SECURED SMART CARD SIMULATION

Main Article Content

Zahraa Ali Jwad
Sarkout N. Abdulaah
Oday A.L.A Ridha

Abstract

Different methods of encryption that are widely used in smart card have been presented. Because of the usefulness and widespread application of Food Ration Card throughout our country, three models of designing and simulations are developed. A comparison between the different models is done. The first model is the Food Ration Card without using any security method. The second model is the Food Ration Card with using an AES algorithm as a security method. The third model is the Food Ration Card with using RSA method. All models are implemented and simulated using  BasicCard Development kit Environment. For the first model, a Compact BasicCard version ZC1.1 is used. While for the second and third models, a Professional BasicCard version ZC4.5 is used. From obtained results, we noticed that AES-method is faster than RSA and takes less memory size, but RSA is more secure
than AES, since it uses two different keys instead of one as in AES.

Article Details

How to Cite
“SECURED SMART CARD SIMULATION” (2012) Journal of Engineering, 18(04), pp. 459–471. doi:10.31026/j.eng.2012.04.07.
Section
Articles

How to Cite

“SECURED SMART CARD SIMULATION” (2012) Journal of Engineering, 18(04), pp. 459–471. doi:10.31026/j.eng.2012.04.07.

Publication Dates

References

Wenzhou L., ChangQing C., and Zhuo Z., 2010, “Fingerprint ID Cards and the Recognition System”, The 5th International Conference on Computer Science & Education.

Stefan M., Markus D., and Christoph G., 2010,“A Smartcard based approach for a secure energy management node architecture”, IEEE.

Daemen J. and Rijmen V., 1999, “AES Proposal:Rijndeal-Second Edition “

Everett D., 1993, “Smart Card Tutorial “

Guilfoyle T., March 2005, “The ZeitControl BasicCard Family”, ZeitControl CardSystem GmbH, Germany

Rankl W. and Effing W., 2003, “Smart Card Handbook-Third Edition”, Jhon Wiley& Sons, Ltd., Germany

Schneier B., 1996,”Applied Cryptography Algorithms and protocols- Second Edition”, Jhon Wiley& Sons

Similar Articles

You may also start an advanced similarity search for this article.