Smart Cards, Tokens, Security and Applications

Front Cover
Keith Mayes, Konstantinos Markantonakis
Springer, May 18, 2017 - Computers - 531 pages
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.


 

Contents

1 An Introduction to Smart Cards
1
2 Smart Card Production Environment
30
3 MultiApplication Smart Card Platforms and Operating Systems
59
4 Smart Cards and Security for Mobile Communications
93
5 Smart Cards for Banking and Finance
129
6 Security for Video Broadcasting
154
7 Introduction to the TPM
173
Origins and Overview
192
11 OTA and Secure SIM Lifecycle Management
282
12 Smart Card Reader and Mobile APIs
305
13 RFID and Contactless Technology
351
14 ID Cards and Passports
386
15 Smart Card Technology Trends
413
16 Securing the Internet of Things
445
17 MULTOS and MULTOS Application Development
469
18 Trusted Execution Environment and Host Card Emulation
497

9 Smart Card Security
217
10 Application Development Environments for Java and SIM Toolkit
253

Other editions - View all

Common terms and phrases

About the author (2017)

Prof. Keith Mayes, B.Sc., Ph.D. CEng FIET A. Inst. ISP is the Director of the Information Security Group (ISG), and Head of the School of Mathematics and Information Security at Royal Holloway, University of London, which has been pioneering information/cybersecurity research and education since 1990. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His current research interests are diverse, including mobile communications, Near-Field Communication (NFC), mobile platform security, smart cards, Radio Frequency IDs (RFIDS), the Internet of Things, transport ticketing/system security, embedded systems and e-commerce. Keith joined the ISG in 2002, originally as the founder Director of the ISG Smart Card Centre, following a career in industry working for Pye TVT, Honeywell Aerospace and Defence, Racal Research and Vodafone. Keith is a Chartered Engineer, a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and an experienced company director and consultant.

Prof. Konstantinos Markantonakis B.Sc., M.Sc., MBA, Ph.D. (London) received his B.Sc. in Computer Science from Lancaster University in 1995, his M.Sc. in Information Security in 1996, his Ph.D. in 2000 and his MBA in International Management in 2005 from Royal Holloway, University of London. He is currently a Professor of Information Security in the Information Security Group in Royal Holloway, University of London. He is also the Director of the Information Security Group Smart Card Centre (SCC). His main research interests include smart card security and applications, secure cryptographic protocol design, key management, embedded system security and trusted execution environments, mobile phone operating systems/platform security, NFC/RFID/HCE security, grouping proofs, electronic voting protocols. He has published more than 140 papers in international conferences and journals. Since completing his Ph.D., he has worked as an independent consultant in a number of information security and smart card related projects. He has worked as multiapplication smart card manager in VISA International EU and as a Senior Information Security Consultant for Steer Davies Gleave. He is a member of the IFIP Working Group 8.8 on Smart Cards. Since June 2014, he is the vice-chair of IFIP WG 11.2 Pervasive Systems Security. He continues to act as a consultant on a variety of topics including smart card security, key management, information security protocols, mobile devices, smart card migration program planning/project management for financial institutions, transport operators and technology integrators.

Bibliographic information