Our Online Store have the new products: RFID antenna board. Currently it can work with JC10M24R and JCOP4 card chips.
Compared with normal cards, the antenna board module has a smaller size and fixed holes, which is easy to integrate in the IOT(Internet Of Things) project.

Ensure data sent from an un-fake terminal

JavaCard Applet Development Related Questions and Answers.
Ruenie
Posts: 12
Joined: Tue Feb 16, 2016 10:02 pm
Points :139
Contact:

Ensure data sent from an un-fake terminal

Post by Ruenie » Tue Feb 07, 2017 10:08 pm

I am gonna send data from host application to java card and check if it's correct.
Which encryption mechanism should I implement to ensure that the data is sent from an un-fake host application.

User avatar
marjkbadboy
Posts: 33
Joined: Fri Jul 31, 2015 2:47 am
Points :217
Contact:

Re: Ensure data sent from an un-fake terminal

Post by marjkbadboy » Wed Feb 08, 2017 1:29 am

You can implement mutual authentication as GP defined.
It's hunting season!

tay00000
Posts: 161
Joined: Tue Sep 27, 2016 10:58 am
Points :2324
Contact:

Re: Ensure data sent from an un-fake terminal

Post by tay00000 » Wed Feb 08, 2017 9:06 pm

The problem with authenticating the host is that the host might be running a vulnerable or possibly infected host OSes and even with mutual bi-directional authentication, the host side's keys might be stolen.

That said, such protection with bi-directional encryption and authentication is better than none at all.

This boils down to what your application is used for. Ideally, it would be nice if a secure screen (E-Ink) at the very least were attached to the card so that the card can display authentication information for user to approve before allowing the entire secure session between host and card to proceed. This scheme is very expensive due to the need of using custom display cards and the firmware to be written in proprietary format (not JavaCard anymore).

For a more reasonable security, you are better off having an isolated host computer without any networking interfaces (remove the Bluetooth, WiFi and Ethernet chipset ...etc... from the physical Motherboard) or use a vanilla Raspberry Pi Zero attach to a USB smart card reader, USB keyboard and USB mouse via a USB hub and a HDMI HAT adapter for screen. With such an air-gap single board computer, the chances of getting infection is much lower as long as you don't attach storage devices (i.e. USB flash drives and Hard disk) except for the MicroSD card containing the Raspberry Pi OS image.

With the above setup, you can do bi-directional asymmetric or symmetric based encryption and authentication if you want.

Whatever that have been said above really depends on how much security and how sensitive your application is and the usage of appropriate security assurance measures and practices (i.e. OPSEC) to ensure that compromises are kept to the minimum.

Post Reply Previous topicNext topic

Who is online

Users browsing this forum: No registered users and 15 guests

JavaCard OS : Disclaimer