期刊文献+

多应用智能卡数据信息的安全研究

Multi-application Smart Card Data Information Security Research
下载PDF
导出
摘要 在智能卡进行多行业应用时,存在跨行业数据访问、数据泄露以及破坏等安全问题。针对此类问题,结合当前智能卡安全机制和跨行业多应用的文件系统特征,提出了对多应用智能卡数据完整性校验的一种方法。该方法构建了一个文件加密与访问控制模型,其主要功能包括保障各行业应用系统的独立性,实现数据的访问控制和密钥的安全存储等。最后分析并验证了该安全模型的可行性与安全性。该方案在陕西省社会公共服务卡验证平台上得到了验证,提高了卡内数据信息的安全级别。 There are exist some security issues in the Multi-application of smart card,such as cross-industry data access, data leak and damage .For such security issues, we have combined with the current smart card security mechanism and characteristics of cross-industry application file system , put forward a method of the application of smart card data integrity check .The method put forward a security model of file encryption and access control , and its main functions include ensuring the independence of industry application system, implementing the data access control and storage the key in safety, etc. Finally ,we analysis and verify the feasibility and security of this model.The scheme has been verified in the public service in Shaanxi province card verification platform , improving the safety level of the data information in the card .
出处 《电视技术》 北大核心 2015年第5期53-56,69,共5页 Video Engineering
基金 陕西省科学技术研究发展计划项目(2013k06-14) 西安邮电大学青年教师科研基金项目(ZL2013-39)
关键词 多应用智能卡 数据完整性 安全管理器 密钥映射表 Multi-application of smart card Data integrity Safety manager Key mapping table
  • 相关文献

参考文献8

  • 1SKIPPER J. Electronic banking and payments [ C ]//Proe. 1EEE Col- loquium on eCommerce - Trading. NewYork: IEEE Press, 1998: 31-36.
  • 2赵铭洋,赵正文,麻荣誉.智能卡数据完整性校验[J].信息技术,2011,35(9):142-143. 被引量:1
  • 3SOOD S K,SARJE A K,SINGH K. Smm card based secure authen- tication and key agreement plotocol [ C ]//Proe. Computer & Com- munication Technology. Allahabad : [ s. n. ] ,2010:7-14.
  • 4DESHMUKH A A, DUBAL M, MAHESH TR, et al. Data security anaylysis and securityextension for smart cants using java card [ J ]. International Journal of Advanced Information Technology (IJAIT), 2012,2(2) :41-57.
  • 5王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. 被引量:26
  • 6姚静晶,胡永涛,胡善学,.一种新的智能卡安全通信机制[J].电脑知识与技术(过刊),2010,0(33):9503-9506. 被引量:1
  • 7姚静晶,胡永涛张勇等.一种智能导安全会话系统:中国,101894235A[P].2010-11-24.
  • 8智能卡数据交互安全性的研究.[EB/OL].[2014-07-05].ht-tp://tech.yktchina.com/2009-12/7e821ba887a74219916825989ef62c2b.html.

二级参考文献15

  • 1唐业,张申生.单发卡商多应用智能卡访问控制模型[J].计算机工程与应用,2005,41(18):4-6. 被引量:2
  • 2王毅,张娟.基于智能卡的访问控制系统的设计与实现[J].南昌工程学院学报,2006,25(5):24-27. 被引量:1
  • 3I Damgard. A Design Principle for Hash Functions[C].In:Crypto 89,LNCS 435,416~427.
  • 4Paul C van Oorschot,Michael J Wiener. Parallel Collision Search with Cryptanalytic Applications[J].Journal of Cryptology, 1999; (12):1~28.
  • 5H Dobbertin.Cryptanalysis of MD4[C].In:FSE96,1996:53~69.
  • 6P R Kasselman.A Fast Attack on the MD4 Hash Funcion[M].IEEE Press, 1997.
  • 7Xiaoyun Wang,Dengguo Feng,Xuejia Lai et al. Collisions for Hash Functions MD4,MD5.HAVAL-128 and RIPEMD.
  • 8Mihir Bellare,Tadayoshi Kohno. Hash Function Balance and its Impact on Birthday Attacks[C].In:EUROCRYPT'04,LNCS 3027,SpringerVerlag, 2004.
  • 9Antoine Joux. Multicollisions in Iterated Hash Functions,Application to Cascaded Constructions[C].In: Crypto 04, LNCS 3152, SpringerVerlag,2004:306~316.
  • 10Eli Biham,Rafi Chen. Near-Collisions of SHA-0.http :∥www.cs.technion.ac.il/~biham.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部