Smart Card Handbook
Fourth Edition
Wolfgang Rankl and Wolfgang Effing
Giesecke
& DevrientGmbH, Germany
Translated by
Kenneth Cox
Kenneth Cox Technical Translations, Wassenaar, The Netherlands
©WILEY
AJohn WileyandSons, Ltd.,Publication
Contents
Prefacetothe Fourth Edition xxiii
Symbols
and Notation xxvAbbreviations xxix
1 Introduction 1
1.1 The
history
ofsmartcards 21.2 Card typesand
applications
71.2.1
Memory
cards 81.2.2 Processorcards 8
1.2.3 Contactless cards 9
1.3 Standardization 10
2 Card
Types
152.1 Embossedcards 15
2.2
Magnetic-stripe
cards 162.3 Smartcards 18
2.3.1
Memory
cards 202.3.2 Contactless memory cards 20
2.3.3 Processor cards 21
2.3.4 Contactless processor cards 23
2.3.5
Multi-megabyte
cards 242.3.6
Security
tokens 252.4
Optical
memory cards 25vi Contents
3
Physical Properties
293.1 Cardformats 29
3.2 Contact field 36
3.3 Card
body
383.4 Cardmaterials 39
3.5 Cardcomponents and
security
features 423.5.1 Guillochepatterns 42
3.5.2
Signature panel
443.5.3 Microtext 44
3.5.4 Ultraviolettext 44
3.5.5 Barcode 44
3.5.6
Hologram
453.5.7
Kinegram
453.5.8
Multiple
LaserImage (MLI)
463.5.9
Embossing
463.5.10 Laser
engraving
473.5.11 Scratch field 47
3.5.12 Thermochrome
display
483.5.13 Moduliertes Merkmal
(modulated feature)
method 483.5.14
Security
features 493.6
Chip
modules 503.6.1 Electricalconnections between the
chip
andthe module 513.6.2 TAB modules 53
3.6.3
Chip-on-flex
modules 543.6.4 Lead-frame modules 57
3.6.5
Special
modules 594 Electrical
Properties
614.1 Electrical connections 62
4.2
Supply voltage
624.3
Supply
current 654.4 Clock
supply
694.5 Datatransmissionwith T=0orT= 1 69
4.6 Activation and deactivation sequences 70
5 SmartCard Microcontrollers 73
5.1 Semiconductor
technology
765.2 Processor types 79
5.3 Memory types 82
5.3.1 ROM
(read-only memory)
845.3.2 EPROM
(erasable
read-onlymemory)
855.3.3 EEPROM
(electrically
erasableread-only memory)
855.3.4 Flash memory 90
5.3.5 RAM(random-access
memory)
925.3.6 FRAM(ferroelectricrandom-access
memory)
925.4
Supplementary
hardware 935.4.1 Communicationwith T=0orT= 1 93
Contents vii
5.4.2 Communication with USB 94
5.4.3 Communication with MMC 95
5.4.4 Communication with SWP 95
5.4.5 Communication withI2C 96
5.4.6 Timer 96
5.4.7 CRC
(cyclic redundancy check)
calculation unit 975.4.8 Random numbergenerator
(RNG)
975.4.9 Clock
generation
and clockmultiplication
985.4.10 DMA
(direct
memoryaccess)
995.4.11
Memory
managementunit(MMU)
1005.4.12 Java accelerator 101
5.4.13
Coprocessor
forsymmetric cryptographic algorithms
1025.4.14
Coprocessor
forasymmetric cryptographic algorithms
1035.4.15 Error detection and correction for nonvolatile memory 103
5.4.16 Mass memoryinterface 104
5.4.17
Multichip
module 1055.4.18 Verticalsystem
integration
(VSI) 1065.5 Extendedtemperaturerange 107
6 Information
Technology
Foundations 1096.1 Datastructures 109
6.2
Encoding alphanumeric
data 1156.2.1 Seven-bit code(ASCII) 115
6.2.2
Eight-bit
code(PC ASCII) 1156.2.3 Sixteen-bitcode
(Unicode)
1166.2.4
Thirty-two-bit
code(UCS)
1166.3 SDL notation 117
6.4 State machines 118
6.4.1 Basic
theory
ofstatemachines 1186.4.2 Practical
applications
1206.5 Error detection and correction codes 122
6.5.1 XOR checksums 124
6.5.2 CRC checksums 125
6.5.3 Reed-Solomon codes 127
6.5.4 Error correction codes 128
6.6 Data
compression
1297
Security
Foundations 1337.1
Cryptology
1337.1.1
Symmetric cryptographic algorithms
1387.1.1.1 DES
algorithm
1387.1.1.2 AES
algorithm
1407.1.1.3 IDEA
algorithm
1417.1.1.4 COMP128
algorithms
1427.1.1.5
Milenage algorithm
1427.1.1.6
Operating
modes of blockencryption algorithms
1427.1.1.7
Multiple encryption
144viii Contents
7.1.2
Asymmetric cryptographic algorithms
1457.1.2.1 RSA
algorithm
1467.1.2.2
Generating
RSAkeys
1487.1.2.3 DSS
algorithm
1517.1.2.4
Elliptic
curves asasymmetric cryptographic algorithms
1527.1.3
Padding
1547.1.4
Message
authentication codeandcryptographic
checksum 1557.2 Hashfunctions 156
7.3 Random numbers 159
7.3.1
Generating
random numbers 1607.3.2
Testing
randomnumbers 1637.4 Authentication 166
7.4.1 Unilateral
symmetric
authentication 1687.4.2 Mutual
symmetric
authentication 1697.4.3 Static
asymmetric
authentication 1707.4.4
Dynamic asymmetric
authentication 1727.5
Digital signatures
1747.6 Certificates 178
7.7
Key
management 1807.7.1 Derived
keys
1817.7.2
Key
diversification 1827.7.3
Key
versions 1827.7.4
Dynamic keys
1827.7.4.1 Generation with a
symmetric cryptographic algorithm
1827.7.4.2 Generation with an
asymmetric cryptographic algorithm
1837.7.5
Key
data 1837.7.6
Key
managementexample
1857.8 Identification of persons 187
7.8.1
Knowledge-based
identification 1887.8.2
Testing
a secretnumber 1887.8.3 The
probability
ofguessing
aPIN 1907.8.4
Generating
PINcodes 1917.8.5
Verifying
thataterminal isgenuine
1927.8.6 Biometricmethods 194
8 Communication with Smart Cards 201
8.1 Answerto reset(ATR) 203
8.1.1 The initial character 206
8.1.2 The format character 207
8.1.3 Theinterface characters 207
8.1.3.1 Global interface characterTAi 208
8.1.3.2 Globalinterface character
TAi
2098.1.3.3 Global interface character
TCi
2098.1.3.4
Specific
interface characterTC2
2108.1.3.5
Specific
interface characterTA; (i
>2)
2108.1.3.6
Specific
interface characterTB; (i
>2)
210Contents ix
8.1.3.7
Specific
interfacecharacterTQ
(i >2)
2118.1.3.8 Global interfacecharacter
TA2
2118.1.4 The historical characters 211
8.1.5 The checkcharacter 214
8.1.6 Practical
examples
of ATRs 2148.2 ProtocolParameter Selection (PPS) 217
8.3
Message
structure: APDUS 2218.3.1 Command APDUstructure 221
8.3.2
Response
APDUstructure 2248.4 Secure Data Transmission 225
8.4.1 Data
objects
forplaintext
2278.4.2 Data
objects
forsecurity
mechanisms 2278.4.3 Data
objects
forauxiliary
functions 2288.4.4 Theauthentic mode
procedure
2288.4.5 Thecombinedmode
procedure
2308.4.6 Sendsequencecounter 231
8.5
Logical
channels 2338.6
Logical protocols
2348.6.1 TCP/IP
protocol
2348.6.2 HTTP
protocol
2358.6.3 Bearer
Independent
Protocol (BIP) 2368.7
Connecting
terminalstohigher-level
systems 2378.7.1 PC/SC 237
8.7.1.1 ICC-aware
application
2398.7.1.2 Service
provider
2398.7.1.3 ICCresourcemanager 240
8.7.1.4 IFD handler 240
8.7.1.5 IFD
(interface
device) 2408.7.1.6 ICC
(integrated chip card)
2418.7.2 OCF 241
8.7.3 MKT 241
8.7.4 MUSCLE 242
9 Data Transmissionwith Contact Cards 243
9.)
Physical
transmissionlayer
2439.2
Memory
cardprotocols
2489.2.1
Telephone chip protocol
2499.2.1.1
Resetting
the addresspointer
2499.2.1.2
Incrementing
the addresspointer
andreading
data 2509.2.1.3
Writing
toanaddress 2509.2.1.4
Erasing bytes
2509.2.2
I2C
bus 2519.2.2.1
Reading
from anaddress 2529.2.2.2
Writing
toan address 2539.3 ISOtransmission
protocols
2549.3.1 The T=0 transmission
protocol
2559.3.2 The T= 1transmission
protocol
260X Contents
9.3.2.1 Blockstructure 261
9.3.2.2 Send/receive sequencecounter 264
9.3.2.3
Waiting
times 2659.3.2.4 Transmission
protocol
mechanisms 2679.3.2.5
Example
of data transmission with the T= 1protocol
2709.3.3
Comparison
of the T=0 and T= 1 transmissionprotocols
2709.3.4 The T= 14 transmission
protocol (Germany)
2719.4 USB transmission
protocol
2729.4.1 Electrical connection 273
9.4.2
Logical
connection 2749.4.2.1 Transfer modes 275
9.4.2.2 Data
packets
2759.4.3 Device classes 276
9.4.4
Summary
andprospects 2779.5 MMC transmission
protocol
2779.6
Single-wire protocol (SWP)
27810 Contactless Data Transmission 283
10.1 Inductive
coupling
28410.2 Power transmission 285
10.3 Data transmission 286
10.4
Capacitive coupling
28710.5 Collision avoidance 289
10.6 State of standardization 290
10.7
Close-coupling
cards(ISO/1EC 10536)
29110.7.1 Power transmission 292
10.7.2 Inductive data transmission 293
10.7.2.1 Transmission from the cardtothe terminal 293 10.7.2.2 Transmission from the terminal tothe card 293
10.7.3
Capacitive
data transmission 29510.8 Remote
coupling
cards 29610.9
Proximity
cards (ISO/IEC 14443) 29710.9.1
Physical properties
29810.9.2 Power transmission and
signal
interface 29910.9.3
Signal
and communication interface 29910.9.4
Type
A communication interface 30010.9.5
Type
B communication interface 30210.9.5.1 Datatransmission from the terminaltothe card 302 10.9.5.2 Data transmissionfromthe cardto the terminal 303 10.9.6 Initializationand anticollision
(ISO/IEC 14443-3)
30410.9.6.1
Type
Ainitialization and anticollision 305 10.9.6.2Type
B initializationand anticollision 31410.9.7 Transmission
protocol (ISO/IEC
14433-4) 32910.9.7.1 Protocolactivationwith
Type
A cards 33010.9.7.2
Half-duplex
blockprotocol
(ISO/IEC 14433-4) 33910.9.7.3
Deactivating
acard 34410.9.7.4 Error
handling
344Contents xi
10.10
Vicinity integrated
circuit cards(ISO/IEC 15693)
34410.11 Near field communication
(NFC)
34810.11.1 State of standardization 348
10.11.2 NFC
protocol
34910.11.3 NFC
applications
35010.11.3.1
Rapid
access toinformationregarding
services 35010.11.3.2
Peer-to-peer
informationexchange
35010.11.3.3 Mobilepayment 350
10.11.3.4 Secure NFC 351
10.12 FeliCa 352
10.13 Mifare 352
11 Smart Card Commands 353
11.1 File selection commands 356
11.2 Read and write commands 358
11.3 Search commands 366
11.4 File
operation
commands 36811.5 Commands for
authenticating
persons 37011.6 Commands for
authenticating
devices 37411.7 Commands for
cryptographic algorithms
37811.8 Filemanagementcommands 384
11.9
Application
managementcommands 38911.10
Completion
commands 39111.11 Commands for hardware
testing
39511.12 Commands for datatransmission 398
11.13 Database commands(SCQL) 399
11.14 Commandsforelectronicpurses 402
11.15 Commandsforcreditand debitcards 405
11.16
Application-specific
commands 40611.17 Command
processing
times 40711.17.1
Processing
time estimation 40711.17.1.1 Command
processing
40811.17.1.2
Proportionality
factor forpredefined
functions 40911.17.1.3 NVM
operations
40911.17.1.4 Data transfer 410
11.17.1.5 Calculated
example:
READ BINARY command 411 11.17.1.6 Calculatedexample:
smartcard initialization 413 11.17.2Processing
times oftypical
smartcard commands 41511.17.3
Typical
commandprocessing
times 41712 Smart Card File
Management
42112.1 Filestructure 421
12.2 The life
cycle
of files 42212.3 Filetypes 423
12.3.1 Master file
(MF)
42412.3.2 Dedicated file
(DF)
42412.3.3
Application
dedicated file(ADF)
425xii Contents
12.3.4
Elementary
file(EF)
42512.3.5
Working
EF(WEF) 42512.3.6 InternalEF(IEF) 425
12.4
Application
files 42512.5 Filenames 426
12.5.1 File identifier (FID) 426
12.5.2 Shortfile identifier(SFI) 428
12.5.3 DFname 429
12.5.4
Application
identifier(AID)
structureandcoding
42912.6 File selection 430
12.6.1
Selecting
directories(MF
andDF)
43012.6.2
Explicit
EF selection 43112.6.3
Implicit
EF selection 43112.6.4 Selection
using
apath
name 43212.7 EF filestructures 432
12.7.1
Transparent
filestructure 43212.7.2 Linear fixed filestructure 433
12.7.3 Linear variable file structure 434
12.7.4
Cyclic
filestructure 43512.7.5 Data
objects
file structure 43512.7.6 Databasefilestructure 436
12.7.7 Executestructure 436
12.7.8
Sequence
control filestructure 43612.8 Fileaccess conditions 436
12.9 Fileattributes 438
12.9.1 WORM attribute 439
12.9.2
High update activity
attribute 43912.9.3 EDC utilization attribute 439
12.9.4 Atomic write accessattribute 439
12.9.5 Concurrentaccessattribute 440
12.9.6 Data transfer selection attribute 440
12.9.7 File
encryption
attribute 44013 Smart Card
Operating Systems
44113.1 Evolution ofsmartcard
operating
systems 44213.2 Fundamentalaspectsand tasks 444
13.3 Command
processing
44713.4
Design
andimplementation principles
44913.5
Operating
systemcompletion
45213.5.1
Operating
system boot loader 45513.5.2 Hardware
recognition
45513.5.3 Softand hard masks 456
13.5.4
Operating
systemAPIs 45713.6
Memory organization
and memorymanagement 45713.6.1 RAMmemory management 458
13.6.2 EEPROMmemorymanagement 459
13.6.3 Flash memorymanagement 461
Contents xiii
13.7 File management 463
13.7.1 Pointer-based file management 464
13.7.2 Filemanagement withafile allocation table (FAT) 466
13.7.3
Memory partitioning
into pages 46713.7.4 DF
separation
46713.7.5 Freememorymanagementmechanisms 468
13.7.6
Quota
mechanism 47013.7.7 Data
integrity
47113.7.8
Cross-application
access 47213.8
Sequence
control 47213.9 ISO/1EC 7816-9resource access 474
13.10 Atomic
operations
48013.11
Multitasking
48313.12 Performance 484
13.13
Application
managementwithglobal platform
48513.13.1
Security
domains 48713.13.2 Issuer
security
domain 48813.13.3 Global
platform
API 48913.13.4 Global
platform
commands 48913.14 Downloadable program code 491
13.15 Executable native code 493
13.16
Open platforms
49913.16.1 ISO/IEC 7816
compatible platforms
49913.16.2 Java card 499
13.16.2.1 The Java
programming language
50013.16.2.2 The
properties
of Java 50113.16.2.3 Java virtual machine
(JVM)
50213.16.2.4 Java card virtual machine(JCVM) 504
13.16.2.5
Memory
sizes in Java cards 50513.16.2.6 PerformanceinJava cards 507
13.16.2.7 Java cardruntime environment 508
13.16.2.8
Application partitioning
(firewalls) 508 13.16.2.9 Commanddispatching
andapplication
selection(dispatcher)
50913.16.2.10 Transaction
integrity (atomic operations)
51013.16.2.11 Persistent and transient
objects
51013.16.2.12 Java Card
application programming
interface 51113.16.2.13 Software
development
for Java insmartcards 51413.16.2.14 Execution
speed
51713.16.2.15 File
system
51713.16.2.16
Cryptography
andexportrestrictions 518 13.16.2.17 Futuregenerations
of Java cards 518 13.16.2.18Summary
and futureprospects 51913.16.3 Multos 519
13.16.4 BasicCard 520
13.16.5 Linux 521
xiv Contents
13.17 The small-OSsmartcard
operating
system 52113.17.1
Programming
inpseudocode
52313.17.2
Design
aspects 52413.17.3 Fileaccess 526
13.17.4 Accessto internalsecrets(PINsand
keys)
52613.17.5 Small-OSconstants 529
13.17.6 Small-OS variables 529
13.17.6.1 Small-OS RAM variables 531
13.17.6.2 Small-OS EEPROM variables 532
13.17.7 Main
loop
and initialization 53413.17.8 I/O manager 536
13.17.9 File manager 536
13.17.10 Return code manager 536
13.17.11
Operating
systemkernel 53813.17.12 Command
interpreter
53913.17.13 Stincture of program code forcommands 540
13.17.14 Commandset 541
13.17.14.1 SELECT command 541
13.17.14.2 READ BINARY command 545
13.17.14.3 UPDATE BINARY command 547
13.17.14.4 READ RECORD command 549
13.17.14.5 UPDATE RECORD command 552
13.17.14.6 VERIFY command 556
13.17.14.7 INTERNAL AUTHENTICATE command 560
13.17.15 A
simple application example
56314 SmartCard Production 567
14.1 Tasks and roles in the
production
process 56714.2 Thesmartcard life
cycle
56914.3
Chip
and moduleproduction
57114.3.1
Chip design
57214.3.2 Smart card
operating system development
57314.3.3
Chip
fabrication in semiconductorplants
57514.3.4
Chip testing
onthe wafer 57814.3.5 Wafer
sawing
57914.3.6
Packaging chips
in modules 58114.3.7
Chip bonding
58214.3.8
Encapsulating
thechips
in modules 58314.3.9 Module
testing
58314.4 Card
Body production
58514.4.1
Monolayer
card 58514.4.2
Multilayer
card 58614.4.3
Injection-molded
card bodies 58614.4.4 Direct
plug-in production (plug-in only)
58814.4.5 Card bodies with
integrated
antennas 58914.4.5.1 Etchedantennas 590
14.4.5.2 Wound coils 591
Contents xv
14.4.5.3 Embeddedantennas 591
14.4.5.4 Printedantennas 593
14.4.5.5
Connecting
the antenna tothechip
59314.4.6
Printing
the card bodies 59414.4.6.1 Sheet
printing
of card bodies 59414.4.6.2
Printing single
card bodies 59514.4.6.3 Offset
printing
59614.4.6.4
Digital printing
59714.4.6.5 Screen
printing
59814.4.6.6 Thermal transfer and thermal
dye
sublimationprinting
59814.4.6.7
Inkjet printing
59914.4.7
Stamping
the foils 59914.4.8
Applying
cardcomponents tothe cardbody
59914.5
Combining
the cardbody
and thechip
59914.5.1
Milling
the modulecavity
60014.5.2
Implanting
the modules 60114.5.3 Module
printing
60314.5.4
Plug-in stamping
60414.6 Electrical
testing
of modules 60514.7
Loading
staticdata 6091.4.7.1
Completing
theoperating
system 60914.7.2 Collaborationof the card
producer
and the card issuer 61014.7.3
Initializing
theapplication
61214.7.4
Optimized
massdata transferto smartcards 613 14.7.5Accelerating
datatransferto thesmartcard 61614.8
Loading
individualdata 61814.8.1
Generating card-specific
secretdata 61814.8.2 Personalization
(individualization)
61914.9
Envelope stuffing
anddispatching
62414.10
Special types
ofproduction
62514.10.1 Productionondemand (PoD) 625
14.10.2 Picture cards 626
14.10.3 Direct smartcard
issuing
(instantissuing)
62814.11 Terminationof cardusage 629
14.11.1 Deactivation 629
14.11.2
Recycling
63015
Quality
Assurance 63315.1 Card
body
tests 63415.1.1 Adhesion
(or blocking)
63515.1.2
Amplitude
measurement 63515.1.3
Bending
stiffness 63515.1.4 Card dimensional
stability
and warpage withtemperatureandhumidity
63615.1.5 Card dimensions 636
15.1.6 Cardwarpage 636
15.1.7 Delamination 636
xvi Contents
15.1.8
Dynamic bending
stress 63615.1.9
Dynamic
torsional stress 63715.1.10 Electricalresistance and
impedance
ofcontacts 63715.1.11
Electromagnetic
fields 63815.1.12
Embossing
reliefheight
of character 63815.1.13
Flammability
63815.1.14 Fluxtransition
spacing
variation 63815.1.15
Height
andsurfaceprofi
le of themagnetic stripe
63815.1.16
Light
transmittance 63815.1.17 Locationofcontacts 639
15.1.18 Resistanceto chemicals 639
15.1.19 Static
electricity
63915.1.20 Surface
profile
ofcontacts 63915.1.21 Surface
roughness
of themagnetic stripe
64015.1.22 Ultraviolet
light
64015.1.23 Vibration 640
15.1.24 Weartestfor
magnetic stripe
64015.1.25
X-rays
test 64015.2 Microcontrollerhardware tests 641
15.3 Testmethodsfor contactlesssmartcards 642
15.3.1 Test methods for
proximity
smartcards 64415.3.2 Test methods for
vicinity coupling
smartcards 64515.4 Test methods forsoftware 645
15.4.1 Fundamentalsofsmartcard software
testing
64715.4.1.1
Analysis
64815.4.1.2
Design
64815.4.1.3
Implementation
andtest 64815.4.1.4
System integration
64815.4.1.5 Maintenance 648
15.4.2
Testing techniques
andteststrategies
64915.4.2.1 Statisticalprogram evaluation 649
15.4.2.2 Review 649
15.4.2.3 Blackboxtest 649
15.4.2.4 Whiteboxtest 650
15.4.2.5
Greyboxtest
65315.4.3
Dynamic testing
ofoperating
systemsandapplications
65315.4.4 Test
strategy
65415.5 Evaluation of hardware andsoftware 659
15.5.1 Common criteria
(CC)
66115.5.2 ZKAcriteria 663
15.5.3 Additionalevaluation methods 663
15.5.4
Summary
66416 Smart Card Security 667
16.1 Classification of attacks and attackers 668
16.1.1 Classification of attacks 669
Contents xvii
16.1.2
Consequences
of attacks andclassificationofattackers 672 16.1.3 Classificationofthe attractiveness of attacks 67416.2 A
history
of attacks 67516.3 Attacks and defensemeasures
during development
67516.3.1 Smart card microcontroller
development
67916.3.2 Smart card
operating
systemdevelopment
68016.4 Attacks and defensemeasures
during production
68216.5 Attacks and defensemeasures
during
card usage 68216.5.1 Attacks onthe hardware 684
16.5.2 Attacksonthe
operating
system 71216.5.3 Attackson
applications
72716.5.4 Attacksonthesystem 731
17 Smart Card Terminals 735
17.1 Mechanical
properties
73917.1.1 Contact unit with
wiping
contacts 73917.1.2
Mechanically
drivencontactunit 74017.1.3
Electrically
drivencontactunit 74017.1.4 Card
ejection
74117.1.5 Ease of card withdrawal 742
17.2 Electrical
properties
74217.3 User interface 744
17.4
Application
interface 74417.5
Security
74418 Smart Cards in
Payment Systems
74718.1
Payment
transactions with cards 74718.1.1 Electronicpaymenttransactions withsmartcards 748
18.1.1.1 Credit cards 748
18.1.1.2 Debit cards 749
18.1.1.3 Electronic purses 749
18.1.1.4
Open
and closed systemarchitectures 750 18.1.1.5 Centralizedanddecentralizedsystemarchitecture 75118.1.2 Electronicmoney 753
18.1.2.1 Processable 753
18.1.2.2 Transferable 753
18.1.2.3 Divisible 753
18.1.2.4 Decentralized 753
18.1.2.5 Monitorable 754
18.1.2.6 Secure 754
18.1.2.7 Anonymous 754
18.1.2.8
Legal
frameworkandretention of value 75518.1.3 Basic system architecture
options
75518.1.3.1
Background
system 75518.1.3.2 Network 755
18.1.3.3 Terminals 756
18.1.3.4 Smart cards 756
xviii Contents
18.2
Prepaid
memory cards 75718.3 Electronic purses 759
18.3.1 Inter-sector electronic pursescompliantwith EN 1546 760
18.3.1.1 Data elements 763
18.3.1.2 Files 764
18.3.1.3 Commands 764
18.3.1.4 States 765
18.3.1.5
Cryptographic algorithms
76618.3.1.6 General processes 767
18.3.1.7 Load process 768
18.3.1.8
Payment
process 77118.3.2 Common electronic parse
specifications
77418.3.3 Proton 775
18.4 EMV
Application
77618.4.1 Files and data elements 777
18.4.2 Commands 778
18.4.3
Cryptography
77818.4.4
System
architecture and transaction processes 77918.4.5 Future
developments
78118.5
PayPass
andpayWave
78218.6 The
Eurocheque System
inGermany
78318.6.1 User functions 784
18.6.2 The overallsystemin brief 785
18.6.3 Girocard with
chip
78618.6.4
Supplementary applications
78818.6.5
Summary
78819 Smart Cards in Telecommunication
Systems
78919.1 Public card
phones
inGermany
78919.2 Telecommunication 792
19.3 Overview of mobile telecommunicationsystems 795
19.3.1
Multiple
access methods 79519.3.1.1
Frequency
divisionmultiple
access(FDMA) 79619.3.1.2 Time division
multiple
access (TDMA) 79619.3.1.3 Code division
multiple
access(CDMA)
79819.3.1.4
Space
divisionmultiple
access(SDMA) 79819.3.2 Cellular
technology
79919.3.3 Celltypes 800
19.3.4 Bearer services 802
19.4 The GSMsystem 802
19.4.1
Specifications
80419.4.2
System
architecture and components 80619.4.3
Important
data elements 80819.4.3.1
Coding
ofalphanumeric
characters 80819.4.3.2 SIM service table(SST) 810
19.4.3.3 Fixed
dialing
numbers (FDN) 81019.4.3.4 ICC identification(ICCID) 810
Contents xix
19.4.3.5 Internationalmobile
equipment identity
(IMEI) 81019.4.3.6 International mobile subscriber
identity
(IMSI) 81019.4.3.7 Ki
(Key individual)
and Kc(Key cipher)
81019.4.3.8 Shortmessagesservice
(SMS)
81119.4.3.9 Abbreviated
dialing
numbers (ADN) 81119.4.3.10 Locationareainformation (LAI) 811
19.4.3.11 Mobile stationISDN number(MSISDN) 811 19.4.3.12
Temporary
mobilesubscriberidentity
(TMSI) 81119.4.4 Thesubscriber
identity
module(SIM) 81119.4.4.1 SIMcommands 814
19.4.4.2 SIMfiles 816
19.4.4.3
Example
ofatypical
command sequence 82619.4.4.4 Authentication of the SIM 826
19.4.4.5 Mobile
telephone
switch-on and switch-off processes 83019.4.4.6 SIM
application
toolkit(SAT)
83319.4.4.7 Over-the-air(OTA) communication 838
19.4.4.8 Remote filemanagement (RFM) 840
19.4.4.9 Remote
applet
management (RAM) 84119.4.4.10 Dual IMSI 842
19.4.4.11
Implementing
ahomezone 84419.4.4.12
Operating principle
of SIM lock 84519.4.4.13
Operating principle
ofprepaid
systems 84519.4.5 Future
developments
84819.5 The UMTSsystem 848
19.5.1 Future
developments
85219.6 The wirelessidentificationmodule
(WIM)
85419.7 Microbrowsers 857
20 Smart Cards inHealth Care
Systems
86120.1 Health insurancecardsin
Germany
86120.2 Electronichealthcarecardsin
Germany
86420.2.1 Cardtypes 865
20.2.2
Applications
inelectronic healthcarecards 86620.2.3 Electronic
prescriptions
86820.2.4
Summary
and prospects 86821 Smart Cards in
Transportation Systems
86921.1 Electronictickets 869
21.1.1
System
architecture 87021.1.2
Octopus
card 87121.1.3
Trip registration
87321.1.4
Typical
transactions 87421.1.4.1 Identificationandauthentication 875
21.1.4.2 Check-in transaction 876
21.1.4.3 Check-out transaction 876
21.1.5 Value-added services 876
21.1.6 Evolution of electronic tickets 877
XX Contents
21.2 Ski Passes 878
21.2.1
System
architecture 87821.2.2 Ski cards 880
21.2.3
Typical
transactions 88221.2.3.1 Identification and authentication 882
21.2.3.2
Reading
data 88321.2.3.3
Writing
data 88421.2.4 Future
developments
88521.3 Tachosmart 887
21.4 Electronic toll systems 887
22 Smart Cards for Identificationand
Passports
89322.1 FINEE)
personal
ID card 89322.2
ICAO-compliant
passports 89423 SmartCards for IT
Security
89923.1
Digital signatures
89923.1.1
Applicable
standards 90023.1.2 The
legal
framework inGermany
90023.1.3
System
architecture 90323.1.4 Card
issuing
90323.1.5
Signing
andverifying
documents 90423.1.6 Trustcenter(TC) 905
23.1.7
Signature
cards 90623.1.8
Summary
andprospects 90923.2
Signature applications compliant
with PKCS#15 90923.3 Smart Card Web Server
(SCWS)
91224
Application Design
91724.1 General information and characteristic data 917
24.1.1 Microcontrollers 917
24.1.1.1 Production 917
24.1.1.2 Service life 918
24.1.1.3 Data transmission 919
24.1.1.4
Algorithm
execution times 92024.1.2
Applications
92024.1.2.1
Key
management 92024.1.2.2 Data 921
24.1.2.3 Data
exchange
92124.1.3
System
aspects 92224.1.3.1
Security
92224.1.3.2 User interface 922
24.1.3.3
High-level design
92324.1.4
Compliance
with standards 92324.2
Application generation
tools 92424.3
Analyzing
an unknown smart card 926Contents xxi
25
Appendix
92925.1
Glossary
92925.2 Related
reading
99125.3
Bibliography
99125.4
Directory
ofstandards andspecifications
99925.5 Web addresses 1018
Index 1021