Smartcard certification
โ Scribed by David Cherrill
- Publisher
- Elsevier Science
- Year
- 1999
- Tongue
- English
- Weight
- 260 KB
- Volume
- 4
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
โฆ Synopsis
Smartcards provide significantly better access control to the data stored on them than for instance magnetic-stripe cards. However, the level of protection provided against well-equipped attackers is frequently overestimated. Application designers must consider that skilled attackers can use various semiconductor test equipment to extract all information from smartcards, including cryptographic keys. Both invasive and noniiwasive attacks are possible and play different roles in risk evaluations.
The available techniques for penetrating smartcard processors fall into the following four categories:
โข Microprobing techniques can be used to access the chip surface directly. Attackers observe, manipulate, and interfere with the integrated circuit usingVLS! chip test equipment.
๐ SIMILAR VOLUMES
Given the potential risks involved in the use of smartcards, a smartcard designer will naturally want to build high confidence into the security of the product. One way to achieve this is to aim for certification to the highest ITSEC level: E6. This is not a decision to be taken lightly: E6 is dit~i
Smartcards: world access, Joe Paone. Mobile users dream of universal access to their networked desktops. Being able to log on to your own system fi-om a PC in a remote site and see your familiar interface, applications, and data could be a productivity enhancer as well as a convenience. For network