Font Size: a A A

The Research Of Mobile Payment Security Protocols Based On Public Key Cryptosystem

Posted on:2014-02-26Degree:MasterType:Thesis
Country:ChinaCandidate:L LiuFull Text:PDF
GTID:2248330398474992Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of the mobile Internet and mobile terminal devices, there is a strong demand for mobile payment.Many countries have begun to vigorously promote and develop the mobile payment industry. Due to the complexity of mobile payment environment and limited performance of terminal equipment, mobile payment faced more difficulties and challenges in security protocol design and realization. It was very important to design a unified payment platform, and a safe and efficient security protocol. This paper focused on how to get a mobile payment security protocol, which was safe and efficient and easy to be implemented, based on public key cryptography. Through a wide range of public-key cryptosystem ECC optimization and improvement, without sacrificing security under the premise of making it to greatly enhance the efficiency of encryption and signature operations, in order to achieve a safe, efficient, easy to promote the implementation of mobile payments security protocols. The main work of this paper is as follows:1) The mobile terminal operational efficiency as well as public-key cryptosystem encryption poor performance data, this paper proposes the use of ECC+AES method of mobile communication data encryption, encryption efficiency without compromising security. This paper analyzes the security risks of ECDSA digital signature improvement program. And the author designed a way to attack program successfully forged a valid digital signature. Here the author proposed a no modular inversion the ECDSA improvement program and verify the feasibility, efficiency and safety.2) Ayman et al. had been analyzed, using Kailer, about the security flaw. This paper also gives a corresponding improved scheme. The improved scheme not only retained the advantages of the Ayman’s scheme, such as simple, efficient and easy to deploy to the existing mobile network infrastructure, at the same time the security was improved.3) According to the improved mobile payment secure protocol, a mobile payment system is designed. In the simulation system, a mobile phone terminal application program based on Android system is developed. Through the actual operation experience, it has proved that the system has good usability and user experience.
Keywords/Search Tags:Mobile Payment, security protocol, ECC Encryption Algorithm Combined, ECDSA Digital Signature, Formal Analysis
PDF Full Text Request
Related items