Access in a flash

If the typical government smart card had a personality, it would be considered one-dimensional. Besides getting waved at security personnel, the primary role smart cards have found is in securing logical access to computer networks. In this scenario, users insert smart cards into readers to establish their rights to use an organization's information technology assets. The Defense Department's Common Access Card (CAC), for example, is typical of this approach.

But there's one potential use of smart cards that's barely been tapped: securing physical access. Government agencies are interested in using smart cards to control access to facilities and networks, but a couple of factors have discouraged wider use.

The act of running a smart card through a machine creates wear on the card and the reader, both of which must be periodically replaced. Smart card usage in logical access has been infrequent until now, so the rate of deterioration hasn't raised eyebrows. But that is expected to change, largely because of the heightened security environment following the terrorist attacks of Sept. 11, 2001. In high-traffic environments such as entryways and doors within buildings, the wear from repeated swiping can be considerable and expensive. Each CAC is said to cost about $10.

Some agencies, however, are beginning to look at "contactless" smart cards. This technology employs a radio frequency ID chip. Smart cards equipped with such chips can be waved in front of a reader, which will prolong the life of the card and reader, and shave a few seconds off the time it takes to get people into secure areas.

"We believe a contactless door access approach makes more sense because of reduced wear and tear," said Malcolm MacTaggart, president and chief executive officer of CryptoCard Corp., which provides secure password technology. He says people would use a card to pass through doorways 10 to 20 times more often than they would use a card to access a network.

Contactless smart cards now are making their way into the federal market. But contactless chips come with different levels of encryption, so agencies must determine which product suits their security policies. In addition, government interoperability standards surrounding contactless technology have yet to congeal, although progress has been made (see "Work progresses on contactless interoperability," Page 20).

Security Concerns

One obstacle in the way of broader acceptance of contactless cards has been the need to ensure secure communication between card and reader. The Mifare contactless chip, which was recently embedded on a CAC during a Navy pilot program, lacks a government-approved encryption algorithm and would be inappropriate in situations requiring secure communication, said Neville Pattinson, director of business development and technology at Schlumberger Ltd. Mifare, developed by Royal Philips Electronics, is used in fare cards.

Suppliers, however, are rolling out contactless products with triple Data Encryption Standard (DES) capability. HID Corp., a major proximity card vendor, offers Triple DES encryption as an option for its iClass contactless smart cards. And Philips has launched Mifare DESFire, a Mifare product with Triple DES.

Philips officials plan in the first quarter of next year to introduce the DESFire(G). The new product will support Government Smart Card Interoperability Specification 2.1, which specifies Federal Information Processing Standard 140-2 for cryptography, according to Keith Ward, general manager for the identification and authentication solutions group at Northrop Grumman Information Technology.

The Navy's contactless pilot program used the older Mifare chip technology but met current standards and requirements, said Capt. Rob Conway, fleet liaison officer with the Navy's eBusiness Operations Office. The Navy has discussed "incorporating Triple DES technology on the contactless chip," Conway said, adding that encryption requirements will be finalized in the future.

Overall, contactless technology is maturing. Jim Dray, who directs smart card research at the National Institute of Standards and Technology and serves as principal scientist for the Government Smart Card program, noted that there are contactless cards that can do everything a contact card can do, including implement cryptography.

"The underlying technology is progressing nicely," he said.

Moore is a freelance writer based in Syracuse, N.Y.

The Fed 100

Read the profiles of all this year's winners.


  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group