Skip to main content

Security for Contactless Smart Cards Using Cryptography

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

Contactless Smartcards are typically used in fields of electronic ticketing, transport and access control. More recently, they have been for electronic payment transactions. This apparent reluctance to the use of contactless smartcards in fields that involve money transactions as well as many other fields and applications is because contactless technology is erroneously believed to be less secure than contact technology. Research has shown that contactless smartcards are not fundamentally less secure than contact cards. However certain security threats are inherently facilitated by contactless smart cards and contactless technology. The various security issues in contactless technology are Eavesdropping, Denial of Service, Covert Transactions, and Man-in-the-Middle.

In this paper, we explore the possibility of using cryptography as a solution to the security issues in contactless technology. We provide the effectiveness of cryptography on these issues, the limitations we have to impose on our applications in order to use cryptography, and further enhancements that are possible to reduce, if not eliminate, the severity of security threats in contactless technology which will further enable use of contactless smart cards in more fields hitherto unexplored.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Handschuh, H.: Contactless technology Security Issues. Information Security bulletin 9, 95–100 (2004)

    Google Scholar 

  2. Nohl, S.K., Evans, D., Plötz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: USENIX Security Symposium, San Jose, CA, July 31 (2008)

    Google Scholar 

  3. Rankl, W., Effing, W.: Smart Card Handbook, 2nd edn. John Wiley & Sons, New York (2000)

    Google Scholar 

  4. Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password based protocols secure against dictionary attacks. In: IEEE Security & Privacy, Oakland, CA, USA, pp. 72–84. IEEE, Los Alamitos (May 1992)

    Google Scholar 

  5. Mohammed, L.A., Ramli, A.R., Prakash, V., Daud, M.B.: Smart Card Technology: Past, Present, and Future. International Journal of The Computer, the Internet and Management 12(1), 12–22 (2004)

    Google Scholar 

  6. Fancher, C.H.: In your Pocket: Smartcards, IEEE Spectrum. In: Ullmann, M., Kugler, D., Neumann, H., Stappert, S., Vogeler, M. (eds.) Proceedings of Password Authenticated Key Agreement for Contactless Smart Cards, RFIDSEC 2008, February, pp. 47–53 (1997/2008)

    Google Scholar 

  7. Guillou, L.C., et al.: The smart Card: A Standardized Security Device Dedicated to Public cryptology. In: Simmons, G.J. (ed.) Contemporary Crypto-logy. The Science of Information Integrity, pp. 561–613. IEEE Press, Los Alamitos (1992)

    Google Scholar 

  8. Hao, F., Anderson, R., Daugman, J.: Combining cryptography with biometrics effectively, Technical Report No.640, University of Cambridge, ISSN 1476-2986

    Google Scholar 

  9. http://www.biosensorhawaii.com/possible.html

  10. http://cryptome.org/flannery-cp.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kundarap, A., Chhajlani, A., Singla, R., Sawant, M., Dere, M., Mahalle, P. (2010). Security for Contactless Smart Cards Using Cryptography. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics