Font Size: a A A

A Study On Security Of IC Card And Analysis Of Chaos Theory

Posted on:2015-06-29Degree:MasterType:Thesis
Country:ChinaCandidate:N N ChenFull Text:PDF
GTID:2308330464959767Subject:Integrated circuits
Abstract/Summary:PDF Full Text Request
IC cards maintain plenty of important information, and play an irreplaceable key role in individual credentials, transportation, consumption and other areas. The increasing demand in promoting IC cards in business environment, requires more security in IC cards and their application systems. In general, attackers use various methods, to corrupt the application systems via information eavesdropping, or to acquire illegal benefits. Accordingly, IC card developers must provide reasonable and effective counter measures to ensure the security of IC cards and their application systems. Cryptology is a one of the IC cards’security techniques, and key management is a crucial part in achieving the information security. However, with the development of modern cryptographic analysis, unavoidable hidden perils exist due to the key exposure issues, which lead to the consecutive security challenge in IC cards development. This thesis studies IC cards with related issues in secure information transmission. According to the different structures and functionalities, we categorize the cards into two types, the logical encryption cards and the CPU cards, and analyse the security of the later. We also study the widely used block ciphers and public key encryption algorithms. In particular, by introducing and analysing the Chaos encryption theory, we implement the application of Advanced Encryption Standard algorithms (AES) with the Chaos theory. The Chaos theory is one of the most important discoveries in the 20th centenary. This cutting-edge theory receives long-term studies, and is praised as "The Third Revolution" during the history of physics, following Einstein’s theory of relativity and quantum mechanics. Therefore, the Chaotic Cryptography blooms with many new thoughts and new methodologies, which deeply affects in the security and practicability of IC cards. Meanwhile, it greatly promotes the research of the Chaos theory in the practicability area.
Keywords/Search Tags:IC card, security, encryption, chaos theory
PDF Full Text Request
Related items