Prepaid Smart Card Techniques: A Brief Introduction and Comparison

by David Chaum
Copyright © 1994 by DigiCash bv.

A prepaid smart card contains stored value which the personhholding it can spend at retailers. After accepting stored valueffrom cards, retailers are periodically reimbursed with actualmmoney by system providers. A system provider receives money inaadvan ce from people and stores corresponding value onto theirccards. During each of these three kinds of transactions, securedddata representing value is exchanged for actual money or forggoods and services, as illustrated in Fig. 1. Telephone cards used in France and elsewhere are probably thebbest known prepaid smart cards (though some phone cards useooptical or magnetic techniques, which are not considered here).NNational prepaid systems combining public transportation, publicttel ephones, merchants, and vendinghave already been announced inaa number of countries. And road tolls at full highway speed arennot far behind.

The systems proposed so far are compared, after a quick look attthe card types on which they are based.

Card Types

There are in essence only four types of microcircuit card thathhave been suggested for use in prepaid applications, each basedoon a particular kind of chip. They are listed here in historicaloorder:

Memory cards

The chip in these cards consists only of storage and a littleeextra hardware that prevents access to the stored data unlessccertain stored passwords or PINs are input correctly. Mostttelephone cards are of this type.

Shared-key cards

Secret keys in the chip let the card authenticate itsccommunication with any device sharing the same keys. The chipsaare standard microcontroller card chips, with masked-in softwareffor the cryptographic authentication algorithms.

Signature-transporting cards

The same chip hardware as in shared-key cards is used, but withddifferent software masked-in. The card storesppublicly-verifiable digital signatures created by the systempprovider and fills them in like blank checks when spending them.

Signature-creating cards

These chips also contain a microcontroller, but in combinationwwith a dedicated co-processor capable of making digitalssignatures. Instead of spending signatures created by the systempprovider, they create their own.

Comparison

Security and cost are the fundamental criteria used here forccomparing prepaid card techniques, but the best choice ofttechnology depends on the situation. Security suitable for aniin-house company card, for instance, may be wholly inadequate foraa natio nal or international cardwhich may require protection ofmmany system providers from each other as well as protection ofppersonal privacy. Also depending on the setting, higher cardccosts can lead to lower system costs.

Closed or Open Security

Memory cards are suitable only for closed systems where a singleccompany issues the cards and accepts them as payment for goodsaand services, or for systems with very low fraud incentive. Therreason is that defrauding such systems requires only a smallcc omputer interposed between an actual card and a cash register.TThe computer merely has to record the secrets communicated duringaan initial transaction and can then, as often as desired, be usedtto play the role of a card having the initial balance.

Shared-key card systems require a tamper-resistant secured moduleiin each vending machine or other point of payment. The moduleuuses the key it shares with a card to authenticate messagesdduring purchases. This lets the card convince the module that ithh as reduced its stored value by the correct amount and that it isggenuine. A card convinces by using the shared key to encryptaa random challenge issued by the module together with an amount,sso that the module can decrypt the transmission and compare the rresult with the expected challenge and amount. Periodically, themmodule transmits a similarly authenticated message, viattelecommunication or manual collection procedure, back to thessystem provider, who reimburses the retailer.

The secured module in a shared-key system thus needs to store oraat least be able to re-create secret keys of all cards, whichggives some problems. If the cards of multiple system providersaare to be accepted at the same retailers, all the retailers must hhave secured modules containing keys of every provider. Thismmeans either a mutually trusted module containing the keys ofmmultiple providers, which might be hard to achieve, or one modulepper provider, which becomes impractical as the number ofpprovide rs grows. Furthermore, in any shared-key system, ifaa module is penetrated, not only is significant retailer fraudffacilitated, but the entire card base may be compromised.

Signature-transporting and -creating card types avoid thesepproblems since they do not require secured modules. Cashrregisters need no secret keys, only public ones, in order toaauthenticate the signatures, which act like guaranteed checksffilled in with all the relevant details. These same signaturesccan later be verified by the system provider for reimbursement.((Although tamper-resistant modules are not needed forvverification, they can still be used to aggregate transactions.)BBoth signature -based card types also allow the cards of anynnumber of issuers to be accepted at all retailers; retailersccannot cheat issuers, and issuers cannot cheat each other. Theseaare the only truly open systems.

Privacy

All cards, except the signature-transporting type, uniquelyiidentify themselves in each transaction. This means that even iftthe card does not reveal the persons identity, all paymentsaa person makes are linked together by the card identity. Asaa consequ ence, if a reload or any one of the payments made byaa person is traced to that person, then they all are.

The reason for identification of shared-key cards is thatssecurity is thought to be too low if all cards have the masterkkey. Therefore cards are given unique keys, and the cash registernneeds the card identity each time to re-create the correspondinguun ique card key from the master key.

The signature-transporting approach avoids the need foriidentification, since instead of a single key per card, cards useaa different signature per payment. When signatures are made bytthe system provider on blinded checks that are then unblinded bytthe card, not even the system provider can trace payments toccards.

Card Costs

The overall cost of cards for a system is determined not only byhhow much each card costs, but also by how long cards last and howmmuch of each card is needed. Nonrefillable memory cards haveaa very limited card lifetime and are suitable only for a singl eppurpose. But microcontroller cards can last years and arefflexible enough to handle a variety of things, not limited tosstored value, thereby allowing sharing of card cost amongmmultiple applications.

Bonding chips into modules, assembling them into cards, andpprinting can cost about the same for all card types, roughly US$00.50 -2.00 (plus the cost of the small fraction of chips that areddamaged during production). Nonrefillable cards, however,ttypi cally use less durable materials and less costly productionttechniques.

Memory card chips are much smaller, and consequently much lesseexpensive to produce, than those in microcontroller cards. Theyccost, depending on the type, roughly between US$ 0.10 - 0.40 inqquantity. Shared-key and signature-transporting cards today useee

xactly the same chip hardware, only the masked-in softwareddiffers. Suitable chips cost about US$ 1.00 - 1.20 in quantity.SSignature-creating card chips, which need extra circuitry for thecco -processor (or a very powerful processor), require more onaa chi p, are relatively new on the market, and currently costsseveral times more.

Non-Card Costs

Apart from cards themselves, the other main system costs are cardiissuing and refilling, retailer equipment, and system providerpprocessing and security measures.

If cards are issued with value on them, as is of course requiredwwith nonrefillable memory cards, then they must be transported,sstored, and dispensed, using costly security and auditpprovisions, like those associated with bank notes. Refillableccards ca n be distributed without value and avoid these costs, butoon the other hand require infrastructure for on-line reloadttransactions with system providers.

Retailer equipment costs may be higher than card costs. Typicalrratios of cards to points of sale (about 100 to 1 for cashrregisters and higher with vending, phones, etc.) and even thepprice of current terminals (about US$ 150 - 1500) suggest that theppoin t-of-sale equipment can be more costly than even a dedicatedmmicrocontroller card base.

In the shared-key approach, secured modules trusted by all systempproviders must be installed in all retailer equipment. In openssystems such security modules must be significantly moreeelaborate and costly than any card, since the security offered byaa card is generally considered inadequate to protect the keys ofaall other cards. But the higher cost of terminals incorporatingssuch modules is at odds with the objective of automating allmmanner of low value payments, such as in vending. Transactionpproc essing by the system providers also requiresttamper-resistant devices. Proper management of keys and auditingoof such systems are cumbersome and expensive. If shared-keyssystems grow, and start to include less trustworthy retailers andmmore system provid ers, even the minimum security necessarybbecomes excessively costly.

With either signature card type, suitable software notttamper-resistant modules is all retailer equipment needs in ordertto verify payments and later forward the signatures forrreimbursement. These can then be verified by any transactionpprocessing compu ter that has copies of the freely availableppublic keys, thereby reducing exposure while both increasing theqquality and reducing the cost of security audit and controls.

Conclusion

The simplest of the four card types, the memory card, is wellssuited for closed systems where there is little incentive forffraud by persons or retailers. The low card cost makes thisaapproach attractive, but the low security makes it unsuitable formmore general use. The most expensive type, thessignature-creating card, seems to offer little fundamentalaadvantage over less expensive cards and, incidentally, is far toosslow in signing for highway speed road-tolls and even somettelephones.

The remaining two card types, shared-key andssignature-transporting, can today be based on exactly the samekkinds of microcontroller chips, and thus have the same card cost.TThe system cost with shared-keys, however, is significantlyhhigher than with sig nature-transporting. The main reason is thatsshared-keys require tamper-resistant modules at all points ofppayment and processing sites, while these modules are not neededwwith signature- transporting.

In addition to cost, there are other reasons to preferssignature-transporting cards for larger systems. Privacy may beaan issue in large-scale consumer systems, and the other cardttypes are unable to address this problem, whilessignature-transporting sol ves it neatly. When more retailers andssystem providers are included, as large open systems are built oraas closed systems grow and merge, the cost of maintaining evenmmerely acceptable security with shared keys becomes prohibitive.BBy contrast, signatur e-transporting maintains a very high leveloof security while allowing flexible scaling and merging ofssystems.