Solved

Contactless Smart Cards Standards, Security and Attacks?

Posted on 2007-04-09
2
265 Views
Last Modified: 2010-04-11
As i am interested in Contactless Smart Cards so i have started my own study for information about contact less smart cards security. i have searched for books and articles on contactless smart cards but i cannot find any comprehensive text on contactless smart cards security and standards. Can you please guide where i can find text on contactless smart cards standards, security, attacks on contactless cards, research papers and other useful information on contact less smart cards.
Please guide me from beginning as i am not a technical person.

Regards
0
Comment
Question by:shairan
2 Comments
 
LVL 18

Expert Comment

by:PowerIT
Comment Utility
The reason why you didn't find anything is because the technology is called RDID.
Start here for a general explanation and some references.
http://en.wikipedia.org/wiki/RFID
Then continue here: (AIM is the global Auto ID Manufacturers organisation)
http://www.aimglobal.org/technologies/rfid/
There's also an RFID journal:
http://www.rfidjournal.com/faq
And on security:
http://lasecwww.epfl.ch/~gavoine/rfid/

J.
0
 
LVL 25

Accepted Solution

by:
kode99 earned 250 total points
Comment Utility
RFID is merely the transport mechanism used with the contactless version of smart cards.  Smart cards are more sophisticated than your typical RFID application.

Check out the wiki for some info as well as links to standards bodies and more,

http://en.wikipedia.org/wiki/Smart_card

This might be a good place to start to get a handle on the technology,
http://computer.howstuffworks.com/question332.htm

Industry links,
http://www.contactlessnews.com/
http://mifare.net/
http://www.cardtechnology.com/

Good article discussing security issues,  might get too technical but the intro is good
http://www.chi-publishing.com/samples/ISB0903HH.pdf

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now