GSM Shop GSM Shop

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Other Gsm/Mobile Related Forums > Sim Cloning and Scaning

LinkBack Thread Tools Display Modes
Old 01-10-2009, 15:20   #1 (permalink)
Freak Poster
walid07's Avatar
Join Date: May 2004
Age: 43
Posts: 113
Member: 66744
Status: Offline
Thanks Meter: 38
Wink For smart cards AES (TRK) dejan box II


ST’s ST22L128 32-bit secure MCU, for example, has received Common Criteria security certification at Evaluation Assurance Level (EAL) 5+ (Augmented), which ensures a high level of security. According to Thomasson, designers should remember they need security in all phases of communications between a card and a larger system. That means the use of public-key cryptography for the exchange of the keys during each transaction that must exchange encrypted information. “Today we have MCUs that use 1,024-bit public key cryptography to exchange keys between a card reader and contactless cards. After a system exchanges keys, it can use a technique such as the Advanced Encryption Standard (AES) to encrypt data.”

Although smart card manufacturers can implement all the software needed for an access control, banking or transportation payment system, application developers may choose to add software to answer a specific requirement. For those developers, the Java language deserves consideration.

ST’s Thomasson noted, “We designed the architecture of the ST22 MCU family to handle Java code and execute byte code efficiently.” The ST22 secure microkernel provides the first level of defense. “Then the card makers can design their own secure operating system that runs the Java Virtual Machine,” said Thomasson. “Developers of addon Java applications, called applets, have no direct access to the MCU or OS resources. Thus, we insulate the secure MCU, the OS, and the native code, and limit a card’s exposure to hacking.”

Developers of card-based systems also must address how a card communicates with its associated reader. Contactless cards present more of a challenge than do contact-based cards because a “wireless” card can operate when card holders do not know it. Parts A and B of the ISO/IEC 14443 specification for contactless cards describe an operating distance of up to 10cm. But, the ISO 15693 spec allows a working distance of up to 50cm. Unfortunately, attackers can operate contactless cards at greater ranges and can eavesdrop on card to-system communications at even longer distances.

Cards with contacts — those based on ISO/IEC 7816 specifications — present less of a problem because a user will generally insert them only in the readers associated with their use. “You must ensure cards do not give information to an inappropriate reader,” stresses Kocher. “Likewise, before a reader authenticates a card, it should not reveal anything.”


At Atmel, a manufacturer of smart card MCUs, Alex Giakoumis, director for corporate business development for smart cards and security, said, “Usually, the first level of security is that we do not talk about security.”

But Atmel’s AVR chips do implement security at different levels and include, for example, voltage detectors that let the MCU operate only between set voltage limits. Similarly, frequency detectors and temperature sensors let an MCU run only within set parameters. “We also scramble the data in several ways,” explained Giakoumis. “And we use random layouts so a hacker cannot go into an MCU and say, ‘Here is a bus and here is a CPU.’ The chips also include ‘features’ to mislead the bad guys.”

Those security capabilities appear transparent to engineers who program the AVR MCUs. “People who program in C do not have to master the architecture of a secure chip,” said Giakoumis. “But, programmers must use a secure compiler provided by an approved vendor such as IAR. The secure compiler is dedicated to all our secure and smart-card products.”

Most of these secure products have a crypto-processor that runs its own library of cryptographic algorithms, so developers do not have to write their own. Atmel provides a development emulator for its secure AVR processors and includes some development software, such as the ISO-7816 T=0 and T=1 smart-card communication protocols.

But, do not look for details about secure MCUs on the Atmel Web site. “People and companies must go through a thorough qualification process before they can buy a development kit and obtain chips,” explained Giakoumis. “Here in the US, the process can take a few weeks. In addition to gathering documents from an applicant, we send an Atmel person to talk with the company’s people and determine first hand whether they have a real application and project.”

Atmel needs to know how and where the company will secure the chips, documentation and development systems, and what sort of security system will protect them. “Our security group works with several agencies and runs its own investigations. After we receive their report we approve or reject a company’s application,” said Giakoumis.

Jean-Paul Thomasson, director, industry relations and communication for the digital secure access division at STMicroelectronics explained that ST implements the best combination of hardware and software that will minimize the

con equences of potential attacks on a card during its service. Like potential customers, MCUs also must go through security evaluations, although of a different type. “We must prove to our customers that we have implemented the appropriate security mechanisms, and we must give customers information so they can apply these mechanisms properly,” said Thomasson. “So, we use independent accredited experts and evaluation criteria described in ISO/IEC 15408, also known as the Common Criteria Methodology.” When developers apply for a final certification, they can use chip- and software developers’ evaluation and certification results as the basis for the certification of their own card. This process is called a composite evaluation/certification process

  Reply With Quote
The Following 2 Users Say Thank You to walid07 For This Useful Post:


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On

Similar Threads
thread Thread Starter Forum Replies Last Post
need micro box w/o smart card [Answered] mobilezone1997 Basic Micro-Box Software Support (SAMSUNG, HUAWEI, etc...) 20 11-17-2014 12:41
software for pic12c508 or pic16c84 of dejan box 104 dgtulga Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 7 07-19-2001 22:25


All times are GMT +1. The time now is 12:22.

Powered by Searchlight © 2020 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2017 -
Page generated in 0.21869 seconds with 8 queries