
Smart Cards Lab COMPGA12 University College London
2 Structure of the Smart Cards Lab
Students may skip some parts or do them in a different order.
• Section 4: Software Setup.
• Section 7: Smart card commands ABC.
• Section 8: How to identify smart card products and individual smart
cards by ATR and UID, anonymity issues. Anti-collision mechanisms.
• Section 11: Exploring an electronic passport.
• Section 12: Exploring RFID Memory Cards, Oyster Cards, Building
Passes etc.
• Section 14: Exploring GSM SIM Cards.
• Section 16: Exploring Magnetic Stripe Cards.
• Section 15: Exploring Chip and PIN cards.
• Section 17: Smart card development with C++.
• Section 18 Example of a timing Attack Project.
3 Expected Learning Outcomes
1. Understand security protocols used in real-life products.
2. Be able to develop arbitrary applications on a PC which can commu-
nicate with arbitrary smart cards.
3. Encourage students to do further research on security of smart card
products.
4. Have fun.
c
Nicolas T. Courtois 2009-10
Comentarios a estos manuales