How can the SMART card help in new channels?

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Internet payment systems
Security of JavaCard smart card applets Erik Poll University of Nijmegen
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Cryptographic Security Presented by: Josh Baker October 9 th, CS5204 – Operating Systems.
Digital Signatures Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Digital.
Gemplus and OSGI Benjamin Maury Gemplus Introduction  World Leader for Smart Card Solutions  Smart Solutions in Telecommunications  Beyond.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Muhammad Wasim Raad1 What is RFID? RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify,
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Muhammad Wasim Raad1 Smart Cards Operating Systems أنظمة التشغيل للبطاقات الذكية By: Dr Muhammad Wasim Raad Computer Engineering Department.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Secure Electronic Transaction (SET)
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Csci5233 computer security & integrity 1 Cryptography: an overview.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Using Public Key Cryptography Key management and public key infrastructures.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Key management issues in PGP
e-Health Platform End 2 End encryption
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
PKI (Public Key Infrastructure)
Electronic Payment Security Technologies
Presentation transcript:

How can the SMART card help in new channels? To Managing Finances Securely and Conveniently Entertainment on Demand To store personal data for covenience on-line Earning and redeeming rewards with Virtual Merchants To Secure Virtual World Shopping with Credit (Chip SecureCode) or e-Cash Virtual Health, Govt or other Services

KILLER Applications

MULTOS The only OS obtaining ITSEC(E6) Very secure Multi-application support Requires Coprocessor for RSA makes it expensive

MULTOS: The OPEN STANDARD smart card operating system MULTOS defines a standard CHIP HARDWARE INDEPENDENT Smart Card Operating System: Portable: Develop applications ONCE and run on ANY MULTOS chip. Open: Develop in C or Java and Compile. API FREELY available. MEL Editor C Compiler Java Compiler / Translator EMV EMV Highest Hardware and OS Security Assurance: ITSEC E6 High evaluated MULTOS SCHEME facilitates management of multiple applications Advanced Asymmetric Cryptographic mechanism PKI Application A PKI Application A E2PROM E2PROM MULTOS API MULTOS API MULTOS VM MULTOS VM ROM ROM Infineon Silicon Renesas Silicon

Proprietary Smart Card Operating Systems Proprietary Chip OS developed in “native” code - specific to underlying silicon - to access chip functions. OS often dedicated to performing a single specific function – e.g. EMV Data Data Data Data E2 E2 Native EMV Code Native Loyalty Code Native EMV Code Native EMV Code Native Loyalty Code ROM ROM Proprietary OS A Proprietary OS B OS code is fixed in the ROM of the chip, and cannot be changed after the chip is made. Chip Hardware A Chip Hardware B Limited number of programmers able to make adaptations to proprietary OS – impact on time to market if changes / new functions required. In order to multi-source silicon, native code must be redeveloped from scratch for new chip. Chip Hardware A Chip Hardware B

ALC( Application Load Certificate) Third party not able load applications without prior permission card issuer The ALC is the digital certificate accompanying software to be loaded Generated by Trusted third party called: Multos Key Management Authority: KMA Card will only load or delete application if ALC is valid

The KMA generates the keys that guarantee confidentiality of the application loading process It securely produces MULTOS card Unique issuer ID It securely generates unique public/private key pair

What Is a Digital Signature ? Used To Establish Authenticity of Electronically Transmitted messages Only one Smart Card Can Sign a Document Every One Can Verify The Signature RSA algorithm is usually used to form a cryptographic checksum which is appended to the message

Digital Signature