Over 10 Million Study Resources Now at Your Fingertips

Download as :
Rating : ⭐⭐⭐⭐⭐
Price : $10.99
Pages: 2

Many applications require the ability reproduce individ-ual


The Smart Card Life Cycle

Smart Card
Security Module
Y = g y mod n X, g, n
K = X y mod n Y
database with personalization
encrypted, card-specific data in plaintext
personalization data

card number


Figure 10.64 Schematic representation of a possible procedure for personalization using cryptograph-ically secured transmission of data and keys. In this special procedure, the keys for loading the data in encrypted form are negotiated in advance using a Diffie–Hellman key exchange. This eliminates the need to transmit a previously stored symmetric personalization key to the smart card in cleartext in a separate step. Only the cryptographically relevant processes are shown

correct sequence to the smart card and compares the responses received from the card with the responses accompanying the commands. If they do not match, the smart card is not behaving as expected and a personalization error must have occurred. With this method, it is not necessary to have a special security module for the tests in the personalization machine.



300 cards/h

no printing

50 cards/h

0 cards/h

0 kB 2 kB 4 kB 6 kB 8 kB 10 kB 12 kB 14 kB 16 kB 18 kB 20 kB
How It Works
Login account
Login Your Account
Add to cart
Add to Cart
Make payment
Document download
Download File
PageId: ELI30CF839
Uploaded by :
Page 1 Preview
many applications require the ability reproduce in
Sell Your Old Documents & Earn Wallet Balance