Font Size: a A A

Identification Technology Research Based On AES For Automobile Keyless Entry System

Posted on:2011-12-07Degree:MasterType:Thesis
Country:ChinaCandidate:L WangFull Text:PDF
GTID:2178360305993736Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the swift development of wireless communication technology and information security technology, the application of automobile keyless entry system is more and more deep and wider. However, Current techniques which are being applied to vehicles always have some defects. This thesis mainly focuses on identification technology of automobile keyless entry system.Firstly, some basic knowledge about the security of wireless communications, AES's design principles as well as the dynamic password authentication was introduced. After that, a detailed introduction of Keeloq authentication technique applied to one-way RKE was given. Because of some reasons, such as its too short key length, compromised encryption algorithm, fixed-key encryption, an AES-based one-way authentication protocol of the RKE was proposed. This approach in which encryption of the data is realized by a model of AES computed with a fixed key and a variable key. And using rolling synchronization code to ensure that each transmission of data is different. Followed by an analysis of the security agreement. Then, the simulation of the protocol confirmed the randomness of the data which transmited in the certification process. At the same time, the computational time which in a safe working parameters was given.Then, this thesis introduced the relevant knowledge on PKE took the place of RKE. For the particularity of PKE system, the proposed one-way authentication protocol was improved to fit two-way communication which based on a challenge/response mode. The improved authentication protocol communicated with two ways design the LF and RF communication frame optimally, and the LF is used to activate the key, the RF is used to identification. There are two factors to guarantee the safety of each data transmission phase. And the keys are only activated by the matching car, which extends the life of the key.Finally, some further topics concerning these schemes were covered.
Keywords/Search Tags:remote keyless entry, passive keyless entry, advanced encryption standard, identification, challenge-response
PDF Full Text Request
Related items