JCAlgTest: Robust identification metadata for certified smartcards

Warning

This publication doesn't include Institute of Computer Science. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

ŠVENDA Petr KVAŠŇOVSKÝ Rudolf NAGY Imrich DUFKA Antonín

Year of publication 2022
Type Article in Proceedings
Conference Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022)
MU Faculty or unit

Faculty of Informatics

Citation
Web Odkaz na autorský preprint
Doi http://dx.doi.org/10.5220/0011294000003283
Keywords smartcards javacard performance cryptography
Description The certification of cryptographic smartcards under the Common Criteria or NIST FIPS140-2 is a well-established process, during which an evaluation facility validates the manufacturer's claims and issues a product certificate. The tested card is usually identified by its name, type, ATR, and Card Production Life Cycle (CPLC) data. While sufficient to pair the purchased card to its original certificate when bought from a trustworthy seller, such static metadata stored on the card can easily be manipulated. We extend the currently used card identification with a more descriptive set of metadata extracted from supported functionality, performance profiling, and properties of generated cryptographic keys. All of this information can be obtained directly by the evaluation facility, appended to the certificate, and later verified by the end-user with no need for any special knowledge or equipment, resulting in a better assurance about the purchased product. We developed a suite of open tools for the extraction of such characteristics and collected results for a set of more than 100 different smartcards. The database, openly available, demonstrates the significant variability in the measured properties and allows us to estimate the trends in support of different cryptographic algorithms as provided by the JavaCard platform.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info