| Foreword | p. xvii |
| Background | p. 1 |
| Introduction | p. 3 |
| The march of the card | p. 3 |
| What is a smart card? | p. 4 |
| Systems and procedures | p. 5 |
| Market issues | p. 6 |
| Organization of this book | p. 7 |
| Problem Definition | p. 9 |
| Perceptions | p. 9 |
| ... and reality | p. 10 |
| Calculating the risks: probabilities and odds | p. 11 |
| Technical communication obstacles | p. 12 |
| Specifying the Requirements | p. 15 |
| Security criteria | p. 15 |
| Safety | p. 16 |
| Nondelivery | p. 16 |
| Accuracy | p. 17 |
| Data integrity | p. 17 |
| Confidentiality | p. 18 |
| Impersonation | p. 19 |
| Repudiation | p. 19 |
| Quantifying the threat | p. 20 |
| Possible outcomes and costs | p. 20 |
| Objects threatened | p. 21 |
| Causes and modes of failure | p. 21 |
| Frequency of incidents | p. 23 |
| Risk management | p. 24 |
| Standards | p. 25 |
| Use of standards within specifications | p. 25 |
| Classes of security | p. 26 |
| Quality assurance | p. 27 |
| Documenting the specification | p. 28 |
| Initial system specification | p. 28 |
| Analysis and iteration | p. 28 |
| Component security objectives | p. 29 |
| Technology | p. 31 |
| Card Technology | p. 33 |
| Visual features | p. 33 |
| Magnetic stripe | p. 35 |
| Encoding and decoding | p. 35 |
| Copying and counterfeiting | p. 37 |
| High-coercivity cards | p. 39 |
| Other magnetic card types | p. 40 |
| Enhancing security using complementary technologies | p. 40 |
| Optical | p. 41 |
| Smart cards | p. 42 |
| Origins and development | p. 42 |
| Elements of the technology | p. 43 |
| Standards | p. 44 |
| Hybrids | p. 45 |
| PCMCIA cards | p. 46 |
| Others | p. 46 |
| Barcoding | p. 47 |
| Radio frequency identification (RFID) | p. 47 |
| Encryption | p. 49 |
| Cryptology overview and terminology | p. 49 |
| Algorithms | p. 50 |
| Symmetric key systems | p. 51 |
| Asymmetric key systems | p. 52 |
| Keys | p. 54 |
| Secret keys | p. 54 |
| Public and private keys | p. 55 |
| Master keys and derived keys | p. 55 |
| User and equipment keys | p. 56 |
| Key-encrypting keys | p. 56 |
| Session keys | p. 57 |
| Selecting an algorithm and key length | p. 59 |
| Key management | p. 61 |
| Key generation | p. 61 |
| Key transmission | p. 62 |
| Key indexes | p. 62 |
| Certification authority | p. 63 |
| Computational requirements | p. 63 |
| Cryptography export controls | p. 64 |
| Summary | p. 65 |
| References | p. 66 |
| Passwords and Biometrics | p. 67 |
| Personal identification types | p. 67 |
| Passwords, tokens, and biometrics | p. 67 |
| Behavioral and physiometric | p. 68 |
| Requirements | p. 69 |
| Recognition versus verification | p. 69 |
| Performance | p. 69 |
| Procedures | p. 70 |
| Components | p. 71 |
| Passwords and PINs | p. 72 |
| Behavioral | p. 73 |
| Signature verification | p. 73 |
| Keystroke dynamics | p. 74 |
| Voice recognition | p. 74 |
| Physiometric | p. 75 |
| Finger/thumbprint | p. 75 |
| Hand geometry | p. 76 |
| Retina scan | p. 76 |
| Iris scan | p. 76 |
| Others | p. 77 |
| Biometrics and cards | p. 77 |
| Smart Card Types and Characteristics | p. 79 |
| Memory cards | p. 80 |
| Unprotected | p. 80 |
| Protected | p. 80 |
| Secure logic | p. 81 |
| Microprocessor cards | p. 81 |
| Development | p. 81 |
| Conventional | p. 82 |
| State change | p. 83 |
| Cryptographic | p. 84 |
| Contact and contactless | p. 85 |
| Contact cards | p. 85 |
| Contactless cards | p. 85 |
| Combi cards | p. 87 |
| Form factors | p. 89 |
| Modules | p. 89 |
| Minicards | p. 90 |
| Diskettes | p. 91 |
| Keys | p. 91 |
| Others | p. 92 |
| Smart-Card Components | p. 93 |
| Carrier | p. 93 |
| External security features | p. 94 |
| Chip | p. 95 |
| Microprocessor | p. 95 |
| Memory | p. 96 |
| Coprocessors | p. 98 |
| Memory management | p. 99 |
| Input-output | p. 100 |
| Chip security features | p. 100 |
| Contacts | p. 102 |
| Antenna | p. 103 |
| Mask | p. 104 |
| Reliability factors | p. 107 |
| Sample card specifications | p. 107 |
| System Components | p. 109 |
| Reader | p. 109 |
| Contacts | p. 110 |
| Card transport | p. 111 |
| Control electronics | p. 111 |
| Contactless-card readers | p. 114 |
| Terminal | p. 114 |
| PINpads | p. 114 |
| PC reader | p. 116 |
| EPOS or EFT-POS terminal | p. 116 |
| ATM | p. 117 |
| Vending machine | p. 117 |
| Access control | p. 118 |
| Others | p. 119 |
| Terminal protection | p. 119 |
| Network | p. 119 |
| The role of the card | p. 119 |
| Network security checks | p. 120 |
| Provision of network security | p. 121 |
| The Internet | p. 121 |
| Fallback and recovery | p. 121 |
| Hacking | p. 122 |
| Host systems | p. 122 |
| Trusted third parties | p. 124 |
| Authentication hosts | p. 124 |
| Evidence centers | p. 125 |
| Key escrow | p. 125 |
| Processes and Procedures | p. 127 |
| Chip design | p. 129 |
| Manufacture | p. 130 |
| Personalization | p. 132 |
| Data transmission | p. 132 |
| Fixed and derived data | p. 133 |
| Testing | p. 133 |
| Data protection | p. 134 |
| Electrostatic discharge and interference | p. 134 |
| Issue | p. 134 |
| Loading/validation | p. 135 |
| Use | p. 136 |
| Logging | p. 136 |
| Card and cardholder authentication | p. 136 |
| Error recovery | p. 137 |
| Lost, stolen, and misused cards | p. 137 |
| Issues | p. 137 |
| Detection | p. 138 |
| Block and unblock | p. 139 |
| Reissue | p. 139 |
| End of life | p. 140 |
| Expiration | p. 140 |
| Dispose or recover | p. 140 |
| Recycle | p. 141 |
| Applications | p. 143 |
| Telephony and Telecommunications Applications | p. 145 |
| Prepaid telephone cards | p. 146 |
| Requirements | p. 146 |
| Standards | p. 146 |
| Issues | p. 147 |
| Reloadable and account cards | p. 149 |
| GSM telephones | p. 150 |
| Television decryption | p. 153 |
| Requirements | p. 153 |
| Weaknesses and responses | p. 154 |
| Computer networks | p. 155 |
| Computer system access | p. 155 |
| Confidentiality of data and programs | p. 156 |
| The Internet | p. 156 |
| Internet and Web access points | p. 156 |
| Data content | p. 157 |
| Internet mail | p. 157 |
| Internet purchases | p. 158 |
| Financial Applications | p. 161 |
| Bank cards | p. 161 |
| Functions | p. 161 |
| Attacks | p. 164 |
| Credit/debit cards | p. 165 |
| Requirements | p. 165 |
| Standards | p. 167 |
| Procedures | p. 169 |
| Electronic purses | p. 171 |
| Requirements | p. 171 |
| Types | p. 173 |
| Status | p. 178 |
| Online transactions | p. 181 |
| Transaction authorization | p. 181 |
| Secure electronic transactions | p. 181 |
| Other electronic commerce | p. 182 |
| Benefits payment | p. 182 |
| Loyalty | p. 183 |
| Other value-added services | p. 184 |
| References | p. 185 |
| Health | p. 187 |
| Insurance | p. 187 |
| Medical records | p. 188 |
| Alternative approaches | p. 188 |
| Issues | p. 189 |
| Operational and pilot schemes | p. 191 |
| Prescription | p. 192 |
| Patient monitoring | p. 193 |
| Reference | p. 194 |
| Transport | p. 195 |
| Local public transportation | p. 195 |
| Organization | p. 195 |
| Types of card | p. 197 |
| Issues for smart cards | p. 199 |
| Taxis | p. 200 |
| Trains | p. 201 |
| Air travel | p. 201 |
| Requirements | p. 201 |
| Electronic ticketing | p. 202 |
| Inflight entertainment | p. 203 |
| Road tolling | p. 204 |
| Parking | p. 205 |
| User Identification | p. 207 |
| Requirements | p. 207 |
| Issues | p. 208 |
| Level of security | p. 208 |
| Online and offline systems | p. 209 |
| Card issuer responsibilities | p. 209 |
| Data storage | p. 209 |
| Access control | p. 210 |
| Alternative technologies | p. 210 |
| Features | p. 210 |
| Special cases | p. 211 |
| Other applications | p. 212 |
| Multiapplication Cards | p. 215 |
| Functions and applications | p. 215 |
| Card operating system | p. 218 |
| Downloading | p. 219 |
| Hybrid card types | p. 220 |
| Card control | p. 220 |
| Issuer responsibilities | p. 221 |
| Consumer issues | p. 221 |
| Interchange and compatibility with existing card systems | p. 222 |
| Current Trends and Issues | p. 223 |
| Market forecasts | p. 223 |
| Cards | p. 225 |
| Chips | p. 225 |
| Masks | p. 227 |
| Contact/contactless | p. 228 |
| Application downloading | p. 228 |
| Encryption | p. 229 |
| International issues | p. 229 |
| Single terminals | p. 230 |
| Standards | p. 230 |
| Market structure | p. 232 |
| Security Model | p. 235 |
| Aims | p. 235 |
| Reducing the reward | p. 235 |
| Increasing the effort | p. 237 |
| Criteria | p. 237 |
| Types of security | p. 238 |
| Model | p. 238 |
| Storage | p. 238 |
| Transmission | p. 240 |
| Use | p. 240 |
| Analysis | p. 242 |
| Initial situation analysis | p. 242 |
| Sources of attack | p. 243 |
| Risk analysis checklist | p. 245 |
| The Way Forward | p. 247 |
| Manufacturers | p. 247 |
| Semiconductors and masks | p. 247 |
| Cards | p. 248 |
| System designers and managers | p. 249 |
| Scheme operators | p. 250 |
| Beyond smart cards | p. 250 |
| Conclusions | p. 251 |
| Standards | p. 253 |
| Glossary | p. 259 |
| Bibliography | p. 265 |
| Smart card security references | p. 265 |
| About the Author | p. 269 |
| Index | p. 271 |
| Table of Contents provided by Syndetics. All Rights Reserved. |