Font Size: a A A

The Study On Security With T=0 Communication Protocol Of Smart Card

Posted on:2011-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:L Y HouFull Text:PDF
GTID:2198360305454201Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As the smart card is getting more and more useful and popular, studies on the theories and strategies of its application security become the main research direction.The dissertation is on task of the security problems of transaction into current smart card protocol and the theories of cryptography. The dissertation is on task of the security problems of transaction into current smart card protocol and the theories of cryptography.A new protocol layer is introduced to ensure trustworthy transaction into current smart card protocol stack by way of constructing trustworthy terminal and channels at the message layer. In the research of smart card, emphasis is paid to smart card on the base of general analyze DES,RSA criterion encrypt arithmetic, introduce chaos Logistic system encryption algorithm based on CFB confidentiality mode with the aim to avoid byte expanding operation during the course of encrypting the APDU messages that are of various byte lengths, and thorough research on encrypt arithmetic of security. Chaos Logistic system encryption algorithm based on CFB confidentiality mode is a dynamic encryption method because of using iterative chaotic systems generating chaotic sequence as a key sequence. Because of its processing speed and independent of key length, this method is highly effective. It solves the shortage of secret key will be uncover easily because of the secret key is too short.Presently,the research on security of smart card has a lot of research space,and we need monographic study that takes the security of smart card protocol as task comprehensively. Therefore, there research on the security of smart card has its urgent important significance in the development of smart card of technology.In the study, the cryptology algorithm is designed with the method of software and VC++. According to the designing course, the keys (initial values and parameters) are set up and make program with VC++.Analyzed the results with using different keys. The cost of chaotic encryption algorithm.
Keywords/Search Tags:smart card, communication protocol, CFB, chaotic encryption algorithm, APDU
PDF Full Text Request
Related items