Font Size: a A A

Across The Province High Security Keys Of Smart Card Application System Design

Posted on:2013-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:X L YangFull Text:PDF
GTID:2248330395450708Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years, the IC card is applied more and more widely, from the initial one of enterprises and institutions (such as the use of college student card) is extended to a city to use (such as Shanghai ’s health insurance card). But in the nationwide use of IC card applications are few, the main reason is that the safety design is very difficult. IC card application to improve security is often accompanied by cost increase obviously and the performance significantly reduced, so in many smaller ranges using the IC card application, is aware of its existence safety hidden danger, not the key system design from the technical level to avoid, but ready to deal with plan.This paper focus on inter-provincial IC card application high security design put forward new thinking and new method. The key system design compare with the current mainstream of the key system design has greatly improved safety, but the cost is increased less, performance is only decreases a little. On one hand the paper puts forward management keys and business keys from different root, strictly control the dispersion factor sequence to achieve national or provincial interconnection business, external authentication and protection combination to control card read and write permissions for the current mainstream key system design is improved, thereby improving the safety. On the other hand, the paper puts forward three high security design innovation:first of all, the special root key factor input device, can guarantee that no one knows factor value in the absence of established root key, and a mechanism to guarantee can be reconstructed; secondly, in the key dispersion system design using a small amount of SMI algorithm and most DES/3DES algorithm combining, greatly improve the safety at the same time the performance loss is very small. Once again, the current IC card application once the card storage resource is insufficient, put some data out of the cards (such as a database system), this can not guarantee the data integrity and confidentiality; the paper using the asymmetric key system, ensure the data stored outside for card integrity and confidentiality.
Keywords/Search Tags:IC Card, Secret key management, High Security, Symmetric key, Asymmetric key, State key
PDF Full Text Request
Related items