期刊文献+

基于IC卡的改进型对称密码认证方法

Modified symmetrical password authentication based on IC card
下载PDF
导出
摘要 根据目前IC卡对称加密认证方式,通过加入单向散列的PIN码以加强对称密码交互认证的安全性。方法的核心是首先得到PIN码与认证设备交互验证时的密钥,然后将此密钥与射频卡ID号进行组合加密计算得到真正用于认证的密钥。使用该方法可以不在卡中存储PIN码或PIN码的等价信息,防止卡被破解后PIN码的泄漏,并降低卡内2个扇区的占用。 Based on present symmetric encryption authentication pattern of IC card, an authentication method that adding Personal Identification Number (PIN) code to symmetric password authentication was put forward. Firstly the core of this method is getting the key when PIN code and authentication device is in interaction, and then getting the real authentication key by combining and computing these dual keys. By using this method PIN code or the equivalent information of PIN code need not to be stored in card. It prevents PIN's leakage after the card has been cracked, and reduce the occupation of the card's two sectors.
出处 《计算机应用》 CSCD 北大核心 2012年第A01期61-63,共3页 journal of Computer Applications
基金 江苏省973计划项目(BK2011022) 南京理工大学自主科研项目(2011YBXM18)
关键词 对称密码 认证 PIN码 射频卡 symmetric encryption authentication Personal Identification Number (PIN) code Radio Frequency (RF)card
  • 相关文献

参考文献9

二级参考文献29

  • 1黄红梅,生加明,徐结绿,汪成策.关于RSA公钥体制应用中几个问题的探讨[J].通信技术,2003,36(2):84-86. 被引量:2
  • 2魏乐,叶剑新,黄健.可信计算的初步研究[J].科技资讯,2007,5(13):166-167. 被引量:3
  • 3肖曦,韩军,汪伦伟.可信计算平台关键机制研究[J].信息工程大学学报,2007,8(2):217-220. 被引量:5
  • 4曾少林,易灵芝,王根平,赵吉清.高级加密标准算法在RFID数据安全中的应用[J].计算机测量与控制,2007,15(6):792-793. 被引量:10
  • 5Oney W. Programming the Microsoft Windows Driver Model [M].马少华译 [s. l. ] :Microsoft Press, 1999.
  • 6Nie Xiao - Wei, Feng Deng - Guo, Che Jian - Jun, et al. Design and Implementation of Security Operating System Based on Trusted Computing[ C]//Proceedings of the Fifth International Conference on Machine Leanfing and Cybemetics. Dalian: [s. n.],2006:2776 - 2781.
  • 7Smith S W. Trusted Computing Platforms sign and Appli-cations[M].冯登国,徐震.张立武,译.北京:清华大学出版社.2006:148-151.
  • 8Price A. More Secure Computing[EB/OL]. 2006. http: \ \ www. trustedeomputinggroup, org \ TCGBaekgroundcr_ revised_ amp_ oct_ 17_ 06. perf.
  • 9游战清,李苏剑.无线射频技术(PFID)理论与应用[M].北京:电子工业出版社,2004.
  • 10Wheeler David,Needham Roger.TEA,a Tiny Encryption Algorithm[R].England:Computer Laboratory,Cambridge University,1994.

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部