Font Size: a A A

The Explore And Improvement Of Smart Card Security Technology

Posted on:2006-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:L J DangFull Text:PDF
GTID:2168360152471541Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of chip technology and the improvement of security requirements of applications, smart cards are often used in different applications that require strong security protection and authentication, such as identification, banking, and transportation. In a conclusion, we should pay more attention to the smart card security.In these applications, main focuses are on the authentication and secure communication links between cards and readers.First of all, an overview of smart card is given, and then the security schemes of smart card and attacks on it are reviewed. Finally, I propose two new authentication schemes including the session key exchange and data integrity protection. A new unilateral asymmetric authentication protocol is also proposed which can resistant to the combination of three kinds of attacks.Encryption of the card/card reader communications link is an important issue of smart card security, and a fundamental problem of all crypto logical procedures is the secure distribution of the secret key. To overcome the problem of session key generation and distribution, in this paper, two improved mutual symmetric authentication schemes are proposed. The schemes include session key exchange for secure messaging. Security analyses to the new schemes are provided.In security analyses of authentication protocols for smart cards, we usually consider two possible attacks: replay attacks and active attacks. The aims of both attacks are to try to use fake cards for successful authentication. In addition to these attacks, there are other possible attacks, the aim of which is only to let the valid cards to be unsuccessfully authenticated. These attacks are referred to as hostile attacks. The smart card authentication protocols may face a challenge of not functioning properly with the hostile attacks, the replay attacks and active attacks. In this paper, I proposed an improved authentication protocol by modifying a classic unilateral asymmetric authentication protocol to provide a strong protection to prevent the smart cards from these three kinds of attacks. The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
Keywords/Search Tags:Smart card, authentication, security, attacks
PDF Full Text Request
Related items