Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Hardware Hacking Privacy

Smart-Card Hacking? 32

W3bbo asks: "With the ever-increasing information being stored on so-called 'Smart-Cards', including credit cards with the chips, how do we know what data is read by stores when you hand over your plastic? Seaching for 'smart-card hacking' just turns up satelite TV piracy websites and virtually nothing for (sort-of) legitimate investigation to our cards. So what methods are available to hack smart-card chips and see what information about us our banks store on our cards?"
This discussion has been archived. No new comments can be posted.

Smart-Card Hacking?

Comments Filter:
  • by da5idnetlimit.com ( 410908 ) on Saturday June 18, 2005 @11:56AM (#12851204) Journal
    so have a few searches on this term
    http://www.kallipse.com/creaweb/galaad/carding.php [kallipse.com]

    Also there is an open source project devoted to reading cards and chips, don't remember the name right now...

    Was on slashdot, so have a check 8)
  • by fuzzybunny ( 112938 ) on Saturday June 18, 2005 @11:56AM (#12851205) Homepage Journal
    The best way to learn is to latch onto someone who really knows their stuff (which is what I did on a previous project.) If you don't have that luxury, start looking at vendor pages (Schlumberger, ActivCard, Siemens, Utimaco, Gemplus, etc.) and chipset manufacturers (Infineon, Sagem or Giesecke & Devrient for example.)

    Depending on how far down you want to dig (do you want to learn about applications? Circuit design? Interfaces? Security issues?) you should probably browse around related manufacturers' pages and related newsgroups. A good example would be looking at PKCS#11-related docs, Entrust implementation docs, the Javacard specifications, how Javacards differ from other implementations, docs on "Open Platform", types of card readers (class 1 through class 4, what is "middleware", how hardware key storage works, etc.)

    A lot of card-related documentation and information is strongly vendor-specific, poorly documented and, to be honest, largely irrelevant for someone who wants to learn about it in a not-too-hardcore manner.

    If you're professionally seriously interested, I recommend talking to one of the serious pros, such as Jerome Ajdenbaum [iteon.net] who really know their stuff. For starters, though, a quick google search on "smart card" +documentation turned up a number of good results, including from Microsoft [microsoft.com] (whose card interface for many manufacturers and variants is surprisingly well-written), ,a href="http://java.sun.com/products/javacard/refere nce/docs/">Java card docs from Sun, and the Open Card [opencard.org] platform.
    • Along with PKCS#11 and Javacard, you should be looking at all the ISO 7816 specifications for technical information.

      However, do any stores actually use the smartcard portion of the card? All I have seen is using the mag-strip on the back and nothing more (which is usually just your account number, expiration, and name on the card). So there is no "secret" information that is even being used on the card.

      Once you get into it you will realize that smartcards are not some magical device designed to invade p
      • by swillden ( 191260 ) * <shawn-ds@willden.org> on Saturday June 18, 2005 @01:05PM (#12851572) Journal

        Along with PKCS#11 and Javacard, you should be looking at all the ISO 7816 specifications for technical information.

        The ISO 7816 specs are generally not free. You buy them from your national standards body, which in the US is ANSI. It'll cost around $150-$200 to buy the whole set from ANSI.

        However, much of the content of the 7816 documents is replicated in the EMV specifications. EMV stands for Europay Mastercard Visa and is a consortium for establishing smart card banking standards, so if you're interested in looking at your bank card chip, that's the more relevant set of documents anyway. You can find all of the EMV documents on-line, free, at the EMVCo web site [emvco.com]. You may still have to acquire some of the 7816 specs (parts 3 and 4 are probably the most important), but the EMV docs contain most of what you need. Word of warning: be prepared to plow through a lot of material. Smart card technology has acquired a lot of complexity through 30 years of incremental enhancements.

      • Oh yeah? OH YEAH? Well, if you're going to provide actually _useful_ information, I might as well. Sigh. :-)

        One common implementation of the key store Cthefuture mentioned uses the concept of a fixed-size "private" store on the card to protect your private keys via some sort of applet (as on a Javacard) or similar application. A "smart card" is basically a tiny computer with an external power source--it provides a processor and storage on board.

        Your public keys will reside in a "public" store, typical
      • Well it's really not this clear cut. Basically, a smart card can store data (between a few bytes and a few megs) and process data (which is very handy for private keys and certificates). So you can't really tell what's going on in there. Maybe nothing, maybe close to nothing or maybe a whole bunch of stuff.

        To answer the main question, this data is usually protected anyway: if you don't have the right key, you will get nothing*.

        Regards,
        AIP

        * unless you're very smart and have access to a few million dollars
  • That the story below this one is "Security Breach Exposes 40M Credit Cards" ?

  • ...and virtually nothing for (sort-of) legitimate investigation to our cards...

    I think it's important to understand that there is no "sort-of" about it. We have every right to know what information is contained on the cards that we use. Why wouldn't we? What can there possibly be there that is none of our business?

    • Well, I can think of at least one example. GSM phones use SIMs (UICCs), which are a type of smartcard. These have a secret key on them, Ki, which is also present in the home network's authentication centre (AuC) - and nowhere else. A challenge and response mechanism is used to authenticate the SIM when it is used in a phone, and to create a session key (Kc) for air encryption. It is essential that no-one is able to determine Ki, since this would allow the SIM to be cloned, allowing fraud. I imagine similar
    • > What can there possibly be there that is none of our business?

      Your Homeland Security Threat Rating??? ;)
  • Have you tried calling your card company?

    Brett
  • by brejc8 ( 223089 ) * on Saturday June 18, 2005 @01:46PM (#12851787) Homepage Journal
    These break down to a few different kinds:
    Information leaking e.g. power analysis: observe the power consumption of a divide to determine what operations it is executing and what data it is working on. Usually these will only tell you the number of bits which are on in a particular stage. I found the ARM 6 gave a very clear signature of the result of the adder and could determine the number of on bits down to the nearest 2.
    Error introduction e.g. clock glitch attack: This is an asynchronous engineers favorite. Basically a method of inserting errors into the processor in a deterministic method. Say the processor stage calculating a compare operation is the worst case path, the attack inserts an early clock forcing the comparison to be incorrectly made. Place this in the "are the checksums correct" code. Usually though these are a little more difficult than that.
    Brute force with limited tries e.g. Flash charge pump: So to crack your card it only takes as many attempts as there are pin code combinations. To stop people from just trying out the 10,000 or so combinations the card remembers how many tries you had. Before it writes something to the flash it needs to drive up a charge pump. This is visible using power analysis and at this point you cut the power and try again.

    More interestingly why are these not investigated? Well because there is no money for it. The async community has been offering better methods but the companies who make the only get a tiny profit are not inclined to make them any better.
  • Circuit Cellar magazine [circuitcellar.com] has articles on smart cards, RFID, etc, now and then.
  • MUSCLE project (Score:3, Informative)

    by sgifford ( 9982 ) <sgifford@suspectclass.com> on Saturday June 18, 2005 @07:48PM (#12853469) Homepage Journal
    Information from the MUSCLE smartcard-on-Linux project be useful:

    http://www.linuxnet.com/ [linuxnet.com]

  • There may be a potential DMCA violation involved with doing this, especially if credit card company-issued smart cards contain proprietary copyrighted information on them. In any case, the threat of a lawsuit (whether it's valid or not) may be enough to silence any efforts to figure out what sorts of personally identifiable info is stored on these cards.

  • There was an article in the last phrack issue that dealt with precisely this, with specs on making a data sniffer for smartcards and what tools to use in the process. www.phrack.org, find it from there (the title was stylish with the word "cards" in the title, I can't give you a link as I'm at work).

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...