Security’s Role in the Smart-card Game

Smart cards are the first truly successful mass-market semiconductor segment with the primary objective of providing security. Unlike holograms, magnetic-stripe cards and most RFID chips, smart cards can perform cryptographic computations using on-chip keys. As a result, a smart card can authenticate itself to other devices without revealing its secrets.

This capability has proved valuable for a wide range of applications. For example, smart cards for banking are ubiquitous outside the United States and have played a major role in managing fraud by securely authenticating account holders. In fact, securely binding a user’s identity to a card is a common feature across many smart-card applications, including transport, healthcare, passport and identification, and the largest smart-card segment, SIMs for mobile phones. The importance of smart cards is reflected in their ubiquity; about 5 billion smart cards are produced annually.

Smart cards have played a major role in the development of semiconductor security technologies over the past decades. The evolution of sophisticated tamper-resistance mechanisms and secure design methodologies, including countermeasures to side channel attacks, has largely been driven by the smart-card industry’s need to protect on-chip secrets.

We are now seeing similar tools and techniques being adopted in a wide range of other technology products.

For example, the development of new payment platforms is creating requirements for tamper-resistant cryptographic implementations for mobile phones and other devices. Similar needs also are appearing in the entertainment, embedded systems, network access and power metering fields.

Smart cards also have played an important role in making strong security cost effective. The average smart-card chip sells for less than $1. Even low-end chips support standard cryptographic algorithms, such as AES, which are mathematically extremely secure. But chips do vary in their protection against attackers who have physical possession of the chip and are seeking to extract secret keys. While no physical device can be perfectly secure against such attacks, smart-card chips that cost a few dollars can often provide similar protection to hardware security modules selling for thousands of dollars.

As we face the challenges of integrating security into an ever-increasing range of products, the security technologies developed to secure smart cards will provide a very useful toolbox.

About the Authors

Paul Kocher is the founder, president and chief scientist at Cryptography Research.

Pankaj Rohatji is the technical director of hardware solutions.

Ken Warren is the smart-card business manager at Cryptography Research.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.