards and RFIDs     6
Smart Tokens     7
Smart Card Chips     8
Tamper Resistance     11
Smart Card Characteristics     12
Issuer Control     13
Current Applications for Smart Cards     14
Mobile Telephony     15
Banking     17
Transport     17
Identity and Passports     18
Entitlement and Health     18
Physical and IT Access Control     19
Satellite TV     20
Smart Card Application Development     20
Development, Roll-Out and Lifecycle Management Issues     22
In Conclusion     23
References     24
Smart Card Production Environment   Claus Ebner     27
Introduction     27
Smart Card Production Steps     29
Overview     29
Card Body Manufacturing     29
Personalization andrelated Services     35
Security and Quality     44
Current Trends     46
In Conclusion     48
References     50
Multi Application Smart Card Platforms and Operating Systems   Konstantinos Markantonakis     51
Introduction     51
Smart card Platform Evolution     52
Java Card     55
Java Card Forum     55
Java Card Technology     56
GlobalPlatform     64
The GlobalPlatform Association     64
The GlobalPlatform Card Specification     65
Multos     72
The MULTOS Consortium     72
MULTOS Specification     73
The Multos Card Architecture     73
Multos Executable Language (MEL)     73
The Application Abstract Machine     75
Application Loading and Deletion     75
Communicating with a Multos Smart Card     76
Multos Files     76
Multos Security Features     76
Smartcard.NET Card     77
BasicCard     78
WfSC     78
Conclusions     79
References     80
Smart Cards for Mobile Communications    Keith Mayes   Tim Evans     85
Introduction     85
SIM/USIM Standards     87
Subscriber Identity and Authentication     89
So how does SIM Authentication Work?     91
3G/USIM Authentication/Ciphering     92
SIM/USIM Authentication Algorithms     96
General Added Features     97
Phone Book     97
Roaming list     98
SMS Settings and Storage     98
Last Dialled numbers     99
Access Control Class     99
GPRS Authentication and encryption files     99
File Types     99
SIMs and USIMs Some Practical Comparisons     100
(U)SIM Value Added Services     103
The (U)SIM as a Handset Security Module     107
The Future Evolution of the (U)SIM     108
Conclusions     111
References     112
Smart cards for Banking and Finance   Konstantinos Markantonakis   Keith Mayes     115
Introduction     115
Payment Card Technologies     116
Magnetic Stripe Cards     118
Smart Cards and EMV     120
Card Authentication      121
Cardholder Not Present Transactions     125
Purchase from a Genuine Merchant Using Someone Else's Payment Details     126
Genuine Purchaser Buying from a Rogue Merchant     126
Third Party Attacker     127
Dynamic Passcode Authentication     128
Could a Mobile Phone be a Token Reader?     131
Token Authentication Examples     132
E-Commerce Solutions     133
3D-Secure     133
Thoughts on 3D Secure     136
Just Wave Your Card to Pay     136
Concluding Remarks     137
References     137
Security For Video Broadcasting   Allan Tomlinson     139
Introduction     139
Digital Video Basics     141
Scrambling     142
Synchronisation     143
Key Delivery     144
Access Requirements     145
Key Hierarchy     146
Implementation     147
In Conclusion     152
References     153
Introduction to the TPM   Allan Tomlinson     155
Introduction     155
Trusted Platforms     156
Fundamental Features of a Trusted Platform      157
Additional Features     159
TPM Features     160
TPM Components     160
I/O Block     160
Non-Volatile Storage     161
Attestation Identity Keys     162
Platform Configuration Registers     163
Programme Code     163
Execution Engine     163
Random Number Generator     164
SHA-1 Engine     164
RSA Key Generation     164
RSA Engine     165
Opt-In     165
Other Features     167
TPM Services     167
Roots of Trust     167
Boot Process     168
Secure Storage     168
Attestation     169
In Conclusion     171
References     171
Common Criteria   John Tierney     173
Introduction     173
Evolution of National and International Standards     174
International Recognition     175
The need for security benchmarks     176
Evaluation Practicalities     177
Types of evaluation     178
Evaluation Assurance Levels     179
Augmentation of Assurance Levels     179
Evaluation Roles     180
Performing Evaluations     181
Developing Protection Profiles and Security Targets     182
Establish the security environment     182
Establish Security Objectives     183
Establish Security Requirements     183
Establish TOE Summary Specification     184
Establish Rationale     184
Claiming Compliance with Protection Profiles     185
An Example     185
Establish the Security Environment     186
Establish security objectives     186
Establish Security Requirements     187
Establish TOE summary specification     188
Establish Rationale     189
Deliverables     189
Evaluation Composition     190
In Conclusion     192
References     193
Smart Card Security   Michael Tunstall     195
Introduction     195
Cryptographic Algorithms     197
Data Encryption Standard     197
RSA     199
Smart Card Security Features     202
Communication     202
Cryptographic Coprocessors     203
Random Number Generators     204
Anomaly Sensors     205
Chip Features     205
Side Channel Analysis     207
Timing Analysis     207
Power Analysis     208
Electromagnetic Analysis     213
Countermeasures     214
Fault Analysis     216
Fault Injection Mechanisms     217
Modelling the Effect of a Fault     218
Faults in Cryptographic Algorithms     218
Countermeasures     221
Embedded Software Design     222
PIN Verification     222
File Access     224
In Conclusion     225
References     225
Application Development Environments for Java and SIM Toolkit   Gary Waite   Keith Mayes     229
Introduction     229
Smart Cards Characteristics     230
Limitations     231
SIM Cards     232
Java Card     233
The Java Card Framework     235
Java SIM     238
sim.toolkit     239
sim.access     242
Application Development Tools     243
Compilers & Integrated Development Environments      243
Simulators     244
Protocol Analysis (Spy) Tools     245
Utilities     246
Mobile Phone Applications and the (U)SIM     247
SATSA     248
A Word on Testing     250
SIM Dongle Example     251
Looking To The Future     253
Concluding Remarks     253
References     254
OTA and Secure SIM Lifecycle Management   Joos Cadonau     257
Introduction     258
The SIM Card As A Managed Platform     258
Common Stored and Managed Data     259
SIM Application Toolkit Interface SAT     260
Main Differences Between a SIM and a UICC/USIM Card     264
OTA - Over-The-Air Management     265
OTA Server Capabilities     267
Limitations and Improvements     268
Customer Managed Applications     270
SIM Lifecycle Management     271
In Conclusion     274
References     275
Smart Card Reader APIS   Damien Sauveron     277
Terminology: Smart Card Reader, IFD, CAD and Terminal     277
OCF: OpenCard Framework     279
Overview      279
Example     281
PC/SC     282
Overview     282
Architecture     282
Various Implementations     285
Wrappers     288
Examples     289
STIP     291
In Conclusion     291
References     292
RFID and Contactless Technology   Gerhard P. Hancke     295
Introduction     295
Contactless Technology     296
Applications     299
Radio Frequency Interface     301
Communication Theory     302
Inductive Coupling     305
Standards     311
ISO 14443     311
ISO 15693     317
ISO 18000     319
ISO 18092/NFC     320
Conclusion     321
References     321
ID CARDS AND PASSPORTS   Ingo Liersch     323
Introduction     323
ID Cards     324
Requirements and Constituents of Modern National ID Cards     324
International Standards for ID Cards     331
Optical Personalisation of ID Cards     333
Countries and Their ID Cards      337
E-Passports     339
Introduction     339
Constituents of Passports     341
EU and ICAO Requirements     343
Security Protocols     344
Conclusion     345
References     345
Smart Card Technology Trends   Chris Shire     347
Trends In Smart Card Technology - Today And The Future     347
History     348
Technology Choices     351
Technology Drivers     355
Technology Trends     364
Emerging Applications     370
Conclusions     376
References     377
Source Code for Chapter 12     381
C Language     381
Perl Language     385
Index     387
From the B&N Reads Blog

Customer Reviews