Font Size: a A A

Research And Implementation Of The Smart Card Security Protocol

Posted on:2014-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:B B MaFull Text:PDF
GTID:2268330422464697Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Nowadays smart cards have been used in almost every aspect in our daily lives, suchas bank card, transportation card, medicare card, and so on. These cards play an importantrole in all walks of life, which make our life more convenient and intelligent. But even so,one problem that cards bring about can not be ignored: information security of smart card.At present, with the widespread use of smart cards, the problems information securitycaused by smart cards increased, security of smart cards has become a major challenge insmart cards field. Under researches on this issue, this paper will provide three ways forensuring the security of smart cards, authentication, key agreement, and data encryption.During the initial stage of each communication, smart card and reader need mutualauthentication to verify the legitimacy of both communication. In this paper, based on thetype of encryption algorithm, gives two authentication protocols: authentication protocolbased on symmetric ciphers and authentication protocols based on public keycryptography algorithm. Moreover, in the identification process, the smart card and readerwill establish a session key. So when mutual authentication completed we can use thesession key to encrypt the transmission of data between the card and reader, which caneffectively prevent illegal third-party to monitor the communication process or steal thetransaction information. To achieve the two authentication protocols involving symmetricencryption algorithm3DES and SM4, SHA1and SM3hash algorithm, asymmetricalgorithm RSA and SM2.This paper analyzes from the aspect of the trading process of smart cards to increaseThe security of smart cards. Authentication protocol will be used at the beginning of trade,and information will be encrypted with the use of cryptographic algorithm in the processof trade, which solve the problems of identification and data transmission and alsoincrease the security and reliability of communicating.
Keywords/Search Tags:Chip operating systerm, Authentication protocol, Information security, Cryptographic algorithm
PDF Full Text Request
Related items