Upload
sherman-turner
View
225
Download
1
Tags:
Embed Size (px)
Citation preview
Muhammad Wasim Raad 1
Smart Cards Operating Systems
By: Dr Muhammad Wasim Raad
Computer Engineering Department
Muhammad Wasim Raad 2
Smart Chip - 2001+
Co-Processor& 3-DES Engine
16/32-bit RISCProcessor
Contact:ISO 7816
and USB
ROM (96 KB)
EEPROM(64+ KB)FLASH(64 KB)
Power(1.8 Volt)
Ground
Clock
Reset
ISO7816 I/O
RAM (4 KB)
MMU
USB I/O DPA & SPAResistant Logic
Contactless: ISO 14443
Muhammad Wasim Raad 3
What is a COS?
Muhammad Wasim Raad 4
Card OS Role
Muhammad Wasim Raad 5
Command Processing
Muhammad Wasim Raad 6
Command Processing(Cont)
Muhammad Wasim Raad 7
Transmission Protocol
Muhammad Wasim Raad 8
File Architecture
Muhammad Wasim Raad 9
File Architecture(Cont)
Muhammad Wasim Raad 10
Command Sets
Muhammad Wasim Raad 11
Protocol Application LayerAPDU Format
Muhammad Wasim Raad 12
Access Conditions
Muhammad Wasim Raad 13
Access Conditions(Cont)
Muhammad Wasim Raad 14
Access Conditions Examples
Muhammad Wasim Raad 15
Access Conditions Examples
Muhammad Wasim Raad 16
Smart Card Operating Systems
• Smart card operating systems (SCOS) have little resemblance to desktop OS.
• SCOS supports a collection of instructions on which user applications can be built.
• ISO 7816-4 standardizes a wide range of instructions in the format of APDUs.
• Most SMOS supports File Systems
Muhammad Wasim Raad 17
• 1990: very few true SM operating systems
• STARCOS: first developed by Giesecke & Devrient
• COS: Card operating system accepted worldwide
• ROM OS only in large no of cards
Muhammad Wasim Raad 18
OS Based Classification• Smart Card Operating Systems (SCOS) are
placed on the ROM and usually occupy lesser than 16 KB.
• SCOS handle:– File Handling and Manipulation.– Memory Management.– Data Transmission Protocols.
• Various SCOS available are:
JavaCardOscarStarCOS
MFCMultOSCyberflex
Muhammad Wasim Raad 19
Operating Systems•Consortium-based
– Java Card (Sun)– Multos
•Proprietary– Card Manufacturers– Microsoft
•Windows for Smart Cards(WfSC)
Muhammad Wasim Raad 20
OS protection• PINS & KEYS in EF are not
accessible except through OS• Downloadable codes need
authentication• Access conditions determine
what files to be executed
Muhammad Wasim Raad 21
Fundamentals• Smart Card OS do not include
user interfaces or accessability to external memory
• Security during program execution and protection of data accesses have highest priority
Muhammad Wasim Raad 22
• Very low amount of program code: 3-30KB
• ROM masks for OS need 10-12 weeks for correcting errors
• The secure state of EEPROM has noticeable influence on design of OS
Muhammad Wasim Raad 23
• For example all retry counters must be designed such that their maximum value corresponds to the erased state of the EEPROM
• If this is not the case, it would be possible to reset counter to its initial value by intentionally removing the card during transaction
Muhammad Wasim Raad 24
• This type of attack can be resisted by proper coding of the counter or by making the process of writing the retry counter an atomic process
• Trap doors must be avoided• Cryptographic functions must execute
in very short time
Muhammad Wasim Raad 25
• OS can be loaded into EEPROM, but due to expensive EEPROM most OS is in ROM
• Almost all OS allow program code for additional commands or special cryptographic algorithms to be loaded into EEPROM during completion
Muhammad Wasim Raad 26
• OS must be able to automatically recognize the size of the EEPROM
• Technical implementation involves OS routine reading the manufacturer’s finishing data
• Current Smart Card OS is not able to adapt itself to varyations in size of ROM or RAM
Muhammad Wasim Raad 27
Primary tasks of Smart card OS
• Transferring data to and from a smart card
• Controlling execution of commands
• Managing files• Managing and executing
cryptographic algorithms
Muhammad Wasim Raad 28Source: Z. Chen, “Java Card Technology for Smart Cards”
Smart Card Communication Model
* The card sends out an ATR (Answer to Reset) immediately after insertion.** APDU stands for Application Protocol Data Unit (ISO 7816-4).
Muhammad Wasim Raad 29
Smart Card File System (ISO 7816-4)
MF
DF
EF EF
DF
EF EF
EF EF
DF
MF Master File (root directory, must always be present)
DF Dedicated File (directory file, can contain directory and data files)
EF Elementary File (data file)
Muhammad Wasim Raad 30
Smart Card File Names (ISO 7816-4)
Reserved FIDs3F00 MF root directory
0000 EF PIN and PUK #10100 EF PIN and PUK #2
0001 EF application keys0011 EF management keys
0002 EF manufacturing info0003 EF card ID info0004 EF card holder info0005 EF chip info
3FFF file path selection
FFFF reserved for future use
MF
FID File Identifier (2 bytes)
FID File Identifier (2 bytes)
DF
DF Name (1-16 Bytes)usually ISO 7816-5 AID
EF Short-FID (5bits) FID File Identifier (2 bytes)
Muhammad Wasim Raad 31
EEPROM pages
100'000 write cycles
64 byte page size
Smart Card Internal File Structure
EF
Header
Body
–Header: file structure info, access control rights, pointer to data body content changes never or seldom, protected from erasure
–Body: data, content might change often, many write operations
pointer
Muhammad Wasim Raad 32
Muhammad Wasim Raad 33
MULTOS• A high security architecture
– Apps needing high security can reside next to apps needing low security
• Co-residence of multiple, inter-operable, platform independent applications
• Dynamic remote loading and deletion of applications over the lifetime of a card– Achieved using the language MEL (MULTOS
Executable Language)
Muhammad Wasim Raad 34
PC/SC• Architecture designed to ensure the
following work together even if made by different manufacturers:– smart cards– smart card readers– computers
• Differs from OpenCard because it offers API interoperability rather than uniform API
• Designed for Windows environment with development in Visual C++
Muhammad Wasim Raad 35
Java card • The Java Card specifications enable Java technology to run on
smart cards and other devices
• Multi-Application Capable - Java Card technology enables multiple applications to co-exist securely on a single smart card
• Dynamic: - New applications can be installed securely
• Secure: - relies on the inherent security of the Java programming language to provide a secure execution environment. - platform's proven industry deployments and security evaluations ensure that card issuers benefit from the most capable and secure technology available today.
Muhammad Wasim Raad 36
Muhammad Wasim Raad 37
Muhammad Wasim Raad 38
How can the SMART card help in new channels?
Earning and redeeming
rewards with Virtual
Merchants
To store personal data
for covenience
on-line
To Secure Virtual World Shopping with Credit (Chip
SecureCode) or e-Cash
To Managing Finances Securely and Conveniently
Virtual Health, Govt or other
Services
Entertainment on Demand
Muhammad Wasim Raad 39
Proprietary Smart Card Operating Systems
Chip Hardware BChip Hardware BChip Hardware AChip Hardware A
Proprietary OS AProprietary OS B
Native EMV Code
Native LoyaltyCode
Data Data
RO
ME
2
Native EMV Code
Native EMVCode
Native LoyaltyCode
Data Data
RO
ME
2
Proprietary Chip OS developed in “native” code - specific to underlying silicon - to access chip functions. OS often dedicated to performing a single specific function – e.g. EMV OS code is fixed in the ROM of the chip, and cannot be changed after the chip is made.
Limited number of programmers able to make adaptations to proprietary OS – impact on time to market if changes / new functions required. In order to multi-source silicon, native code must be redeveloped from scratch for new chip.
Chip Hardware BChip Hardware BChip Hardware AChip Hardware A
Muhammad Wasim Raad 40
KILLER Applications
Muhammad Wasim Raad 41
Open Platform (Card Manager & Security Domain) APIOpen Platform (Card Manager & Security Domain) API
Windowsfor
Smart Cardby
Microsoftand
GlobalPlatform
Java Cardby
Sun Microand
GlobalPlatform
Multos
Credit/DebitCredit/DebitWIMWIMSIMSIM
Logical &Logical &Physical Physical AccessAccess
LoyaltyLoyaltyE-PurseE-Purse
oror oror
Operating System Options
MULTOSby
MondexInternational
andMAOSCOCouncil
Muhammad Wasim Raad 42
Muhammad Wasim Raad 43
Muhammad Wasim Raad 44
Muhammad Wasim Raad 45
Muhammad Wasim Raad 46
Proximity Solutions for MULTOS
2 types of MULTOS “Dual-Interface” cards – supporting communication with the chip via both the contact plate and the contactless interface based on Proximity Standard - ISO 14443
Hitachi/DNP Contactless MULTOS: 36K EEPROM, Type B contactless interface, Available now
Supports both versions of Paypass transaction (contactless M/Chip 4, or Contactless Track 2 data) and in fact can execute ANY existing MULTOS application over the contactless interface.
Keycorp / Philips Contactless MULTOS, 16K EEPROM, MIFARE Type A contactless interface, Prototypes available now
Supports Mifare ticketing only. Full contactless MULTOS application execution planned for Q3 2004
250K issued for 250K issued for Japan Residential Japan Residential
ID cardID card
Muhammad Wasim Raad 47
Smart Card Corporate ID& E-Purse Multi-application system
Muhammad Wasim Raad 48
Smart toolz File creation utility
Muhammad Wasim Raad 49
What is RFID?• RFID is an ADC technology that uses
radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track...
• RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item
Muhammad Wasim Raad 50
What is RFIDWhat is RFID
Radio Frequency Radio Frequency IdentificationIdentification
Radio Frequency Radio Frequency IdentificationIdentification
LabelLabel
(Transponder)(Transponder)
Reader/AntennaReader/Antenna
(Interrogator)(Interrogator)
ComputerComputer
Tag enters RF field
RF signal powers tag
Tag transmits ID, plus data
Reader captures data
Reader sends data to computer
Computer determines action
Computer instructs reader
Reader transmits data to tag
Muhammad Wasim Raad
• RFID Diagram:
Note: The host is the software database...
Reader
RF Module
Antenna
Host ComputerHost Computer
RFID Primer
Muhammad Wasim Raad
Note: The RF module creates radio frequency (RF). It receives and transmits RF through the antenna…
Reader
RF Module
AntennaAntenna
Host ComputerHost Computer
RFID Primer
Muhammad Wasim Raad
Note: The RF module creates radio frequency (RF). It receives and transmits RF through the antenna…
Reader
RF Module
AntennaAntenna
Host ComputerHost Computer
RFID Primer
Muhammad Wasim Raad
Note: Tag (transponder) is interrogated by the antenna....
ReaderReader
RF ModuleRF ModuleTagTag
AntennaAntenna
Host ComputerHost Computer
RFID Primer
Muhammad Wasim Raad
Note: The antenna captures the tag ID number…first as analog RF waves, then it is converted to digital information.
(Tag ID Communication)
Reader
RF ModuleTag
Antenna
Host ComputerHost Computer
RFID Primer
Muhammad Wasim Raad 56
An RFID Tag Is A Portable Database
…A sophisticated computing and communications device…A wireless extension of Information Systems
Interrogation UnitTx/RxMicro
Computer
Computer Network
Antenna Tag
Radio Tx/Rx
RAM ROM
CPU I/O
Pwr Supply
Radio Tx/Rx
RAM ROM
CPU I/O
Pwr Supply
Muhammad Wasim Raad 57
What is RFID? -- The Tags
• Tags can be read-only or read-write• Tag memory can be factory or field
programmed, partitionable, and optionally permanently locked
• Bytes left unlocked can be rewritten over more than 100,000 times
Muhammad Wasim Raad 58
• Tags can be attached to almost anything:– pallets or cases of product– vehicles– company assets or personnel– items such as apparel,
luggage, laundry– people, livestock, or pets– high value electronics such
as computers, TVs, camcorders
What is RFID? -- The Tags
Muhammad Wasim Raad 59
Are All Tags The Same?
Basic Types:Active
•Tag transmits radio signal•Battery powered memory, radio & circuitry
•High Read Range (300 feet)Passive
•Tag reflects radio signal from reader•Reader powered•Shorter Read Range (4 inches - 15 feet)
Muhammad Wasim Raad 60
• Variations:– Memory
• Size (16 bits - 512KBytes +)• Read-Only, Read/Write or WORM• Type: EEProm, Antifuse, FeRam
– Arbitration (Anti-collision)• Ability to read/write one or
many tags at a time– Frequency
• 125KHz - 5.8 GHz– Physical Dimensions
• Thumbnail to Brick sizes – Price ($0.50 to $250)
Are All Tags The Same?
Muhammad Wasim Raad 61
Types of Tags - Memory Segmentation
Read Only (Factory Programmed)
WORM - Write Once, Read Many times
Reprogrammable (Field Programmable)
Read/Write (In-Use Programmable)
Muhammad Wasim Raad 62
What is RFID? -- The Readers
• Readers (interrogators) can be at a fixed point such as– Entrance/exit– Point of sale– Warehouse
• Readers can also be mobile -- tethered, hand-held, or wireless
Muhammad Wasim Raad 63
Advantages• Uses normal CMOS processing
—basic and ubiquitous
• Relative freedom from regulatory limitations
• Well suited for applications requiring reading small amounts of data at slow speeds and minimal distances
• Penetrates materials well (water, tissue, wood, aluminum)
<150 kHz (125 kHz & 134 kHz )
Muhammad Wasim Raad 64
Disadvantages:• Does not penetrate or transmit around metals
(iron, steel)• Handles only small amounts of data• Slow read speeds• Large Antennas -- compared to higher
frequencies• Minimal Range
<150 kHz (125 kHz & 134 kHz )
Muhammad Wasim Raad 65
Disadvantages:• Tag construction:
is thicker (than 13.56 MHz) is more expensive (than 13.56 MHz)more complex
(requires more turns of the induction coil)
<150 kHz (125 kHz & 134 kHz )
Muhammad Wasim Raad 66
RFID Primer…RFID Primer…FrequenciesFrequencies
Inductive Magnetic Field Coupling: 13.56 MHz (Popular Smart Card Frequency) 1 MHz 10 MHz
Mid. Freq.EAS
AM CB
RFID:Smart Cards
Muhammad Wasim Raad 67
13.56 MHz13.56 MHz Advantages• Uses normal CMOS processing--basic and
ubiquitous • Well suited for applications requiring
reading small amounts of data and minimal distances
• Penetrates water/tissue well • Simpler antenna design (fewer turns of
the coil); lower costs to build• Higher data rate (than 125 kHz--but
slower than higher MHz systems) • Thinner tag construction (than 125 kHz)
Muhammad Wasim Raad 68
Disadvantages• Government regulated frequency
(U.S. versus Europe)• Does not penetrate or transmit around
metals (unless very thick)
• Large Antennas (compared to higher frequencies)
• Larger tag size than higher frequencies• Tag construction: requires more than one
surface to complete a circuit• Minimal Range
13.56 MHz13.56 MHz
Muhammad Wasim Raad 69
Bar Codes vs. RFIDBar Codes vs. RFIDSystem Barcode RFID Data Transmission Optical Electromagnetic
Typical Data Volume 1-100 Bytes 128-8K Bytes
Data Modification Not possible Possible
Position of Data Carrier for Read Write
Visual contact Non line of sight possible
Reading Distance Several Meters (line of sight)
From centimeters to meters (depending on the frequency and tags)
Access Security Little High
Environmental Susceptibility
Dirt Very Small
Anticollision Not possible Possible
Muhammad Wasim Raad 70
RFID Applications• Petrol Service Stations
– In Singapore, the Mobil petrol service stations has already introduced RFID technology to implement their Speed Pass system to enable drivers to fill up the petrol and drive away. All information will be gathered automatically through RFID smart tags and customers’ bills can be settled through GIRO.
Muhammad Wasim Raad 71
RFID Application in Petrol Service Station
Muhammad Wasim Raad 72
RFID Application in a Factory Canteen
• In the video, it is very interesting to notice that in the factory canteen’s environment, RFID tags are attached at the bottom of the plates to identify the cooked food and its price.
• The staff of the factory need only to pick up the food on the tray and place the tray on top of a RFID reader.
• The RFID reader will identify the products and its price. The staff need only to place the cash card to pay for the food.