smart cards and standards - secure technology alliancejun 04, 2002  · smart card and...

49
Smart Cards and Standards: What Makes Them Secure Presented by Gilles Lisimaque, Sr VP and Co-Founder Co-Chair - Smart Card Alliance Educational Institute June 4, 2002

Upload: others

Post on 02-Apr-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

Smart Cards and Standards:What Makes Them Secure

Presented by Gilles Lisimaque, Sr VP and Co-Founder

Co-Chair - Smart Card Alliance Educational InstituteJune 4, 2002

Page 2: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

2Smart Card and StandardsSmart Card and Standards

AgendaAgenda

• Primary standards & specifications:– ISO 7816, PCSC, X509– Open Card platforms (Javacard & Multos)

• Security standards and their challenges– FIPS 140, Common Criteria

• Specifications for interoperability– Global Platform– GSA specification

• Industry Specifications– GSM (presented in another EI201 Session)– EMV

• References for use with RFPs

• Primary standards & specifications:– ISO 7816, PCSC, X509– Open Card platforms (Javacard & Multos)

• Security standards and their challenges– FIPS 140, Common Criteria

• Specifications for interoperability– Global Platform– GSA specification

• Industry Specifications– GSM (presented in another EI201 Session)– EMV

• References for use with RFPs

Page 3: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

3Smart Card and StandardsSmart Card and Standards

Where do these standards applyWhere do these standards applyISO 7816 -Interface between the card & the terminalPC/SC -Common driver interface for all smart card readers

connected under WindowsX509 -Digital Signature format & associated certificatesOpen OS -In the smart card only, allows a common application

development platform for in-card applications FIPS 140 -Tamper resistance of a cryptographic deviceCommon Criteria -Threat evaluations and secure application protectionsGSA specification -Common way to find data files in cards & common

application structures for US Government applicationsGlobal Platform -Card application management and issuance in the card

as well as in the back-endEMV -Hardware specifications for smart cards and terminals

-Multi application selection for smart cards-Credit & Debit: commands and related transaction flow

Page 4: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

4Smart Card and StandardsSmart Card and Standards

ISO 7816 – The Card Tool BoxISO 7816 – The Card Tool Box

• Consists of 12 parts, all full of options allowing nearly all cards to claim they are in compliance

• Designed to be used as building material by each industry (or even a given application) to select what one wants for its cards and terminals

• ISO 7816 does not promote or even suggests any kind of interoperability

• Consists of 12 parts, all full of options allowing nearly all cards to claim they are in compliance

• Designed to be used as building material by each industry (or even a given application) to select what one wants for its cards and terminals

• ISO 7816 does not promote or even suggests any kind of interoperability

ISO 7816

Page 5: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

5Smart Card and StandardsSmart Card and Standards

ISO 7816 – The philosophyISO 7816 – The philosophy

• “Defines the card as seen at the interface”• Does not define what is inside the card but only

the “logical view” of the commands and data structures when they cross the card interface

• Does not define or propose any card application functions and does not link commands in coherent procedures

• “Defines the card as seen at the interface”• Does not define what is inside the card but only

the “logical view” of the commands and data structures when they cross the card interface

• Does not define or propose any card application functions and does not link commands in coherent procedures

ISO 7816

To beOr

Not to be

Page 6: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

6Smart Card and StandardsSmart Card and Standards

ISO 7816 – What to reference (1/2)ISO 7816 – What to reference (1/2)

• Parts 1 & 2: The card physical form factor and the location of the contacts is to be observed

• Part 3: The answer to reset and the transmission protocol is to be chosen from a list of options

• Part 4, 8 & 9: A standard command format is available, some basic commands can be chosen (e.g. Select) but the data structure is to be defined by each application (Files and/or data elements and/or data objects or even relational data base SQL like).It is up to each application (or industry) to pick up its own subset from all the available options.

• Parts 1 & 2: The card physical form factor and the location of the contacts is to be observed

• Part 3: The answer to reset and the transmission protocol is to be chosen from a list of options

• Part 4, 8 & 9: A standard command format is available, some basic commands can be chosen (e.g. Select) but the data structure is to be defined by each application (Files and/or data elements and/or data objects or even relational data base SQL like).It is up to each application (or industry) to pick up its own subset from all the available options.

ISO 7816

Page 7: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

7Smart Card and StandardsSmart Card and Standards

ISO 7816 – What to reference (2/2)ISO 7816 – What to reference (2/2)

• Part 5: Application names in the card should comply with the international naming registration to avoid collisions. Backward compatible with Credit/Debit cards

• Part 6: If the application uses data elements their tag structure and values should comply with this part

• Part 7 is for Relational data bases in cards (SQL)• Part 10 is for non microprocessor cards (memory)• Part 11 will define card biometric commands• Part 15 will define PKCS#15 cryptographic

data structures & commands

• Part 5: Application names in the card should comply with the international naming registration to avoid collisions. Backward compatible with Credit/Debit cards

• Part 6: If the application uses data elements their tag structure and values should comply with this part

• Part 7 is for Relational data bases in cards (SQL)• Part 10 is for non microprocessor cards (memory)• Part 11 will define card biometric commands• Part 15 will define PKCS#15 cryptographic

data structures & commands

ISO 7816

Page 8: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

8Smart Card and StandardsSmart Card and Standards

Personal Computersand Smart CardsPersonal Computersand Smart Cards

• PC/SC allows applications to be independent of the smart card reader (Windows drivers structure for hardware)

• Microsoft Crypto API allows applications to use crypto services of various crypto devices

• Do not address (yet) a standard mechanism to launch an application when a given smart card is inserted in reader PC

• PC/SC allows applications to be independent of the smart card reader (Windows drivers structure for hardware)

• Microsoft Crypto API allows applications to use crypto services of various crypto devices

• Do not address (yet) a standard mechanism to launch an application when a given smart card is inserted in reader PC

PC/SC

Page 9: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

9Smart Card and StandardsSmart Card and Standards

PC/SC Architecture

User ApplicationsUser Applications

System ServicesSystem Services

DLLsDLLs

Har

dwar

eH

ardw

are

DriversDriversSmart Card Reader Driver LibrarySmart Card Reader Driver Library

DriverDriver DriverDriver DriverDriver

Smart Card Aware AppsSmart Card Aware Apps

SCSPSCSP

Resource ManagerResource Manager

CommonCommonDialogDialog

CryptoAPICryptoAPI

SCCPSCCP

Softw

are

Softw

are

ReaderCard

“Interface”PC/SC

Page 10: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

10Smart Card and StandardsSmart Card and Standards

Component relationshipComponent relationship

Smart Card Base Components

Service Providers

Smart Card

Each cardrequires at leastone service provider

Driver

Reader

Each reader requires a device driver

Part of Windows

“Interface”

PC/SC

Page 11: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

11Smart Card and StandardsSmart Card and Standards

Smart Card Crypto ProviderSmart Card Crypto Provider! Application calls Smart Card Base Provider using CryptoAPI

" Smart Card Base Provider verifies signature of SCCP before loading it

# SCCP calls the Resource Managerto establish a connection to a cardand reader

Base Smart Card CSP

Smart Card Aware Application

CryptoAPI

SCCP

Smart Card Resource ManagerPC/SC

Page 12: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

12Smart Card and StandardsSmart Card and Standards

Digital Certificates – X509 standardDigital Certificates – X509 standard• Electronically certifies a digital information

(equivalent to a public notary signature)• Signed by a trusted authority (CA)• Digitally binds the owner of the public key

• Electronically certifies a digital information (equivalent to a public notary signature)

• Signed by a trusted authority (CA)• Digitally binds the owner of the public key

The following Public Key5E F8 87 32 AF 7E C9 7A 76 1E 49

belongs to John Doe at [email protected]: Real Trust Certification Authority

Valid until January 1st,2003

X509

Seal

Page 13: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

13Smart Card and StandardsSmart Card and Standards

What are certificates for ?What are certificates for ?• They bind a “user” or an “information” to a key pair (public-

private)• Helps to:

– prevent spoofing– distribute public keys– establish trust

• Are used as electronic identifications for– people– Devices– Data elements

• Provide means to verify in an off-line environment the authenticity of a piece of data (similar to a public notary certificate for papers)– Biometric template reference– Identification number

• They bind a “user” or an “information” to a key pair (public-private)

• Helps to:– prevent spoofing– distribute public keys– establish trust

• Are used as electronic identifications for– people– Devices– Data elements

• Provide means to verify in an off-line environment the authenticity of a piece of data (similar to a public notary certificate for papers)– Biometric template reference– Identification number

X509

Page 14: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

14Smart Card and StandardsSmart Card and Standards

CA the CApstone …... Of PKICA the CApstone …... Of PKICA

DigitalCertificatesPublic KeyTechnology

Digital SignaturePublic Key Private Key

ProtocolsIPSEC SET SSL x509 S/MIME

ApplicationsBrowsers E-Mail

Customers and Market

X509

Page 15: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

15Smart Card and StandardsSmart Card and Standards

Card Issuing Entity

Card Issuing Entity

PKI based card issuancePKI based card issuance

End UserData

Information

Card IssuanceManagement

Processes

CertificationAuthority

Low-VolumeCard/Chip

PersonalizationSystem

RegistrationAuthority

CardManufacturing& Initialization

End User’sSmart Card

Chip Vendor

High-VolumeCard/Chip

PersonalizationSystem

UserInfo.

Smart CardCert/Key Included Masked

ChipsCardOrder

Perso.Requir.

InitializedSmart Cards

Smart CardCert/KeyIncludedIssues

Key GenerationRoot KeyLocal/Remote IssuanceCard Issuance Logistics

X509

Page 16: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

16Smart Card and StandardsSmart Card and Standards

JavaCard & Multos – Open OSJavaCard & Multos – Open OS

• The proprietary smart card Operating Systems of the nineties are being replaced by open specifications using Virtual Machines such as JavaCard and Multos.

• It allows card and application Issuers to be more independent of the card manufacturers (Open offer)

• It allows application developers to hit the market faster by deploying software only and not the cards

• When used in conjunction with a secure card application management it allows true multi issuers

• The use of an interpreter in the card allows a secure firewall between applets coming from different sources

• The proprietary smart card Operating Systems of the nineties are being replaced by open specifications using Virtual Machines such as JavaCard and Multos.

• It allows card and application Issuers to be more independent of the card manufacturers (Open offer)

• It allows application developers to hit the market faster by deploying software only and not the cards

• When used in conjunction with a secure card application management it allows true multi issuers

• The use of an interpreter in the card allows a secure firewall between applets coming from different sources

Open Card OS

Page 17: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

17Smart Card and StandardsSmart Card and Standards

JavaCard Architecture -On-Card components

Native Functions &System Resources

Card application

management

Virtual Machine

APIs

WG10WG10Applet

xyz

GSM

Hardware

Java Language

Assemblercode

Matches the application in the terminal

(and the network)

In card API

Card/Reader interface

Open Card OS

Page 18: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

18Smart Card and StandardsSmart Card and Standards

AppletManagement

MULTOS Architecture -On-Card components

MULTOS Architecture -On-Card components

ICC Processor Facilities

Security Manager Virtual Machine

EMVMCEMVMC

MONDEX GSM

Processor

Assemblercode

Card/Reader interface

In card API

Matches the application in the terminal

(and the network)

Open Card OS

MEL LanguageJAVA Translator

Page 19: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

19Smart Card and StandardsSmart Card and Standards

Comparison JavaCard & MultosComparison JavaCard & Multos

• JavaCard: a standard, flexible tool box

• A known language and an easy tool for applet developers in cards

• Requires the addition of Global Platform (or similar) to manage the card and its applets

• JavaCard: a standard, flexible tool box

• A known language and an easy tool for applet developers in cards

• Requires the addition of Global Platform (or similar) to manage the card and its applets

• MULTOS: a turn key system

• Comes as a complete package for cards issuers, with its certification authority, language, tools and personalization process

• Global platform is possible

• MULTOS: a turn key system

• Comes as a complete package for cards issuers, with its certification authority, language, tools and personalization process

• Global platform is possible

Open Card OS

Page 20: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

20Smart Card and StandardsSmart Card and Standards

Split VM Architecture for developmentSplit VM Architecture for development

• The converter (off-card)– Class loading, linking and name resolution– Verification– Bytecode optimization and conversion

• The interpreter (on-card)– Bytecode execution and security enforcement

• The converter (off-card)– Class loading, linking and name resolution– Verification– Bytecode optimization and conversion

• The interpreter (on-card)– Bytecode execution and security enforcement

JCVM

Off card

Converter

On cardOn card

InterpreterInterpreter

CAD

.cap.class

PC

Card

Open Card OS

Page 21: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

21Smart Card and StandardsSmart Card and Standards

Requirements for IssuersRequirements for Issuers

• Java Card in itself is not sufficient– It defines interoperability at the developer level (API

in card but not at the interface)– It does not help the card issuer

to really manage the applications in the card• Issuers have specific requirements

– Interoperable application management– Clear definition of life cycles for open cards– Issuer application domains enforced on the card – Multiple application providers on a single card

• Java Card in itself is not sufficient– It defines interoperability at the developer level (API

in card but not at the interface)– It does not help the card issuer

to really manage the applications in the card• Issuers have specific requirements

– Interoperable application management– Clear definition of life cycles for open cards– Issuer application domains enforced on the card – Multiple application providers on a single card

Global Platform addresses these issuesOpen Card OS

Page 22: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

22Smart Card and StandardsSmart Card and Standards

FIPS 140FIPS 140

– Cryptographic modules– Module interfaces– Roles & Service– Finite state machines– Physical Security

– Cryptographic modules– Module interfaces– Roles & Service– Finite state machines– Physical Security

– Software Security – Cryptographic Key Management– Cryptographic algorithms– EMI/EMC– Self-tests

– Software Security – Cryptographic Key Management– Cryptographic algorithms– EMI/EMC– Self-tests

FIPS 140

$Specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system$Requirements

Page 23: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

23Smart Card and StandardsSmart Card and Standards

Four Incremental Security LevelsFour Incremental Security Levels

– “Formal models” and “proofs”– Strong physical security (intrusion detection, tamper

resistant coating, environmental fluctuations)

– Identity based Authentication– Enhanced physical security (critical security parameter

I/O, zero-ization of sensitive data on intrusion detection)

– Device authentication– Improved physical security (e.g. tamper evident

coating)

– No Physical Security Mechanism– Basic requirements for a cryptographic module (e.g.

the encryption algorithm must be approved by FIPS)

– “Formal models” and “proofs”– Strong physical security (intrusion detection, tamper

resistant coating, environmental fluctuations)

– Identity based Authentication– Enhanced physical security (critical security parameter

I/O, zero-ization of sensitive data on intrusion detection)

– Device authentication– Improved physical security (e.g. tamper evident

coating)

– No Physical Security Mechanism– Basic requirements for a cryptographic module (e.g.

the encryption algorithm must be approved by FIPS)

FIPS 140

Level 4

Level 3

Level 2

Level 1

Page 24: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

24Smart Card and StandardsSmart Card and Standards

FIPS 140 & Smart CardsFIPS 140 & Smart Cards

• Smart Cards are more than just a cryptographic device and they compare more to portable computers security for many applications

• FIPS 140 addresses ONLY cryptographic devices and it is not easy to isolate the cryptographic hardware & functions of a smart card.

• Smart Cards are more than just a cryptographic device and they compare more to portable computers security for many applications

• FIPS 140 addresses ONLY cryptographic devices and it is not easy to isolate the cryptographic hardware & functions of a smart card.

FIPS 140

Page 25: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

25Smart Card and StandardsSmart Card and Standards

Common Criteria Security StandardsCommon Criteria Security Standards• Common Criteria for Information Technology

Security Evaluation• ISO Standard 15408 (version 2.1)• Single (common) IT product/system security

criteria• Mutual recognition of product evaluations• Better availability of IT security-capable products

• Common Criteria for Information Technology Security Evaluation

• ISO Standard 15408 (version 2.1)• Single (common) IT product/system security

criteria• Mutual recognition of product evaluations• Better availability of IT security-capable products

Common Criteria

Page 26: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

26Smart Card and StandardsSmart Card and Standards

Common Criteria ModelCommon Criteria Model

• Not a “to do” list as FIPS 140 but uses a threat/vulnerabilities/countermeasure model– Requires more work from the application

• An industry establishes a list of threats• The application addresses its vulnerabilities• The product shows its countermeasures

• The product shoots for a “Security Target” in the “Protection Profile” of its application field.

• Not a “to do” list as FIPS 140 but uses a threat/vulnerabilities/countermeasure model– Requires more work from the application

• An industryindustry establishes a list of threatsthreats• The applicationapplication addresses its vulnerabilitiesvulnerabilities• The productproduct shows its countermeasurescountermeasures

• The product shoots for a “Security Target” in the “Protection Profile” of its application field.

Common Criteria

Page 27: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

27Smart Card and StandardsSmart Card and Standards

Common Criteria Security StandardsCommon Criteria Security Standards

• Description of requirements– Protection profile and security target– Catalog of security functional requirements

• Evaluation of security features– Catalog of assurance requirements– Seven Evaluation Assurance Levels (EAL)

• EAL1 to EAL7 increasing security• EAL 5 and over is not “cross border” equivalent• Closely related to TCSEC Orange Book

• Description of requirements– Protection profile and security target– Catalog of security functional requirements

• Evaluation of security features– Catalog of assurance requirements– Seven Evaluation Assurance Levels (EAL)

• EAL1 to EAL7 increasing security• EAL 5 and over is not “cross border” equivalent• Closely related to TCSEC Orange Book

Common Criteria

Page 28: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

28Smart Card and StandardsSmart Card and Standards

Protection Profiles for Smart CardsProtection Profiles for Smart Cards

• SCSUG Smart Card Protection Profile V3.0 (US)– Work from the 6 major payment associations– Addresses 23 threats most of which are oriented towards the

card issuer & the end-user• European Protection Profiles for Smart Cards:

(a Russian doll approach)– PP/9806 - Smartcard Integrated Circuit Protection Profile v2.0– PP/9810 - Smartcard Embedded Software Protection Profile v1.2– CPP/9911 - Smart Card Integrated Circuit with Embedded Software v2.0

• Information at: http://csrc.nist.gov/cc/

• SCSUG Smart Card Protection Profile V3.0 (US)– Work from the 6 major payment associations– Addresses 23 threats most of which are oriented towards the

card issuer & the end-user• European Protection Profiles for Smart Cards:

(a Russian doll approach)– PP/9806 - Smartcard Integrated Circuit Protection Profile v2.0– PP/9810 - Smartcard Embedded Software Protection Profile v1.2– CPP/9911 - Smart Card Integrated Circuit with Embedded Software v2.0

• Information at: http://csrc.nist.gov/cc/

Common Criteria

Page 29: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

29Smart Card and StandardsSmart Card and Standards

What does the SCUG PP address? What does the SCUG PP address?

• Defines the smart card life cycle phases• Identifies the phases associated with the IC

manufacturers and with other authorities in the life cycle

• Identifies the needs of the phases• Identifies the Security Administrators and Users

for each phase in the life cycle

• Defines the smart card life cycle phases• Identifies the phases associated with the IC

manufacturers and with other authorities in the life cycle

• Identifies the needs of the phases• Identifies the Security Administrators and Users

for each phase in the life cycle

Common Criteria

Page 30: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

30Smart Card and StandardsSmart Card and Standards

Smart Card Life CycleSmart Card Life Cycle

1. Embedded software development2. IC development3. IC manufacturing and testing4. IC Packaging and testing5. Smart card product finishing process6. Smart card initialization & personalization7. Smart card issuance and use

1. Embedded software development2. IC development3. IC manufacturing and testing4. IC Packaging and testing5. Smart card product finishing process6. Smart card initialization & personalization7. Smart card issuance and use

Common Criteria

Page 31: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

31Smart Card and StandardsSmart Card and Standards

Conclusion on Security StandardsConclusion on Security Standards

• FIPS 140 gives a generic level of security insurance for a given cryptographic product but with no guarantee the application will use it correctly and will globally be secure in any way.

• Common Criteria forces the application to work on its specific risk assessment and define the level of security required in all aspects of its system.

• FIPS 140 gives a generic level of security insurance for a given cryptographic product but with no guarantee the application will use it correctly and will globally be secure in any way.

• Common Criteria forces the application to work on its specific risk assessment and define the level of security required in all aspects of its system.

FIPS 140 &Common Criteria

Page 32: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

32Smart Card and StandardsSmart Card and Standards

GSA SpecificationSmart Card Interoperability SpecGSA SpecificationSmart Card Interoperability Spec

• Provides Solutions to Interoperability Issues– Client Applications and Smart Card Communication– Tight Coupling between Client Application and SC APDU Sets – Evolving “Card Edge” Interface and Card Data Structure– Works for Both File System and Virtual Machine Cards

• Defines Architectural Model for Interoperability– Basic Services Interface (BSI) for Client Applications– Virtual “Card Edge” Interface (VCEI) as Interoperability

Mechanism for incompatible existing cards– Common Data Model (CDM) Structure with Card Capability

Container (CCC) in SCIS Compliant Smart Card

• Provides Solutions to Interoperability Issues– Client Applications and Smart Card Communication– Tight Coupling between Client Application and SC APDU Sets – Evolving “Card Edge” Interface and Card Data Structure– Works for Both File System and Virtual Machine Cards

• Defines Architectural Model for Interoperability– Basic Services Interface (BSI) for Client Applications– Virtual “Card Edge” Interface (VCEI) as Interoperability

Mechanism for incompatible existing cards– Common Data Model (CDM) Structure with Card Capability

Container (CCC) in SCIS Compliant Smart Card

GSA Specification

Page 33: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

33Smart Card and StandardsSmart Card and Standards

GSA - SCIS ImplementationGSA - SCIS Implementation

• Implemented in the client (PC) by Smart Card Service Provider Modules (SCSPM)– Basic Services Interface (BSI)

• API for applications that call SCSPM– Virtual Card Edge Interface (VCEI)

• API for SCSPM to communicate with cards

• Implemented in the card by– Common Data Model (CDM)– Card Capabilities Container (CCC)

• Implemented in the client (PC) by Smart Card Service Provider Modules (SCSPM)– Basic Services Interface (BSI)

• API for applications that call SCSPM– Virtual Card Edge Interface (VCEI)

• API for SCSPM to communicate with cards

• Implemented in the card by– Common Data Model (CDM)– Card Capabilities Container (CCC)

GSA Specification

Page 34: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

34Smart Card and StandardsSmart Card and Standards

GSA – SCIS Card modelGSA – SCIS Card model

• Common Data Model (CDM) Structure– General Information coded using TLV objects– Includes a Card Capabilities Container (CCC)– Protected Personal and Card Information such as

Biometric and Digital Signature Certificates– Data structures for Login & Access control applications

• Card Capability Container (CCC)– Mechanism for translating APDU sets– Describes how a given card differs from Virtual Card

Edge Interface (VCEI)– Maps: card APDUs <-> Virtual APDUs – Grammar for translation rules (CCG)

• Common Data Model (CDM) Structure– General Information coded using TLV objects– Includes a Card Capabilities Container (CCC)– Protected Personal and Card Information such as

Biometric and Digital Signature Certificates– Data structures for Login & Access control applications

• Card Capability Container (CCC)– Mechanism for translating APDU sets– Describes how a given card differs from Virtual Card

Edge Interface (VCEI)– Maps: card APDUs <-> Virtual APDUs – Grammar for translation rules (CCG)

GSA Specification

Page 35: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

35Smart Card and StandardsSmart Card and Standards

Global PlatformGlobal Platform

• Global Platform specifications define a standard for Card Issuers to create multi-application chip card systems. It defines card components, command interfaces, transaction sequences, and interfaces, which can be common across many different industries.

• The Global Platform gives Card Issuers the power to manage and change the content of their cards while also offering the ultimate in flexibility by enabling them to share control of some of their card space with business partners. The ultimate controlalways rests with the Card Issuer, but through the Global Platform, the business partners of a Card Issuer can be allowed to manage their own applications on the Card Issuer’s cards as appropriate.

Extracted from Open Platform Card Specification 2.0.1 – April 2000

• Global Platform specifications define a standard for Card Issuers to create multi-application chip card systems. It defines card components, command interfaces, transaction sequences, and interfaces, which can be common across many different industries.

• The Global Platform gives Card Issuers the power to manage and change the content of their cards while also offering the ultimate in flexibility by enabling them to share control of some of their card space with business partners. The ultimate controlalways rests with the Card Issuer, but through the Global Platform, the business partners of a Card Issuer can be allowed to manage their own applications on the Card Issuer’s cards as appropriate.

Extracted from Open Platform Card Specification 2.0.1 – April 2000

Global Platform

Page 36: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

36Smart Card and StandardsSmart Card and Standards

Global Platform FeaturesGlobal Platform Features• Complete Card Life Cycle Management

– defines requirements and roles of every party involved with cards and applications

– separates application management• Defines Smart Card Management System

(SCMS) and its functions• Provides a Secure Install mechanism

– applet delivery controlled by the Card Issuer– applet delivery performed by an Applet

Provider: well adapted to Internet• Velocity Checking Security mechanism

– refines the security policies

• Complete Card Life Cycle Management– defines requirements and roles of every party

involved with cards and applications – separates application management

• Defines Smart Card Management System (SCMS) and its functions

• Provides a Secure Install mechanism– applet delivery controlled by the Card Issuer– applet delivery performed by an Applet

Provider: well adapted to Internet• Velocity Checking Security mechanism

– refines the security policies

Global Platform

Page 37: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

37Smart Card and StandardsSmart Card and Standards

Global PlatformCard Domain

Global PlatformCard Domain

Card Registry

Com

mand

Dispatch

Life Cycle

Managem

ent

Secure Install

Security M

anagement

• Provides card global services:

– management of applets (life cycle, install, etc)

– access and management of global card data (ICC Serial number, personalization information, etc)

– management of card life cycle (blocking, auditing, ..)

– management of the of a mapping between security domains and applets

• Provides card global services:

– management of applets (life cycle, install, etc)

– access and management of global card data (ICC Serial number, personalization information, etc)

– management of card life cycle (blocking, auditing, ..)

– management of the of a mapping between security domains and applets

Acts as the security domain manager.The card registry is controlled by the card issuer

Global Platform

Page 38: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

38Smart Card and StandardsSmart Card and Standards

Global Platform Application life cycleGlobal Platform Application life cycle

SELECTABLE

INSTALLED

PERSONALIZED

BLOCKEDLOGICALLYDELETED LOCKED

Global Platform

Page 39: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

39Smart Card and StandardsSmart Card and Standards

EMV – Europay Mastercard VisaEMV – Europay Mastercard Visa

• First publication in 1996• Current version: EMV 2000 version 4.0• Four volumes

– Physical and electrical characteristics of the card– Organization of applications within the card and the set

of commands – Transaction flow allowing a purchase process– Terminal Specification

• http://www.emvco.com

• First publication in 1996• Current version: EMV 2000 version 4.0• Four volumes

– Physical and electrical characteristics of the card– Organization of applications within the card and the set

of commands – Transaction flow allowing a purchase process– Terminal Specification

• http://www.emvco.com

EMV

Page 40: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

40Smart Card and StandardsSmart Card and Standards

EMV Specification

EMV Part1

ISO 7816-4 to 9

EMV Part 2

EMV Part 3/4

Physical CharacteristicsElectrical CharacteristicsCommunication Protocol

Command Set Transaction Process

EMV

ISO 7816 – 1/2/3

Page 41: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

41Smart Card and StandardsSmart Card and Standards

What is EMV for?What is EMV for?

• Allows to design world wide accepted Credit and Debit applications in smart cards

• Three layers of interoperability– Basic common layer between payment systems– Same payment system between card & terminal– Same financial institution for card & terminal

• Allows multiple application cards to be used in multi-application terminals (standard selection mechanism)

• Allows to design world wide accepted Credit and Debit applications in smart cards

• Three layers of interoperability– Basic common layer between payment systems– Same payment system between card & terminal– Same financial institution for card & terminal

• Allows multiple application cards to be used in multi-application terminals (standard selection mechanism)

EMV

Page 42: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

42Smart Card and StandardsSmart Card and Standards

Payment Association SpecificEuropay or MasterCard or Visa

Issuer Specific

EMV Core or Common Specifications

Card Operating System

EMV Compliant Terminal

EMV

Any Payment Association back

end system compliant with

EMV

EMVContext Risk ManagementEMVContext Risk Management

Same Payment Association than the Card issuer’s

Same Financial Institution than

the card’s Issuer

Page 43: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

43Smart Card and StandardsSmart Card and Standards

EMV Risk Management: • Unlike the magnetic stripe card, the smart card

takes decision to: - Accept, -Deny, or -Ask for an on-line authorization to the card Issuer bank.

• Decision taken according to– the "Risk Management" rules stored within the card at

personalization stage by the Issuer– The level of knowledge the card issuer and the merchant

financial institution have about each other (e.g. revocation lists)

• Parameter of decision can be:– Purchase amount– Cumulative amount– Number of consecutive off-line transactions– Random security check

EMV

Page 44: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

44Smart Card and StandardsSmart Card and Standards

Card Risk Management

Do you accept this 30$ Transaction

No, please ask my bank issuer( amount of 30$m is higher than the limit)

On-line issuer rules:Over 20$or every 3 times

Deny rules: Over 3000 $

Bank issuer

The risk management rules are defined by eachissuer and managed by the card.

Give me the signature

Digital Signature

1

2

3

4

5

Do you accept $30 TransactionYes, I accept it

6EMV Terminal

Card Risk Management ==> Decision

EMV

The card, and the terminal decide if it is worth the time and the

cost of going online

Page 45: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

45Smart Card and StandardsSmart Card and Standards

Conclusion:What about Interoperability ?Conclusion:What about Interoperability ?

• There are different aspects to interoperability• Solutions available

– Development in the cards have been simplified thanks to Java– Hardware terminal specifications are clarified with EMV– Multi application selection is possible for cards and applications

compatible with the EMV Selection mechanism– Multi application management with Global Platform

• Issues still pending– No standard way for a PC to find (or launch) an application on the

network by looking at the card inserted– No browser equivalent in smart cards. Card application element

(applet) tied tightly with the applications in the terminal as well as the back end systems

• There are different aspects to interoperability• Solutions available

– Development in the cards have been simplified thanks to Java– Hardware terminal specifications are clarified with EMV– Multi application selection is possible for cards and applications

compatible with the EMV Selection mechanism– Multi application management with Global Platform

• Issues still pending– No standard way for a PC to find (or launch) an application on the

network by looking at the card inserted– No browser equivalent in smart cards. Card application element

(applet) tied tightly with the applications in the terminal as well as the back end systems

Page 46: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

46Smart Card and StandardsSmart Card and Standards

SC Reader

Specifications & application layersSpecifications & application layersGSA - SCIS PC/SCGlobal Platform

Smart Card

ApplicationsSCSP CSP

ResourceManagerReaderDriver

CDM CCC

Card ManagerCard Configuration

PersonalizationApplet DownloadCard/Application

Maintenance

SC Reader

GPCard

Manager

GP A

PI RTE API

Run Time Env (RTE)

Applets

SC Reader

ApplicationsBSI XSI

SPSVirtual Card

Edge InterfaceReaderDriver

Page 47: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

47Smart Card and StandardsSmart Card and Standards

References to Standards and Specifications for RFPsReferences to Standards and Specifications for RFPs

• Primary standards & specifications:– ISO 7816 ANSI or ISO– PC/SC Microsoft– PKCS RSA Labs– X509 ANSI/NCITS

• Industry Specifications– GSM ETSI– EMV EMVCO

• Primary standards & specifications:– ISO 7816 ANSI or ISO– PC/SC Microsoft– PKCS RSA Labs– X509 ANSI/NCITS

• Industry Specifications– GSM ETSI– EMV EMVCO

Page 48: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

48Smart Card and StandardsSmart Card and Standards

References to Standards and Specifications for RFPsReferences to Standards and Specifications for RFPs

• Card Operating Systems– Proprietary Card vendors– JAVACard Javacard forum– MULTOS MASCO

• Specifications for interoperability– Global platform– GSA specification GSA/NIST

• Security standards – PKCS RSA Labs– FIPS 140 NIST– Common Criteria ISO/NIST

• Card Operating Systems– Proprietary Card vendors– JAVACard Javacard forum– MULTOS MASCO

• Specifications for interoperability– Global platform– GSA specification GSA/NIST

• Security standards – PKCS RSA Labs– FIPS 140 NIST– Common Criteria ISO/NIST

Page 49: Smart Cards and Standards - Secure Technology AllianceJun 04, 2002  · Smart Card and StandardsSmart Card and Standards 6 ISO 7816 – What to reference (1/2)ISO 7816 – What to

49Smart Card and StandardsSmart Card and Standards

Contact InformationContact Information

Jim F. “Jim” RussellDirectorMasterCard International

Http://[email protected]

Jim F. “Jim” RussellDirectorMasterCard International

Http://[email protected]

Gilles M. LisimaqueSenior Vice PresidentGemplus Corporation

Http://[email protected]

Gilles M. LisimaqueSenior Vice PresidentGemplus Corporation

Http://[email protected]