Java Card Explained

Java Card is a software technology that allows Java-based applications (applets) to be run securely on smart cards and more generally on similar secure small memory footprint devices[1] which are called "secure elements" (SE). Today, a secure element is not limited to its smart cards and other removable cryptographic tokens form factors; embedded SEs soldered onto a device board and new security designs embedded into general purpose chips are also widely used. Java Card addresses this hardware fragmentation and specificities while retaining code portability brought forward by Java.

Java Card is the tiniest of Java platforms targeted for embedded devices. Java Card gives the user the ability to program the devices and make them application specific. It is widely used in different markets: wireless telecommunications within SIM cards and embedded SIM, payment within banking cards and NFC mobile payment and for identity cards, healthcare cards, and passports. Several IoT products like gateways are also using Java Card based products to secure communications with a cloud service for instance.

The first Java Card was introduced in 1996 by Schlumberger's card division which later merged with Gemplus to form Gemalto. Java Card products are based on the specifications by Sun Microsystems (later a subsidiary of Oracle Corporation). Many Java card products also rely on the GlobalPlatform specifications for the secure management of applications on the card (download, installation, personalization, deletion).

The main design goals of the Java Card technology are portability, security and backward compatibility.[2]

Portability

Java Card aims at defining a standard smart card computing environment allowing the same Java Card applet to run on different smart cards, much like a Java applet runs on different computers. As in Java, this is accomplished using the combination of a virtual machine (the Java Card Virtual Machine), and a well-defined runtime library, which largely abstracts the applet from differences between smart cards. Portability remains mitigated by issues of memory size, performance, and runtime support (e.g. for communication protocols or cryptographic algorithms).

Security

Java Card technology was originally developed for the purpose of securing sensitive information stored on smart cards. Security is determined by various aspects of this technology:

Data encapsulation: Data is stored within the application, and Java Card applications are executed in an isolated environment (the Java Card VM), separate from the underlying operating system and hardware.
  • Applet firewall: Unlike other Java VMs, a Java Card VM usually manages several applications, each one controlling sensitive data. Different applications are therefore separated from each other by an applet firewall which restricts and checks access of data elements of one applet to another.
  • Cryptography: Commonly used symmetric key algorithms like DES, Triple DES, AES, and asymmetric key algorithms such as RSA, elliptic curve cryptography are supported as well as other cryptographic services like signing, key generation and key exchange.
  • Applet: The applet is a state machine which processes only incoming command requests and responds by sending data or response status words back to the interface device.
  • Design

    At the language level, Java Card is a precise subset of Java: all language constructs of Java Card exist in Java and behave identically. This goes to the point that as part of a standard build cycle, a Java Card program is compiled into a Java class file by a Java compiler; the class file is post-processed by tools specific to the Java Card platform.

    However, many Java language features are not supported by Java Card (in particular types char, double, float and long; the transient qualifier; enums; arrays of more than one dimension; finalization; object cloning; threads). Further, some common features of Java are not provided at runtime by many actual smart cards (in particular type int, which is the default type of a Java expression; and garbage collection of objects).

    Bytecode

    Java Card bytecode run by the Java Card Virtual Machine is a functional subset of Java 2 bytecode run by a standard Java Virtual Machine but with a different encoding to optimize for size. A Java Card applet thus typically uses less bytecode than the hypothetical Java applet obtained by compiling the same Java source code. This conserves memory, a necessity in resource constrained devices like smart cards. As a design tradeoff, there is no support for some Java language features (as mentioned above), and size limitations. Techniques exist for overcoming the size limitations, such as dividing the application's code into packages below the 64 KiB limit.

    Library and runtime

    Standard Java Card class library and runtime support differs a lot from that in Java, and the common subset is minimal. For example, the Java Security Manager class is not supported in Java Card, where security policies are implemented by the Java Card Virtual Machine; and transients (non-persistent, fast RAM variables that can be class members) are supported via a Java Card class library, while they have native language support in Java.

    Specific features

    The Java Card runtime and virtual machine also support features that are specific to the Java Card platform:

    Persistence: With Java Card, objects are by default stored in persistent memory (RAM is very scarce on smart cards, and it is only used for temporary or security-sensitive objects). The runtime environment as well as the bytecode have therefore been adapted to manage persistent objects.
  • Atomicity: As smart cards are externally powered and rely on persistent memory, persistent updates must be atomic. The individual write operations performed by individual bytecode instructions and API methods are therefore guaranteed atomic, and the Java Card Runtime includes a limited transaction mechanism.
  • Applet isolation: The Java Card firewall is a mechanism that isolates the different applets present on a card from each other. It also includes a sharing mechanism that allows an applet to explicitly make an object available to other applets.
  • Development

    Coding techniques used in a practical Java Card program differ significantly from those used in a Java program. Still, that Java Card uses a precise subset of the Java language speeds up the learning curve, and enables using a Java environment to develop and debug a Java Card program (caveat: even if debugging occurs with Java bytecode, make sure that the class file fits the limitation of Java Card language by converting it to Java Card bytecode; and test in a real Java Card smart card early on to get an idea of the performance); further, one can run and debug both the Java Card code for the application to be embedded in a smart card, and a Java application that will be in the host using the smart card, all working jointly in the same environment.

    Versions

    Oracle has released several Java Card platform specifications and is providing SDK tools for application development.Usually smart card vendors implement just a subset of algorithms specified in Java Card platform targetand the only way to discover what subset of specification is implemented is to test the card.[3]

    Java Card 3.0

    The version 3.0 of the Java Card specification (draft released in March 2008) is separated in two editions: the Classic Edition and the Connected Edition.[6]

    Java Card 3.1

    Java Card 3.1 was released in January 2019.

    New CAP file Format and Applet Deployment Model

    New I/O Framework and Trusted Peripherals

    Core Platform Enhancements

    Security Services

    New Cryptographic Extensions

    See also

    External links

    Notes and References

    1. Book: Chen, Z. . Java Card Technology for Smart Cards: Architecture and Programmer's Guide . Addison-Wesley . Addison-Wesley Java Series . 2000 . 978-0-201-70329-0 . registration . 9 April 2019 .
    2. Ahmed Patel . Kenan Kalajdzic . Laleh Golafshan . Mona Taghavi . 2011 . Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card . International Journal of Information Security and Privacy . 1–18 . 5 . 3 . IGI . 10.4018/ijisp.2011070101 .
    3. Web site: JCAlgTest - database of supported JavaCard algorithms . 27 January 2016.
    4. Web site: Ponsini . Nicolas . 30 January 2023 . Announcing Java Card 3.2 Release . 6 February 2023 . Java Card Blog.
    5. Web site: Unveiling Java Card 3.1: New Cryptographic Extensions. Ponsini. Nicolas. blogs.oracle.com. 2019-04-18.
    6. Book: Samoylov, N. . Introduction to Programming: Learn to program in Java with data structures, algorithms, and logic . Packt Publishing . 2018 . 978-1-78883-416-2 . 9 April 2019 . 13.