Font Size: a A A

The Application Of Ic Card Key Management System Research And Development

Posted on:2006-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:L B WangFull Text:PDF
GTID:2208360182477025Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The work of this paper aims at the design and the implementation of the management system of key master for releaseing the smart IC card, which is designed for the Tangshan commercial bank. The good read-write ability and the formidable secure guard technology and the big data storage ability is The characteristic of smart IC card . The bank can provide more services after issuing smart IC kard which can provide the safeguard for the bank development diversification service with the support off-line transaction. The IC system construction including the key management system management system, sends the card system, the application system construction. And the most important task of all is the system of key master which this article studies.,.The management system of key management is the kernel of the application of smart IC card system.The better algorithm of the system of key master the better security. the strict key control system causes to send the card line and the cardholder obtains the safety control. This article will implement a set of practical financial IC card key management system management system, and discussion finance IC card key control mechanism. After the Tangshan commercial bank applied this set of keys management system management system to establish the IC card application system, it has continued Tangshan a city cartoon project, sent the card quantity to surpass 20000, the month POS expense surpasses 100000, in society guaranteed, aspect and so on education, expense widely uses, has created the high social value and the enterprise value.This paper comprises the IC card elementary knowledge, information encryption present situation, common information encryption algorithm (including symmetrical encryption and asymmetrical encryption) the principle and the implementation method, finally I have completed the key management system management system implementation.. This paper focus on the research of a strategy of information security such as the algorithm of symmetry which can improve the security of the system and less expensive. Triple DES algorithm is the most popular algorithm. The IC card produced by the system of key master based on Triple DES algorithm will improve the security. First in the physical security aspect the smart IC card can be protected by the key and the key can be stored in the machine of key manager. Second in logic security the smart IC card can be prevented from the mimicking and braves to use by the key of users and the key of the smart IC card. As well as stores the area safeguarding through the IC card and theread-write equipment mutual certification (to store key to cannot survey to between area and application isolates mutually) strengthened has guarded against the attack capability. Encrypted in the communication security and the security aspect with MAC had guaranteed the information integrity, withthe TAC value guaranteed the information the reality, encryption has guaranteed the information privacy through "dense" and "a card dense" 3DES. Because only uses 3DES in the IC card interior the encryption, to card requirement low, the efficiency is very good, at the same time the operating speed also can obtain the safeguard, after practice examination, this is a set of economical highly effective keys management system management system.The intelligent IC card production is different with other IT product production, It starts from the chip design stage to emphasize the system the security, And passes through this security the entire intelligent IC card the production, the application system development, the use and the expiration and so on each phase, From this but frame the intelligent IC card security control system. This article from the intelligent IC card life cycle, the phase the key transmission, IC aspect and so on card secure communication protocol and other assistance security measure will introduce this security control system.
Keywords/Search Tags:Key manager, Symmetrical encryption, RSA, Triple DES algorithm
PDF Full Text Request
Related items