Font Size: a A A

Based On Smart Card, Digital Rights Management System

Posted on:2010-12-08Degree:MasterType:Thesis
Country:ChinaCandidate:X F ChenFull Text:PDF
GTID:2208360275483059Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With the high development of China's digital market in 2005, DRM Technology (Digital Right Management Technology) has already begun to take shape and been widely used. Nowadays in the DRM field, DRM in stream media is most used. But in the long term, there is no doubt that remote DRM market will be the development hotspot and tendency. This paper is studying the realization of DRM system based on IC card just against such background.This project is a more complicated system, which incorporates the following technologies: IC card technology, encryption and decryption technology, authentication technology and DRM technology. In the process of writing this paper, the writer first elaborates the principles of the four technologies mentioned above respectively, which lay the theoretic foundation for the realization of this project. Among them, the part of IC card describes the architecture of IC card, analyzing the operating system of IC card chip. The part of encryption technology abstractly introduces three cryptographic algorithms: Symmetric Key Algorithm, Asymmetric Key Algorithms and Hash Digest Algorithm. In the part of authentication, the writer highlights the authentication method used in this project-password authentication. In the last part of DRM, it analyzes the principles of DRM technology.In the process of its realization, the part of IC card, as an underlying driver to serve upper application modules, is in the charge of other project teams. The writer of this paper is primarily responsible for the realization of relatively simple DRM on the level of Operation System, which can summarize as two modules: encrypting module and authentication module. Encrypting module is based on the operation system, while authentication module can be realized only by invoking the cryptographic algorithms in encrypting module.Encryption module has integrated the symmetric cryptographic algorithm DES and 3DES, asymmetric cryptographic algorithm RSA and abstract message function MD5. Among them the block cipher algorithm DES and 3DES has adopted ECB and CBC link mode; RSA has adopted efficient Montgomery modular multiplication algorithm and encrypting module provides a unified interface and the upper level is ready for specific calls of cryptographic algorithm through corresponding parameters.Authentication module based on encrypting module can be summarized as two parts: user identification, IC card physical device and network server mutual authentication. User identification is used to identify the legitimacy of the user identity and IC card physical device and network server mutual authentication is for the mutual authentication of IC card physical device and network server legitimacy.At the basis of project study and realization, this paper studies some problems concerning the hardware implementation of RSA cryptographic algorithm to some extent and also proposes a certain number of problems for further research.
Keywords/Search Tags:Encryption algorithm, Authentication, DRM, Smart Card
PDF Full Text Request
Related items