Understanding the physical structure and components of SIM cards
A SIM (Subscriber Identity Module) card is a small, portable memory chip that stores information specific to a mobile subscriber. The physical structure of a SIM card consists of several key components:
The integrated circuit (IC) chip is the core component of the SIM card, containing the processor, memory, and security modules. This chip stores the IMSI (International Mobile Subscriber Identity), authentication keys, and other subscriber data.
The gold-plated contacts on the surface of the SIM card provide the electrical connection between the SIM card and the mobile device. These contacts follow the ISO/IEC 7816 standard and enable communication with the device.
The plastic body of the SIM card protects the chip and provides structural support. It's typically made of PVC or other durable plastics and includes embossed information such as the ICCID (Integrated Circuit Card Identifier).
As specified in TS 02.07, SIM cards include a polarization mark that indicates how the user should insert the card into the mobile equipment (ME) [^1].
The original SIM card format, also known as Mini-SIM or ID-1 SIM, measures 25mm × 15mm × 0.76mm. According to the specifications, "Format and layout of the ID-1 SIM shall be in accordance with ISO/IEC 7816-1,2" [^1].
The SIM card chip contains several key components that enable its functionality:
The microprocessor that executes instructions and manages the SIM card's operations. It handles authentication algorithms, data encryption/decryption, and communication with the mobile device.
SIM cards contain different types of memory:
Dedicated hardware for performing cryptographic operations, including:
Manages the communication between the SIM card and the mobile device through the physical contacts, following the protocols defined in standards like ISO/IEC 7816.
Each component of the SIM card plays a specific role in its overall functionality:
The CPU executes the SIM card's operating system, processes commands from the mobile device, and manages access to the file system. It enforces security policies and executes the authentication algorithms during network registration.
The memory components store different types of data:
The cryptographic co-processor handles security-related operations:
The I/O controller: