SlideShare a Scribd company logo
1 of 45
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
FROM SMART CARD TO 
TRUSTED PERSONAL DEVICE 
Challenges for future 
technology 
RESET Seminar - 3 April 2003 
Brussels
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
Challenges for future technology 
Integration in networked systems 
and environments 
Pieter Hartel (University Twente) 
Eduard de Jong (Sun Microsystems)
Over view 
What is a trusted device 
How can it be integrated in a networked 
society 
RESET IST-2001- 
39046
What is not a trusted device? 
A slave to the reader 
a flat PC 
RESET IST-2001- 
39046
What is a trusted device? 
Requirements 
Guards your privacy 
 Does what you want it to do 
 Refuses to do what others want 
Challenges 
 how to realise all three requirements 
 How to integrate the device into a networked 
RESET IST-2001- 
39046 
society
The device 
guards your privacy 
Offers a high level of tamper resistance 
Multiple levels of defences 
Small trusted computing base within the card 
Discloses nothing when communicating 
Zero knowledge protocols 
Observers 
RESET IST-2001- 
39046
The device does 
what you want it to do 
Certifiable 
Tool scalability 
Expense 
Interacts directly with the user 
Keyboard & display 
Biometrics 
RESET IST-2001- 
39046
The device refuses to do 
what others want 
Embeded in a larger trusted device 
Finread 
Puts the problem somewhere else 
Prevents pin re-use 
RESET IST-2001- 
39046
How to realise all three 
Can we 
Prove that all three are satisfied? 
Measure to what extent they are satisfied? 
Is there an underlying theory? 
RESET IST-2001- 
39046
AmI component that must be 
integrated into society 
Communication speed & protocols 
Self powered 
Form factor 
Backwards compatibility 
New application areas 
Not to throw the baby out with the bath 
water... 
RESET IST-2001- 
39046
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
FROM SMART CARD TO 
TRUSTED PERSONAL DEVICE 
RESET Seminar 
3 April 2003 
Brussels
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
Challenges for future technology 
Systems Management 
Dr. Ulrich BÜKER 
ORGA Systems GmbH 
RESET Workgroup Leader
Challenges 
Systems Management 
RESET IST-2001- 
39046 
on-card 
Operating Systems 
Development Tools 
System Integration 
Card accepting devices 
Card and Device Management 
off-card
Challenges 
Operating Systems 
Standard operating system features 
multi-application, multi-threading 
high-level memory management 
Smart Card specific OS features 
resource control management 
 deadlock prevention / detection 
 optimised resource usage 
Support of new communication models 
peer-to-peer 
TCP/IPv6 
RESET IST-2001- 
39046
Challenges 
Operating Systems 
Main Barriers 
variety of smart card hardware 
 hinders the development of more sophisticated 
operating systems and programming languages 
 enormous porting costs 
limited resources on smart card 
 difficult adaption of state of the art IT techniques 
RESET IST-2001- 
39046
Challenges 
Development Tools 
Expressive programming languages 
integrating features of general-purpose 
languages 
support of smart card specific idioms 
domain-specific languages 
Modelling and Specification 
considered in the design of programming 
languages 
program proofs 
RESET IST-2001- 
39046
Challenges 
Development Tools 
Main challenges 
improve security 
improve certification process 
Formal Methods on different levels 
formal modelling 
formal verification 
program verification 
RESET IST-2001- 
39046
Challenges 
System Integration 
Main challenges 
integration of smart cards into information 
systems 
 adaptation of software engineering results : 
middleware, integration tools 
management of smart cards and their 
content 
 smart cards as application servers 
 fundamental approach for defining the model 
RESET IST-2001- 
39046
Challenges 
System Integration 
Advanced smart card programmability 
and usage 
on-card and off-card frameworks 
 extensible 
 scalable 
dynamic management of card framework 
services 
middleware technologies 
 scenario and application independent 
RESET IST-2001- 
39046
Challenges 
Card Accepting Devices 
Physical properties 
incorporation into everyday objects 
 e.g. watch, ring 
secure CADs 
 prevention of Trojan horses when entering data 
 e.g. PIN, biometrics 
Data transmission 
wireless, secure channel between CAD and 
network 
high speed protocols to be supported 
RESET IST-2001- 
39046
Challenges 
Card / Device Management 
Standard architectures of CADs 
STIP, FinRead, GlobalPlatform 
common test suites needed 
security certification procedures 
Shared infrastructures between card 
and terminal 
less expensive 
increased trust 
management of different user credentials 
RESET IST-2001- 
39046
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
FROM SMART CARD TO 
TRUSTED PERSONAL DEVICE 
RESET Seminar 
3 April 2003 
Brussels
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
Challenges for Secure 
System On Chip & 
System On Card 
Jean-Paul THOMASSON 
STMicroelectronics
The Age of TOTAL ACCESS 
Giving customers what they want in an 
“Anytime, Anywhere World” 
The ages of “Reach and Push” are 
marketing legacy 
Direct dialogue between the customer 
and the producer. 
Five “Laws” approach. 
Smart Card: the perfect enabling 
technology for the Age of Total Access 
RESET IST-2001- 
39046
Five Laws (1) 
Moore’s Law: the Number of Transistors on a 
chip doubles every 18 to 24 months. 
Metcalfe’s Law: the value of the network 
increases by the square of the number of 
users. 
Gilder’s Law: the communications bandwidth 
is growing faster than computing power by 
doubling every year.It will continue to do so 
for the next twenty-five years. 
RESET IST-2001- 
39046
Five Laws (2) 
Law of Storage: Infinite storage for an 
Infinite Amount of Information. 
For the network revolution to progress, 
storage and memory performance with 
corresponding decreases in cost must 
expand at a rate faster than in Moore’s 
law. 
Software Law: there is No Law. 
Software is hard, it’s more about framing 
human activity than about technology. 
RESET IST-2001- 
39046
The Challenge for Smart Card 
RESET IST-2001- 
39046 
Rich 
Challenge 
Sec. SoC 
Reach 
Volume 
Features
System On a Chip definition 
in year 2005 
“On a single chip co-location of sense, 
compute,control,store,communicate and actuate 
capabilities” 
J. Borel 
Smart card IC’s are Secure System On Chip 
RESET IST-2001- 
39046
System On a Chip definition 
μP, DSP 
RESET IST-2001- 
39046 
LCD’s 
Sensors 
Antennas 
Keyboards 
Loudsp. 
Power 
Management 
Memories 
Data 
Acquisition 
Power 
Actuators 
Information 
Processing 
(Super-integration) 
Multifunction 
Peripheral 
Line
Developer requirements 
Developers require high density re-programmable NVM 
 High end products today have more than 300Kbyte ROM 
 ROM masking painful as: 
 Cycle time for prototypes = weeks 
 “Bug free” code more difficult with large system 
 Advanced systems specifications keep moving 
 Capability to download code “over the air” 
 Possibility to add new functions (longer card life) 
 Improved security (updated protections - safer card life) 
 Limited cards inventory 
 Few types inventory may cover product broad range 
 Programs may be downloaded at test or personalisation 
 Performances (speed & low power) 
RESET IST-2001- 
39046
The perfect NVM answer 
SRAM speed - DRAM / FLASH density 
Infinite retention – No fatigue 
Enough but not too much write energy 
 Resistant to various perturbation 
 Very low power 
No information “leakage” 
Simple standard CMOS process cost 
 Simply does not exist ! 
RESET IST-2001- 
39046
Economical side 
SMARTCARD MARKET 
Around 1% of semiconductor market 
 Cannot justify specific technology development 
 Today large density EEPROM are only used in smartcard 
Consumer type market 
 Medium-High volume / very low price 
 Industrial & reliable solution 
 Must use a standard & proven NVM process 
(volume on commodity products) 
RESET IST-2001- 
39046
Technology side 
Speed: FRAM, MRAM, PCM 
Density: FLASH, PCM 
Retention: EEPROM & FLASH (not yet proven for others) 
Cycling: MRAM, PCM 
Overhead: FRAM, MRAM 
Power: FRAM (destructive read!) 
Scalability: FLASH, PCM 
Volume production: EEPROM & FLASH 
Process cost: no HV in MRAM/FRAM/PCM but material? 
Process compatibility: 
 FRAM, MRAM, PCM can be added on standard CMOS 
 No need for special high voltage devices 
RESET IST-2001- 
39046
Enhancing performances 
MOS Performance and leakage for low 
power. 
Production of Non-classical CMOS 
CMOS Integration of new Memory material. 
Starting material beyond 300mm 
Mask-making & cost 
Coordinated design tools & simulators to 
address chip and assembly issues. 
RESET IST-2001- 
39046
Design difficult challenges 
(HW& SW) 
Productivity to avoid exponentially increasing 
design costs. Re-use. 
Power management. 
Interference: resource-efficient 
communication and synchronisation. 
System-level integration of heterogeneous 
technologies 
Error tolerance relaxing for cost reduction ? 
Development of SOC test methodologies 
including for Security.(DFT DF Secure T) 
RESET IST-2001- 
39046
Conclusion 
We need strong and consistent R&D 
programs in technology challenging domains: 
 architecture design and simulation 
 semiconductor & heterogeneous technologies 
RESET IST-2001- 
39046 
integration 
 embedded software 
 cost effective manufacturing 
 security development and testing 
To bring to the market the necessary 
Innovations that will restore the Industry 
Growth and Profitability.
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
FROM SMART CARD TO 
TRUSTED PERSONAL DEVICE 
RESET Seminar 
3 April 2003 
Brussels
R E S E T 
Roadmap for European research on 
Smartcard Technologies 
Challenges for future technology 
Smart Card Security 
Dr. Albert MÖDL 
Giesecke & Devrient GmbH
Challenges 
Smart Card Security 
SECURE semiconductors for smart cards 
Enhanced subsystem security 
Card OS / software with high security level 
Ubiquitous security through 
communication and networks protocols 
Reliable and secure interplay with card 
accepting devices 
Enhanced security for the overall system 
RESET IST-2001- 
39046
Challenges: Secure Semiconductors 
Resistance to invasive and non-invasive 
attacks 
 elaborate chip-architecture and design 
 glue logic (randomization of the layout) 
 bus scrambling (data are scrambled) 
 constant-current mode 
Tamper resistance 
 tamper-evident and removal-resistant coatings 
 tamper detection mechanisms (sensors & actors) 
 tamper response and zeroization circuitry 
RESET IST-2001- 
39046
Challenges: Secure Subsystems 
Secure card-embedded peripherals / 
subsystems 
 e.g. modules, displays, keyboards, sensors 
 secure packaging 
Tamper-resistant integration 
 secure interconnection 
Secured interfacing 
 security of internal bus for the various elements 
 security of contact or contactless communication 
RESET IST-2001- 
39046
Challenges: Secure OS / Software 
Operating Systems with increased security 
 secure multi-application OS 
 secure software updates or loading of applets 
Development tools 
 must be tailored to enhanced security concepts 
Secure implementation of advanced crypto 
algorithms 
Develop evaluation methods for security 
 (e. g. modify CC methodologies for re-configurable 
RESET IST-2001- 
39046 
architecture)
Challenges: Secure Communication 
Smart card communication protocols 
secured with high-end cryptography 
 high-performance and high-speed encryption and 
decryption processes 
 secure interoperability 
Secure smart cards integration in networks 
 enhanced security of smart cards in the Internet 
environment 
 end-to-end security 
 “fault-tolerant” protocols (accidental vs. induced faults) 
RESET IST-2001- 
39046
Challenges: Secure Interaction with 
Card Accepting Devices (CADs) 
Secure interconnection with ambient 
intelligent environments 
Secure man-machine interface 
Establish security and create trust for the 
CADs 
RESET IST-2001- 
39046
Challenges: Enhanced security for the 
overall smart card system 
Mutual interplay of the various security 
features of the smart card system 
 hardware-software co-design 
 operating system/protocols 
 applications/testability/evaluation 
Security along the complete chain 
 from semiconductor to card accepting device and 
background system 
Interdisciplinary collaboration necessary 
RESET IST-2001- 
39046

More Related Content

What's hot

Chapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain SpecificChapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain SpecificMoe Moe Myint
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTIRJET Journal
 
Unit 1 embedded systems and applications
Unit 1 embedded systems and applicationsUnit 1 embedded systems and applications
Unit 1 embedded systems and applicationsDr.YNM
 
Schematic and PCB Design Using Eagle
Schematic and PCB Design Using EagleSchematic and PCB Design Using Eagle
Schematic and PCB Design Using EagleMoe Moe Myint
 
Embedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - MtechEmbedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - Mtechsangeetha rakhi
 
Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationKaushik Gupta
 
Esd notes iae
Esd notes iaeEsd notes iae
Esd notes iaeMuru Gan
 
Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...journalBEEI
 
MATLAB Electronics Projects Research Topics
MATLAB Electronics Projects Research  TopicsMATLAB Electronics Projects Research  Topics
MATLAB Electronics Projects Research TopicsMatlab Simulation
 
Embedded system and development
Embedded system and developmentEmbedded system and development
Embedded system and developmentRajani Bhandari
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
Embedded systems- nanocdac
Embedded systems- nanocdacEmbedded systems- nanocdac
Embedded systems- nanocdacnanocdac
 
Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureSrikanth KS
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Trainingreport on embedded system
Trainingreport on embedded systemTrainingreport on embedded system
Trainingreport on embedded systemMukul Mohal
 
Chapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemChapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemMoe Moe Myint
 

What's hot (20)

Chapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain SpecificChapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain Specific
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 
Unit 1 embedded systems and applications
Unit 1 embedded systems and applicationsUnit 1 embedded systems and applications
Unit 1 embedded systems and applications
 
Schematic and PCB Design Using Eagle
Schematic and PCB Design Using EagleSchematic and PCB Design Using Eagle
Schematic and PCB Design Using Eagle
 
Report file on Embedded systems
Report file on Embedded systemsReport file on Embedded systems
Report file on Embedded systems
 
Embedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - MtechEmbedded systems - UNIT-1 - Mtech
Embedded systems - UNIT-1 - Mtech
 
Embedded system seminar
Embedded system seminarEmbedded system seminar
Embedded system seminar
 
Future Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper PresentationFuture Trends of Embedded Systems - Technical Paper Presentation
Future Trends of Embedded Systems - Technical Paper Presentation
 
Esd notes iae
Esd notes iaeEsd notes iae
Esd notes iae
 
Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...Control and indicating equipment communicating via the peripheral component i...
Control and indicating equipment communicating via the peripheral component i...
 
MATLAB Electronics Projects Research Topics
MATLAB Electronics Projects Research  TopicsMATLAB Electronics Projects Research  Topics
MATLAB Electronics Projects Research Topics
 
Embedded system and development
Embedded system and developmentEmbedded system and development
Embedded system and development
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
Embedded systems- nanocdac
Embedded systems- nanocdacEmbedded systems- nanocdac
Embedded systems- nanocdac
 
Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the Future
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Trainingreport on embedded system
Trainingreport on embedded systemTrainingreport on embedded system
Trainingreport on embedded system
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Chapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded SystemChapter 3 Charateristics and Quality Attributes of Embedded System
Chapter 3 Charateristics and Quality Attributes of Embedded System
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 

Similar to Challenges for future technology - RESET

From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFilipe Mello
 
Iaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd Iaetsd
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesStephane Potier
 
Data Acquisition Systems | Digilogic Systems
Data Acquisition Systems | Digilogic SystemsData Acquisition Systems | Digilogic Systems
Data Acquisition Systems | Digilogic SystemsDigilogic Systems
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
 
Casp report
Casp reportCasp report
Casp reportqudhuqdh
 
IR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxIR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxSaikiranBasuthkar
 
1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx
1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx
1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptxrealme6igamerr
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Emb Sys Rev Ver1
Emb Sys   Rev Ver1Emb Sys   Rev Ver1
Emb Sys Rev Ver1ncct
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
Report on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringReport on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringMohammed Irshad S K
 
Nt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperNt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperJoanna Paulsen
 
Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Agora Group
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowiaemedu
 

Similar to Challenges for future technology - RESET (20)

From Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESETFrom Smart Card to Trusted Personal Device - RESET
From Smart Card to Trusted Personal Device - RESET
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Iaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrial
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 
Data Acquisition Systems | Digilogic Systems
Data Acquisition Systems | Digilogic SystemsData Acquisition Systems | Digilogic Systems
Data Acquisition Systems | Digilogic Systems
 
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей МартыненкоМалоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
 
Casp report
Casp reportCasp report
Casp report
 
IR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docxIR and Metal senosors Based Product Sorting.docx
IR and Metal senosors Based Product Sorting.docx
 
1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx
1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx
1GG21EChhhshsjsjsjsjsjsjsjsjjsjs415.pptx
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Emb Sys Rev Ver1
Emb Sys   Rev Ver1Emb Sys   Rev Ver1
Emb Sys Rev Ver1
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Report on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringReport on Enviorment Panel Monitoring
Report on Enviorment Panel Monitoring
 
Chapter_01.pptx
Chapter_01.pptxChapter_01.pptx
Chapter_01.pptx
 
Nt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis PaperNt1330 Unit 1 Problem Analysis Paper
Nt1330 Unit 1 Problem Analysis Paper
 
Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011Apc by Schneider - 27mai2011
Apc by Schneider - 27mai2011
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embeddedsystem
EmbeddedsystemEmbeddedsystem
Embeddedsystem
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
1678 1683
1678 16831678 1683
1678 1683
 

More from Filipe Mello

Analise de Ponto de Equilibrio
Analise de Ponto de EquilibrioAnalise de Ponto de Equilibrio
Analise de Ponto de EquilibrioFilipe Mello
 
Tendencias do Mercado Consumidor
Tendencias do Mercado ConsumidorTendencias do Mercado Consumidor
Tendencias do Mercado ConsumidorFilipe Mello
 
Reservas de Fosfatos e Fertilizantes
Reservas de Fosfatos e FertilizantesReservas de Fosfatos e Fertilizantes
Reservas de Fosfatos e FertilizantesFilipe Mello
 
Midia Kit - Casa e Jardim
Midia Kit - Casa e JardimMidia Kit - Casa e Jardim
Midia Kit - Casa e JardimFilipe Mello
 
Pesquisa de Mercado em Marketing
Pesquisa de Mercado em MarketingPesquisa de Mercado em Marketing
Pesquisa de Mercado em MarketingFilipe Mello
 
Sistemas de distribuicao de cosmeticos
Sistemas de distribuicao de cosmeticosSistemas de distribuicao de cosmeticos
Sistemas de distribuicao de cosmeticosFilipe Mello
 
Defesa do jornal bom dia
Defesa do jornal bom diaDefesa do jornal bom dia
Defesa do jornal bom diaFilipe Mello
 
Aula responsabilidade social
Aula responsabilidade socialAula responsabilidade social
Aula responsabilidade socialFilipe Mello
 
Estrategias Souza Cruz
Estrategias Souza CruzEstrategias Souza Cruz
Estrategias Souza CruzFilipe Mello
 
Nutricao na atencao basica
Nutricao na atencao basicaNutricao na atencao basica
Nutricao na atencao basicaFilipe Mello
 
Canais de Distribuicao
Canais de DistribuicaoCanais de Distribuicao
Canais de DistribuicaoFilipe Mello
 
Turismo de natureza
Turismo de naturezaTurismo de natureza
Turismo de naturezaFilipe Mello
 
Gastronomia e Vinhos - Business
Gastronomia e Vinhos - BusinessGastronomia e Vinhos - Business
Gastronomia e Vinhos - BusinessFilipe Mello
 
Inovacoes e Tendencias na Saude
Inovacoes e Tendencias na SaudeInovacoes e Tendencias na Saude
Inovacoes e Tendencias na SaudeFilipe Mello
 
IBRC - Pesquisa qualidade no atendimento
IBRC - Pesquisa qualidade no atendimentoIBRC - Pesquisa qualidade no atendimento
IBRC - Pesquisa qualidade no atendimentoFilipe Mello
 
Seminario Brasil 2020
Seminario Brasil 2020Seminario Brasil 2020
Seminario Brasil 2020Filipe Mello
 
BNDES - Visao 2020
BNDES - Visao 2020BNDES - Visao 2020
BNDES - Visao 2020Filipe Mello
 
Trade marketing no autoservico
Trade marketing no autoservicoTrade marketing no autoservico
Trade marketing no autoservicoFilipe Mello
 
APAS - painel de_mercado_e_consumo_2007
APAS - painel de_mercado_e_consumo_2007APAS - painel de_mercado_e_consumo_2007
APAS - painel de_mercado_e_consumo_2007Filipe Mello
 

More from Filipe Mello (20)

Analise de Ponto de Equilibrio
Analise de Ponto de EquilibrioAnalise de Ponto de Equilibrio
Analise de Ponto de Equilibrio
 
Tendencias do Mercado Consumidor
Tendencias do Mercado ConsumidorTendencias do Mercado Consumidor
Tendencias do Mercado Consumidor
 
Reservas de Fosfatos e Fertilizantes
Reservas de Fosfatos e FertilizantesReservas de Fosfatos e Fertilizantes
Reservas de Fosfatos e Fertilizantes
 
Midia Kit - Casa e Jardim
Midia Kit - Casa e JardimMidia Kit - Casa e Jardim
Midia Kit - Casa e Jardim
 
Pesquisa de Mercado em Marketing
Pesquisa de Mercado em MarketingPesquisa de Mercado em Marketing
Pesquisa de Mercado em Marketing
 
Sistemas de distribuicao de cosmeticos
Sistemas de distribuicao de cosmeticosSistemas de distribuicao de cosmeticos
Sistemas de distribuicao de cosmeticos
 
Forum de Varejo
Forum de VarejoForum de Varejo
Forum de Varejo
 
Defesa do jornal bom dia
Defesa do jornal bom diaDefesa do jornal bom dia
Defesa do jornal bom dia
 
Aula responsabilidade social
Aula responsabilidade socialAula responsabilidade social
Aula responsabilidade social
 
Estrategias Souza Cruz
Estrategias Souza CruzEstrategias Souza Cruz
Estrategias Souza Cruz
 
Nutricao na atencao basica
Nutricao na atencao basicaNutricao na atencao basica
Nutricao na atencao basica
 
Canais de Distribuicao
Canais de DistribuicaoCanais de Distribuicao
Canais de Distribuicao
 
Turismo de natureza
Turismo de naturezaTurismo de natureza
Turismo de natureza
 
Gastronomia e Vinhos - Business
Gastronomia e Vinhos - BusinessGastronomia e Vinhos - Business
Gastronomia e Vinhos - Business
 
Inovacoes e Tendencias na Saude
Inovacoes e Tendencias na SaudeInovacoes e Tendencias na Saude
Inovacoes e Tendencias na Saude
 
IBRC - Pesquisa qualidade no atendimento
IBRC - Pesquisa qualidade no atendimentoIBRC - Pesquisa qualidade no atendimento
IBRC - Pesquisa qualidade no atendimento
 
Seminario Brasil 2020
Seminario Brasil 2020Seminario Brasil 2020
Seminario Brasil 2020
 
BNDES - Visao 2020
BNDES - Visao 2020BNDES - Visao 2020
BNDES - Visao 2020
 
Trade marketing no autoservico
Trade marketing no autoservicoTrade marketing no autoservico
Trade marketing no autoservico
 
APAS - painel de_mercado_e_consumo_2007
APAS - painel de_mercado_e_consumo_2007APAS - painel de_mercado_e_consumo_2007
APAS - painel de_mercado_e_consumo_2007
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Challenges for future technology - RESET

  • 1. R E S E T Roadmap for European research on Smartcard Technologies FROM SMART CARD TO TRUSTED PERSONAL DEVICE Challenges for future technology RESET Seminar - 3 April 2003 Brussels
  • 2. R E S E T Roadmap for European research on Smartcard Technologies Challenges for future technology Integration in networked systems and environments Pieter Hartel (University Twente) Eduard de Jong (Sun Microsystems)
  • 3. Over view What is a trusted device How can it be integrated in a networked society RESET IST-2001- 39046
  • 4. What is not a trusted device? A slave to the reader a flat PC RESET IST-2001- 39046
  • 5. What is a trusted device? Requirements Guards your privacy  Does what you want it to do  Refuses to do what others want Challenges  how to realise all three requirements  How to integrate the device into a networked RESET IST-2001- 39046 society
  • 6. The device guards your privacy Offers a high level of tamper resistance Multiple levels of defences Small trusted computing base within the card Discloses nothing when communicating Zero knowledge protocols Observers RESET IST-2001- 39046
  • 7. The device does what you want it to do Certifiable Tool scalability Expense Interacts directly with the user Keyboard & display Biometrics RESET IST-2001- 39046
  • 8. The device refuses to do what others want Embeded in a larger trusted device Finread Puts the problem somewhere else Prevents pin re-use RESET IST-2001- 39046
  • 9. How to realise all three Can we Prove that all three are satisfied? Measure to what extent they are satisfied? Is there an underlying theory? RESET IST-2001- 39046
  • 10. AmI component that must be integrated into society Communication speed & protocols Self powered Form factor Backwards compatibility New application areas Not to throw the baby out with the bath water... RESET IST-2001- 39046
  • 11. R E S E T Roadmap for European research on Smartcard Technologies FROM SMART CARD TO TRUSTED PERSONAL DEVICE RESET Seminar 3 April 2003 Brussels
  • 12. R E S E T Roadmap for European research on Smartcard Technologies Challenges for future technology Systems Management Dr. Ulrich BÜKER ORGA Systems GmbH RESET Workgroup Leader
  • 13. Challenges Systems Management RESET IST-2001- 39046 on-card Operating Systems Development Tools System Integration Card accepting devices Card and Device Management off-card
  • 14. Challenges Operating Systems Standard operating system features multi-application, multi-threading high-level memory management Smart Card specific OS features resource control management  deadlock prevention / detection  optimised resource usage Support of new communication models peer-to-peer TCP/IPv6 RESET IST-2001- 39046
  • 15. Challenges Operating Systems Main Barriers variety of smart card hardware  hinders the development of more sophisticated operating systems and programming languages  enormous porting costs limited resources on smart card  difficult adaption of state of the art IT techniques RESET IST-2001- 39046
  • 16. Challenges Development Tools Expressive programming languages integrating features of general-purpose languages support of smart card specific idioms domain-specific languages Modelling and Specification considered in the design of programming languages program proofs RESET IST-2001- 39046
  • 17. Challenges Development Tools Main challenges improve security improve certification process Formal Methods on different levels formal modelling formal verification program verification RESET IST-2001- 39046
  • 18. Challenges System Integration Main challenges integration of smart cards into information systems  adaptation of software engineering results : middleware, integration tools management of smart cards and their content  smart cards as application servers  fundamental approach for defining the model RESET IST-2001- 39046
  • 19. Challenges System Integration Advanced smart card programmability and usage on-card and off-card frameworks  extensible  scalable dynamic management of card framework services middleware technologies  scenario and application independent RESET IST-2001- 39046
  • 20. Challenges Card Accepting Devices Physical properties incorporation into everyday objects  e.g. watch, ring secure CADs  prevention of Trojan horses when entering data  e.g. PIN, biometrics Data transmission wireless, secure channel between CAD and network high speed protocols to be supported RESET IST-2001- 39046
  • 21. Challenges Card / Device Management Standard architectures of CADs STIP, FinRead, GlobalPlatform common test suites needed security certification procedures Shared infrastructures between card and terminal less expensive increased trust management of different user credentials RESET IST-2001- 39046
  • 22. R E S E T Roadmap for European research on Smartcard Technologies FROM SMART CARD TO TRUSTED PERSONAL DEVICE RESET Seminar 3 April 2003 Brussels
  • 23. R E S E T Roadmap for European research on Smartcard Technologies Challenges for Secure System On Chip & System On Card Jean-Paul THOMASSON STMicroelectronics
  • 24. The Age of TOTAL ACCESS Giving customers what they want in an “Anytime, Anywhere World” The ages of “Reach and Push” are marketing legacy Direct dialogue between the customer and the producer. Five “Laws” approach. Smart Card: the perfect enabling technology for the Age of Total Access RESET IST-2001- 39046
  • 25. Five Laws (1) Moore’s Law: the Number of Transistors on a chip doubles every 18 to 24 months. Metcalfe’s Law: the value of the network increases by the square of the number of users. Gilder’s Law: the communications bandwidth is growing faster than computing power by doubling every year.It will continue to do so for the next twenty-five years. RESET IST-2001- 39046
  • 26. Five Laws (2) Law of Storage: Infinite storage for an Infinite Amount of Information. For the network revolution to progress, storage and memory performance with corresponding decreases in cost must expand at a rate faster than in Moore’s law. Software Law: there is No Law. Software is hard, it’s more about framing human activity than about technology. RESET IST-2001- 39046
  • 27. The Challenge for Smart Card RESET IST-2001- 39046 Rich Challenge Sec. SoC Reach Volume Features
  • 28. System On a Chip definition in year 2005 “On a single chip co-location of sense, compute,control,store,communicate and actuate capabilities” J. Borel Smart card IC’s are Secure System On Chip RESET IST-2001- 39046
  • 29. System On a Chip definition μP, DSP RESET IST-2001- 39046 LCD’s Sensors Antennas Keyboards Loudsp. Power Management Memories Data Acquisition Power Actuators Information Processing (Super-integration) Multifunction Peripheral Line
  • 30. Developer requirements Developers require high density re-programmable NVM  High end products today have more than 300Kbyte ROM  ROM masking painful as:  Cycle time for prototypes = weeks  “Bug free” code more difficult with large system  Advanced systems specifications keep moving  Capability to download code “over the air”  Possibility to add new functions (longer card life)  Improved security (updated protections - safer card life)  Limited cards inventory  Few types inventory may cover product broad range  Programs may be downloaded at test or personalisation  Performances (speed & low power) RESET IST-2001- 39046
  • 31. The perfect NVM answer SRAM speed - DRAM / FLASH density Infinite retention – No fatigue Enough but not too much write energy  Resistant to various perturbation  Very low power No information “leakage” Simple standard CMOS process cost  Simply does not exist ! RESET IST-2001- 39046
  • 32. Economical side SMARTCARD MARKET Around 1% of semiconductor market  Cannot justify specific technology development  Today large density EEPROM are only used in smartcard Consumer type market  Medium-High volume / very low price  Industrial & reliable solution  Must use a standard & proven NVM process (volume on commodity products) RESET IST-2001- 39046
  • 33. Technology side Speed: FRAM, MRAM, PCM Density: FLASH, PCM Retention: EEPROM & FLASH (not yet proven for others) Cycling: MRAM, PCM Overhead: FRAM, MRAM Power: FRAM (destructive read!) Scalability: FLASH, PCM Volume production: EEPROM & FLASH Process cost: no HV in MRAM/FRAM/PCM but material? Process compatibility:  FRAM, MRAM, PCM can be added on standard CMOS  No need for special high voltage devices RESET IST-2001- 39046
  • 34. Enhancing performances MOS Performance and leakage for low power. Production of Non-classical CMOS CMOS Integration of new Memory material. Starting material beyond 300mm Mask-making & cost Coordinated design tools & simulators to address chip and assembly issues. RESET IST-2001- 39046
  • 35. Design difficult challenges (HW& SW) Productivity to avoid exponentially increasing design costs. Re-use. Power management. Interference: resource-efficient communication and synchronisation. System-level integration of heterogeneous technologies Error tolerance relaxing for cost reduction ? Development of SOC test methodologies including for Security.(DFT DF Secure T) RESET IST-2001- 39046
  • 36. Conclusion We need strong and consistent R&D programs in technology challenging domains:  architecture design and simulation  semiconductor & heterogeneous technologies RESET IST-2001- 39046 integration  embedded software  cost effective manufacturing  security development and testing To bring to the market the necessary Innovations that will restore the Industry Growth and Profitability.
  • 37. R E S E T Roadmap for European research on Smartcard Technologies FROM SMART CARD TO TRUSTED PERSONAL DEVICE RESET Seminar 3 April 2003 Brussels
  • 38. R E S E T Roadmap for European research on Smartcard Technologies Challenges for future technology Smart Card Security Dr. Albert MÖDL Giesecke & Devrient GmbH
  • 39. Challenges Smart Card Security SECURE semiconductors for smart cards Enhanced subsystem security Card OS / software with high security level Ubiquitous security through communication and networks protocols Reliable and secure interplay with card accepting devices Enhanced security for the overall system RESET IST-2001- 39046
  • 40. Challenges: Secure Semiconductors Resistance to invasive and non-invasive attacks  elaborate chip-architecture and design  glue logic (randomization of the layout)  bus scrambling (data are scrambled)  constant-current mode Tamper resistance  tamper-evident and removal-resistant coatings  tamper detection mechanisms (sensors & actors)  tamper response and zeroization circuitry RESET IST-2001- 39046
  • 41. Challenges: Secure Subsystems Secure card-embedded peripherals / subsystems  e.g. modules, displays, keyboards, sensors  secure packaging Tamper-resistant integration  secure interconnection Secured interfacing  security of internal bus for the various elements  security of contact or contactless communication RESET IST-2001- 39046
  • 42. Challenges: Secure OS / Software Operating Systems with increased security  secure multi-application OS  secure software updates or loading of applets Development tools  must be tailored to enhanced security concepts Secure implementation of advanced crypto algorithms Develop evaluation methods for security  (e. g. modify CC methodologies for re-configurable RESET IST-2001- 39046 architecture)
  • 43. Challenges: Secure Communication Smart card communication protocols secured with high-end cryptography  high-performance and high-speed encryption and decryption processes  secure interoperability Secure smart cards integration in networks  enhanced security of smart cards in the Internet environment  end-to-end security  “fault-tolerant” protocols (accidental vs. induced faults) RESET IST-2001- 39046
  • 44. Challenges: Secure Interaction with Card Accepting Devices (CADs) Secure interconnection with ambient intelligent environments Secure man-machine interface Establish security and create trust for the CADs RESET IST-2001- 39046
  • 45. Challenges: Enhanced security for the overall smart card system Mutual interplay of the various security features of the smart card system  hardware-software co-design  operating system/protocols  applications/testability/evaluation Security along the complete chain  from semiconductor to card accepting device and background system Interdisciplinary collaboration necessary RESET IST-2001- 39046