Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Contactless Smart Cards Standards, Security and Attacks?

Posted on 2007-04-09
2
Medium Priority
?
276 Views
Last Modified: 2010-04-11
As i am interested in Contactless Smart Cards so i have started my own study for information about contact less smart cards security. i have searched for books and articles on contactless smart cards but i cannot find any comprehensive text on contactless smart cards security and standards. Can you please guide where i can find text on contactless smart cards standards, security, attacks on contactless cards, research papers and other useful information on contact less smart cards.
Please guide me from beginning as i am not a technical person.

Regards
0
Comment
Question by:shairan
2 Comments
 
LVL 18

Expert Comment

by:PowerIT
ID: 18874914
The reason why you didn't find anything is because the technology is called RDID.
Start here for a general explanation and some references.
http://en.wikipedia.org/wiki/RFID
Then continue here: (AIM is the global Auto ID Manufacturers organisation)
http://www.aimglobal.org/technologies/rfid/
There's also an RFID journal:
http://www.rfidjournal.com/faq
And on security:
http://lasecwww.epfl.ch/~gavoine/rfid/

J.
0
 
LVL 25

Accepted Solution

by:
kode99 earned 750 total points
ID: 18885639
RFID is merely the transport mechanism used with the contactless version of smart cards.  Smart cards are more sophisticated than your typical RFID application.

Check out the wiki for some info as well as links to standards bodies and more,

http://en.wikipedia.org/wiki/Smart_card

This might be a good place to start to get a handle on the technology,
http://computer.howstuffworks.com/question332.htm

Industry links,
http://www.contactlessnews.com/
http://mifare.net/
http://www.cardtechnology.com/

Good article discussing security issues,  might get too technical but the intro is good
http://www.chi-publishing.com/samples/ISB0903HH.pdf

0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it'…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question