Advertisement

An Introduction to Smart Cards

  • Keith MayesEmail author
Chapter

Abstract

When we released the original version of this book, back in 2008, we stated that the concept of a smart card was not particularly new, but that the practical use of smart cards in a range of diverse applications had never been more popular. Eight years on and the statement is still valid, although we have seen some trends towards certain types of smart card and applications, and indeed more focus on embedded smart/secure chips that do not rely on the card form factor. Furthermore, we have seen the introduction of Near Field Communication (NFC), which permits mobile phones to emulate smart cards and readers. This chapter provides a first introduction to a wide range of smart cards and tokens, considering the various types, capabilities, popular applications and the practicality of their development and deployment, covered in detail within subsequent chapters.

Keywords

Smart cards Tokens Security Applications Java MULTOS RFID SIM ID Contactless Microprocessor cards Chip card Magnetic Stripe card Memory card Development Lifecycle Tags IoT NFC MIFARE Classic 

Notes

Acknowledgements

The author wishes to thank Vodafone, Giesecke and Devrient, Transport for London, The UK Cards Association, Orange Labs (UK), Visa and ITSO , plus all the ISG Smart Card Centre industry supporters for their encouragement and support over many years.

References

  1. 1.
    CEN TC 224 WG15, European Citizen Card, 2007. More Information Available via http://ec.europa.eu/idabc/servlets/Doc59a8.pdf?id=28716, cited 09 Apr 2016.
  2. 2.
    International Civil Aviation Organisation (ICA0) Doc 9303, 7th Edition, 2015. More Information Available via http://www.icao.int/publications/pages/publication.aspx?docnum=9303, cited 09 Apr 2016.
  3. 3.
    EMV Books 1-4, Version 4.3, Mov 2011. More Information Available via https://www.emvco.com/specifications.aspx?id=223, cited 09 Apr 2016.
  4. 4.
    Transport for London Oyster Card. More Information Available via https://oyster.tfl.gov.uk/oyster/entry.do, Cited 09 Apr 2016.
  5. 5.
    HID Corp Technology Basics Whitepaper Understanding Card Data Formats, 2006. More Information Available via https://www.hidglobal.com/sites/default/files/hid-understanding_card_data_formats-wp-en.pdf, cited 09 Apr 2016.
  6. 6.
    W. Rankl and W. Effing - Smart card handbook, 4th edition, John Wiley, 2010.Google Scholar
  7. 7.
    Card Watch “Types of Card Fraud”. More Information Available via http://www.cardwatch.org.uk/, cited 09 Apr 2016.
  8. 8.
    Financial Fraud Action UK, Fraud The Facts, The definitive overview of payment industry fraud and measures to prevent it, 2013. More Information Available via http://www.theukcardsassociation.org.uk/wm_documents/3533.
  9. 9.
    International Organization for Standardization, ISO/IEC 7816 1-4 Identification cards - Integrated circuit cards - Cards with contacts, 2011.Google Scholar
  10. 10.
    ECMA (Standard ECMA-340) Near Field Communication Interface and Protocol NFCIP-1, 3rd Edition, Jun 2013. More Information Available via http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-340.pdf, cited 09 Apr 2016.
  11. 11.
    Anderson, R. and Kuhn, M., Tamper Resistance - a Cautionary Note, In the Second USENIX Workshop on Electronic Commerce Proceedings (pp. 1–11), 1996.Google Scholar
  12. 12.
    International Organization for Standardization, ISO/IEC 14443 Identification cards - Contactless integrated circuit(s) cards - Proximity cards, 2016.Google Scholar
  13. 13.
    MIFARE. More Information Available via https://www.mifare.net/en/, cited 09 Apr 2016.
  14. 14.
    Auguste Kerckhoffs, “La cryptographie militaire”, Journal des sciences militaires, vol. IX, pp. 5–83, Jan. 1883, pp. 161–191, Feb. 1883.Google Scholar
  15. 15.
    K. Nohl, H. Plotz, Little Security Despite Obscurity, presentation on the 24th Congress of the Chaos Computer Club in Berlin (Dec 2007).Google Scholar
  16. 16.
    Mayes K and Markantonakis K On the potential of high density smart cards, Elseivier Information Security Technical Report Vol 11 No 3, 2006.Google Scholar
  17. 17.
    Oracle, 2011, Java Card Classic Platform Specification 3.0.4. More Information Available via http://www.oracle.com/technetwork/java/javacard/specs-jsp-136430.html, cited 09 Apr 2016.
  18. 18.
    MULTOS website. More Information Available via https://www.multos.com/, cited 09 Apr 2016.
  19. 19.
    GlobalPlatform, GlobalPlatform Card Specification v2.3, Oct 2015. More Information Available via http://www.globalplatform.org/, cited 09 Apr 2016.
  20. 20.
    M. Mouly, M-B Pautet, The GSM System for Mobile Communications, Cell & Sys. Correspondence, 1992.Google Scholar
  21. 21.
    Friedhelm Hillebrand, GSM & UMTS - The Creation of Global Mobile Communication - Wiley, 2002. ISBN: 978-0-470-84322-2.Google Scholar
  22. 22.
    COMP128-1 attack. More Information Available via http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html, cited 09 Apr 2016.
  23. 23.
    Octopus. More Information Available via http://www.hong-kong-travel.org/Octopus/, cited 09 Apr 2016.
  24. 24.
    ITSO, Specification v2.1.4, 2015. More Information Available via http://www.itso.org.uk, cited 09 Apr 2016.
  25. 25.
    Wikipedia, Data Rights Management, 2016. More Information Available via https://en.wikipedia.org/wiki/Digital_rights_management, cited 09 Apr 2016.
  26. 26.
    Canal+ website. More Information Available via http://www.canalplusgroupe.com/, cited 09 Apr 2016.
  27. 27.
    Irdeto website. More Information Available via http://www.irdeto.com, cited 09 Apr 2016.
  28. 28.
    NDS (now Cisco) website. More Information Available via http://www.cisco.com/c/en/us/solutions/service-provider/service-provider-video-solutions/index.html, Cited 09 Apr 2016.
  29. 29.
    3GPP, TS 11.14 V8.18.0 Specification of the SIM Application Toolkit for the Subscriber Identity Module - Mobile Equipment (SIM - ME) interface (Release 1999) version 8.18.0, Jun 2007. https://www.3gpp.org/, cited 09 Apr 2016.
  30. 30.
    Gisecke and Devrient, Smart Trust WIB, 2011. More Information Available via https://www.gi-de.com/gd_media/media/en/documents/brochures/mobile_security_2/smarttrust_1/SmartTrust_Wib.pdf, cited 09 Apr 2016.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Director of the Information Security Group, Head of the School of Mathematics and Information SecurityRoyal Holloway, University of LondonEghamUK

Personalised recommendations