Technical Support

Technical Support

Current Location:Home > Technical Support  > Technical Support

How to prevent malicious attacks smart card
Release date:2016-01-20
Smart card (SmartCard), also known as IC card is a microprocessor and memory integrated circuit chip with a miniature, with a standard card. Smart cards must follow a standard, ISO7816 is the most important one. ISO7816 standard specifies the smart card shape, thickness, contact position, the electrical signal, agreements.
 
    Smart card chip depending on different types of loading, information and communication methods, it can be divided into memory cards and microprocessor cards and type contactless cards, contactless cards and dual interface cards.
 
    Generally, the applied PKI smart card applications, all with hardware true random number generator, RSA coprocessor, can hardware RSA operations. In addition, with the DES and SHA-1 cryptographic algorithms, etc., to ensure that the hardware internally generated key pair and the hardware inside complete encryption and decryption operations.
 
    From the security features of the smart card hardware perspective, in consideration of chip design and manufacture a variety of security measures, such as to prevent others from modifying data and the like; in the chip operating system (COS) design, the smart card data communication have taken a variety of different security measures. More security measures, have adopted the high intensity of the various security algorithms, data encryption and other measures. In the application which uses a user identification, including biometrics, the user PIN code authentication, smart cards and smart card readers and other equipment of the mutual authentication security measures.
 
    Any products related to safety may have been attacked, smart cards are no exception, for the smart card, there are several common means of attack:
 
    Physical tampering: to find ways to make the IC card is exposed, with a microprobe attached to the chip surface, read out the memory content directly.
 
    Clock Jitter: let the clock work in the normal frequency range, but within a certain time interval to accurately calculate the sudden injection of high frequency pulse, resulting in the loss of twelve processor instruction.
 
    Beyond the scope voltage detection: the detection range is similar to the ultra-clock frequency by adjusting the voltage, the processor error.
 
    For the above means of attack, smart card vendors have taken a series of preventive measures: such as bus stratification, the chip flattening, energy balance, random instruction redundancy.
 
    Smart card has been applied to the field of banking, telecommunications, transportation, social security, e-commerce, IC telephone card, financial IC card, social security card and mobile phone SIM cards belong to the category of smart cards.