Font Size: a A A

The Study And Implementation Of Authentication Technology Using Smart Cards

Posted on:2009-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:F WuFull Text:PDF
GTID:2178360272490623Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With development of society and technique,every developed country uses smart card to deal with people's data.And it brings a wave of research and developing. And it's sure that safety and protocols on it attract people' attention more and more.In this paper, smart card's technology and standard are surveyed.At the same time, after reading many theses about protocols with smart cards, those protocols and attacks on them are analysed in the following part.Firstly,development of technology and standard of smart card at home and abroad are displayed.Then history of smart card authentication protocols and attacks are discussed after that.At last an improved protocol using smart card is brought up and implementioned in a C/S architecture.In technology part of smart card,safety technology in hardware and software is the main contents.Especially,how to guarantee information safely with software is the most important.In standard part of smart card, ISO/IEC 7816 is needed.These are the most popular standards at the present time.Then a model of application is made to show the standard.This paper summarize development of authentication protocols using smart cards with the time order: develop from the original authentication thought, one way authentication to mutual authentication.with reasonable attacks' development.Also, the causes of attacks are discussed after the introducation and examples of them. Some way of avoiding attacks are summarized in this paper,too.Then,an improved authentication protocol using smart cards is showed and its security is discussed.After this part there is the program details.At last,the prospect of the authentication protocols using smart card is related and a useful conclusion appears.
Keywords/Search Tags:Smart card, Id authentication, Attack
PDF Full Text Request
Related items