Academia.eduAcademia.edu

Cryptographic authentication protocols for smart cards

2001, Computer Networks

Abstract

Today, cryptology is essential for security of information and communication systems. But 25 years ago, it was a classi®ed and highly con®dential activity. Presented here from the point of view of smart cards, this quick evolution of cryptology re¯ects the revolution of digital information, e.g., mobile phone and MPEG television. The link between smart cards and cryptology is very strong: smart cards eciently con®ne keys and algorithms. Their security relies on a speci®c software, named here secure-ware, which demonstrates the value of the Common Criteria methodology. Ó

Key takeaways

  • The unique secret key of each M4 card results from diversifying a master key according to the card's serial number.
  • The TELEPASS1 algorithm enables dynamic card authentication using security modules (see Fig. 3).
  • In each PC0 card, a hierarchy appears between the card's unique key and up to 20 operation keys with associated rights.
  • The card used today is the PC2 card which continues the family of access control cards initiated by PC0.
  • An RSA authentication using a 512-bit modulus, product of three primes of similar size, and a GQ1 authentication using a 768-bit modulus represent the same claimant workload: approximately 75 multiplications modulo a 512-bit number.