Skip to main content

Cryptographic Protection of Personal Data Cards

  • Conference paper
Advances in Cryptology

Abstract

Plastic cards for different types of stored data are in wide use at present. Examples are credit cards and cards bearing access control information for automatic teller machines. More powerful devices with non-volatile read/write memory of several kilobytes, possibly with some intelligence, (Personal Data Cards), open new fields of applications in banking, administration, health care and communications.

If sensitive data is stored on such cards, protection of this data and authentication of the authorized user becomes crucial. This paper describes a method for user verification and selective record protection in a network of terminals and one or more trusted Authentication Servers. The method is based on Single Key and/or Public Key Cryptography in conjunction with personal feature recognition (such as fingerprints) and selective key distribution. All the system information that needs secrecy protection is one key in the Authentication Server(s). The reference pattern for the feature recognition is stored on the card in encrypted form. The Authentication Server(s) can be kept very simple and inexpensive since no long-term data storage is required. As no user specific information remains permanently in the terminals, full user mobility is assured.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Nilson Report, Issue 257, April 1981.

    Google Scholar 

  2. Meyer, C.H., Matyas, S.M., “Some Cryptographic Principles of Authentication in Electronic Funds Transfer Systems”, Proceedings of the Seventh Data Communications Symposium, ACM and IEEE, 1981, pp. 73–88.

    Google Scholar 

  3. The Memory Card - Applications, Markets, Opportunities“, Battelle Study, August 1981.

    Google Scholar 

  4. Data Encryption Standard“, National Bureau of Standards, Federal Information Processing Standard (FIPS) Publication No. 46, Jan. 1977.

    Google Scholar 

  5. Lagger, H., Mueller-Schloer, C., Unterberger, H., “Security Aspects of Computer Controlled Communication Systems”, (in German), Elektronische Rechenanlagen, 22 (1980), 6, pp. 276–280.

    Google Scholar 

  6. Hellman, M.E., “The Mathematics of Public Key Cryptography”, Scientific American, Vol. 241, No. 2, August 1979.

    Google Scholar 

  7. Rivest, R.A., Shamir, A., Adleman, L., “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”, Communications of the ACM, 21 (1978), 2, pp. 120–126.

    Article  Google Scholar 

  8. Rivest, R.A., “A Description of a Single-Chip Implementation of the RSA Cipher”, Lambda, 1 (1980), 3, pp. 14–18.

    Google Scholar 

  9. Mueller-Schloer, C., Wagner, N.R., “The Implementation of a Cryptography-Based Secure Office System”, Proceeding of the 1982 National Computer Conference, Houston, Texas, pp. 487–492.

    Google Scholar 

  10. Wagner, N.R., “Practical Approaches to Secure Computer Systems“, Technical Report UH-CS-81–3, Computer Science Department, University of Houston, Texas, April 1981.

    Google Scholar 

  11. Needham, R.M., Schroeder, M.D., “Using Encryption for Authentication in Large Networks of Computers”, Communications of the ACM, 21 (1978), 12, pp. 993–999.

    Article  Google Scholar 

  12. Denning, D.E., Sacco, G.M., “Time Stamps in Key Distribution Protocols”, Communications of the ACM, 24 (1981), 8, pp. 533–536.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1983 Springer Science+Business Media New York

About this paper

Cite this paper

Mueller-Schloer, C., Wagner, N.R. (1983). Cryptographic Protection of Personal Data Cards. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0602-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-1-4757-0602-4_21

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-0604-8

  • Online ISBN: 978-1-4757-0602-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics