HID_wp_smartcardAC - Security Considerations Smart Cards...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
www.hidcorp.com © 2005 HID Corporation. All rights reserved. 1 Smart Cards for Access Control Advantages and Technology Choices Introduction Security managers have never had more options for access control cards and other badging and credentialing applications. Magnetic stripe, Wiegand and proximity technology all remain popular and effective. One new technology many security and IT managers are evaluating is contactless smart cards. Just as proximity technology brought advantages over Wiegand card technology 20 years ago, contactless smart card technology today is bringing new advantages over proximity for physical access control as well as other applications. The objective of this white paper is to discuss smart card technology in an access control context, present its advantages, and discuss implementation considerations. BeneFts of Contactless Smart Cards for Access Control Whether you are installing a new or expanding an existing system, or undertaking a major upgrade, there are several considerations for using contactless smart cards instead of proximity or other access control card technologies. Following are the most important bene±ts of contactless smart cards. 1. Contactless smart cards achieve a higher security level of the credential and the overall access control system. Contactless smart card technology is optimized to provide highly-secure devices by using cryptography, encryption and the internal computing power of the smart chip. Since the ISO/IEC standards do not address security and authentication, this capability must be examined speci±c to each supplier. For example, access control data in the card may be protected using 64-bit diversi±ed security keys based on a unique card serial number. This security can be further customized by the end-user with a card programmer. The reader never transmits this unique card serial number to the control panel, because it is used exclusively for key diversi±cation and to prevent data collisions when reading several cards at the same time. RF data transmission between the cards and readers is encrypted using a secure algorithm so that with certain contactless technology, the transaction between the card and reader cannot be “sniffed” and replayed to a reader. In addition, the cards and readers authenticate each other using a symmetrical key-based algorithm. For even higher security, card data may also be protected with DES or triple-DES encryption. By using diversi±ed unique keys and industry standard encryption techniques, the risk of compromised data or duplicated cards is reduced. Even if an unauthorized person obtains a reader, without the keys the reader will not authenticate with the card and data will not be transmitted. These security measures are not implemented in proximity cards, giving contactless smart cards
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

HID_wp_smartcardAC - Security Considerations Smart Cards...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online