Font Size: a A A

Research On Security Of Mobile Payment System Based On NFC Technology

Posted on:2018-06-02Degree:MasterType:Thesis
Country:ChinaCandidate:P XuFull Text:PDF
GTID:2348330518486510Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the development of mobile Internet and mobile payment,NFC technology has been pursued by banks,operators and manufacturers because of its convenience and security.As the mobile payment will involve the transmission of sensitive data,so the technology has also been the concern of security researchers and attackers.NFC technology as a mobile payment technology,its own security on the one hand reflected in the near effective communication distance,on the other hand,reflected in the communication initialization conflict detection.In addition,the security of NFC technology communication depends on the encryption scheme and the signature scheme.Therefore,the choice of secure encryption algorithm and signature scheme is an effective measure to ensure the security of NFC communication.Firstly,this paper first analyzes the communication mechanism of NFC,and then the NFC communication model is layered according to the communication situation.Then this paper introduces the protocol of each layer and the standard communication standard of NFC.Then,according to the contactless PBOC transaction processing flow,a secure transaction process based on the signcryption scheme is given.Finally,the security threats of near field communication are analyzed,and the security requirements for near field communication are given.Secondly,in near field communication,data confidentiality is achieved by data encryption.This paper improves the DES algorithm,which is commonly used in NFC communication,to resist differential power attack.The differential power attack attacks the encryption algorithm by collecting the power consumption during the encryption process,analyzing the relationship between power consumption and the median value.The improved algorithm uses masking technology to mask the middle value of the operation,and eliminates the correlation between power consumption and the median value,and can effectively resist differential power attack.In order to make the encryption function correct,the input of the S box is modified,and the encryption function is simulated,and the experimental results also show that the mask DES algorithm can encrypt the information properly.The experiments of differential power attack on the improved algorithm show that the improved algorithm can resist the differential power attack effectively.Finally,in addition to the confidentiality of data,data integrity is one of the security requirements.In order to ensure the confidentiality and integrity of communication,this paper combines the mechanism of encryption and signature,and proposes a publicly verifiable certificateless hybrid signcryption scheme.The scheme is constructed through bilinear pairings,and uses a certificateless approach without the need for third party authentication center au-thentication.In this paper,a method of reduction is used to prove the confidentiality and unforgeability of the scheme.In addition,the scheme is publicly verifiable and guarantees the non-repudiation of the transactions between the two sides of the transaction.Finally,comparing the computation efficiency and communication efficiency of the scheme with bilinear pairings,we can conclude that the scheme has higher computation efficiency under the premise of guaranteeing confidentiality and unforgeability of signcryption scheme.
Keywords/Search Tags:near field communication, communication model, encryption algorithm, hybrid signcryption, certificateless
PDF Full Text Request
Related items