跳到主要內容

臺灣博碩士論文加值系統

(44.211.24.175) 您好!臺灣時間:2024/11/13 05:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:楊佑寧
研究生(外文):Yo-Ning Yang
論文名稱:有限信任讀卡機下安全服務機制
論文名稱(外文):Secure Service Mechanism for Semi-Trusted Card Readers
指導教授:俞旭昇俞旭昇引用關係
指導教授(外文):Shiuh-Sheng Yu
學位類別:碩士
校院名稱:國立暨南國際大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:中文
論文頁數:52
中文關鍵詞:智慧卡身份認證資訊安全
外文關鍵詞:smart cardauthenticationinformation security
相關次數:
  • 被引用被引用:4
  • 點閱點閱:420
  • 評分評分:
  • 下載下載:108
  • 收藏至我的研究室書目清單書目收藏:6
隨著智慧卡問世,各種應用智慧卡的遠端認證方法不斷地被提出與修改。智慧卡本身無顯示螢幕且無法自行供給電源,需仰賴讀卡機與終端設備的支援,若讀卡機與終端設備為不安全的,則持卡人的資訊安全將不復存在。
本論文在有限信任讀卡機的前提下,以智慧卡與遠端伺服器認證後的服務與資訊傳遞為研究主軸,提出安全的服務與訊息傳遞架構,以確保資訊能夠安全與正確的傳輸。本論文所提出的方法,在智慧卡抽離讀卡機後,即使讀卡機與終端設備被植入惡意程式,仍能有效保護資訊安全。我們以JAVA實作這個架構的原型,以驗證此法在現存硬體環境下的可行性,並提出適用的商業模式,以推廣此架構的應用範圍。
After the smart card was presented to the public, various kinds of remote authentication schemes based smart cards are proposed and revised constantly. The smart card does not have a display monitor and is unable to supply its power by itself. It needs the support of a card reader or a terminal device. If we use an unsafe card reader or an insecure terminal device, the cardholder's information will be leak out and insecure.

Based on the hypothesis that card readers are semi-trusted, we studied issues about the service and information transmission after the authentication between a smart card and a remote server is completed. We proposed a secure service and information transmission scheme to ensure the information security and correct transmission. After taking out a smart card from a card reader, we can still resist the illegal programs effectively, even if a card reader or a terminal device is planted by a hostile program. We used JAVA to make a prototype and confirmed the feasibility in the existing hardware environment. We also proposed a suitable business model to promote this application.
誌謝 Ⅰ
論文摘要 II
ABSTRACT Ⅲ
第一章 緒論 1
1.1 研究背景與動機 1
1.2 論文目的 1
1.3 論文架構 2
第二章 文獻探討 3
2.1 智慧卡 3
2.1.1 智慧卡之架構 3
2.1.2 ISO7816 Part 1 4
2.1.3 ISO7816 Part 2 4
2.1.4 ISO7816 Part 3 5
2.2 單向雜湊函數 7
2.3 加解密機制 7
2.3.1 對稱式加解密系統 8
2.3.2 非對稱式加解密系統 8
2.4 身份認證攻擊方法 9
2.4.1 重送攻擊 9
2.4.2 假冒攻擊 9
2.4.3 中間人攻擊 10
2.4.4 驗證表被竊取後攻擊 10
2.4.5 偽裝伺服器攻擊 10
2.4.6 字典攻擊 10
第三章 相關研究 11
3.1 通行碼驗證機制 11
3.2 使用智慧卡的通行碼遠端認證機制 12
3.3 Juang的方法 12
3.4 Lee et al.的方法 16
第四章 本文的方法 20

4.1 基本假設 20
4.2 我們的遠端登入機制 21
4.3 服務傳輸階段 25
4.4 安全性分析 27
4.4.1 重送攻擊 27
4.4.2 假冒攻擊 28
4.4.3 中間人攻擊 28
4.4.4 驗證表被竊取後攻擊 28
4.4.5 偽裝伺服器攻擊 28
4.4.6 字典攻擊 28
4.5 與其他文獻比較 29
第五章 系統實作 32
5.1 系統開發環境 32
5.2 系統架構 33
5.3 系統實作與展示 33
5.4 安全服務機制適用的商業模式與應用 38
5.4.1 獨立封閉式 38
5.4.2 異業或同業結盟式 38
5.4.3 安全服務機制應用於分散式電子病歷 39
5.4.4 安全服務機制應用於線上遊戲 40
5.4.5 安全服務機制應用於金融操作 40
第六章 結論與未來研究方向 42
6.1 結論 42
6.2 未來研究方向 42
參考文獻 43
[1]Leslie Lamport, “Password authentication with insecure communications.” Communication of ACM, vol. 24, pp. 770-772, Nov. 1981.
[2]Lein Harn, D. Huang, C,-S. Laih, “Password authentication using public-key cryptography.” Computer Mathematics with Application, vol. 18, No. 12, pp. 1001-1017, 1989.
[3]Chin-Chen Chang, Ling-Hua Wu, “Sharing a polynomial for password authentication.” Journal of Computers, R.O.C., vol. 1, No.4, pp. 11-17, 1989.
[4]G. Horng, “Password authentication without using password table.” Information Processing Letters, vol. 55, pp.247-250, 1995.
[5]J. K. Jan, Y. Y. Chen, “Paramita wisdom’ password authentication scheme without verification tables.” The Journal of Systems and Software, vol. 42, pp. 45-57, 1998.
[6]H.-Y. Chien, J.-K. Jan, Y.-M. Tseng, “A modified remote log in authentication scheme based on geometric approach.” Journal of System and Software, vol. 55, pp.287-290, 2001.
[7]Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang, “A remote user authentication scheme using hash functions.” ACM Operating Systems Review, vol.36, No. 4, pp.23-29, 2002.
[8]Chien H, Jan J, Tseng Y, “An efficient and practical solution to remote authentication:smart card.” Computer and Security, vol. 21, No. 4, pp. 372-375, 2002.
[9]Hsu CL, “Security of Chien et al’s remote user authentication scheme using smart card.” Computer Standards and Interfaces, vol. 26, pp.167-169, 2004
[10]Wen-Shenq Juang, “Efficient password authenticated key agreement using smart cards.” Computer and Security, vol. 23, No. 2, pp. 167-173, 2004.
[11]Wen-Gong Shieh, Jian-Ming Wang, “Efficient remote mutual authentication and key agreement.” Computers and Security, vol 25, No.1, pp.72-77, 2006.
[12]Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo, “Efficient nonce-based remote user authentication scheme using smart cards.” Applied Mathematics and Computation, vol. 167, pp.355-361, 2005.
[13]X. Y. Wang, D. G. Feng, X. J. Lai, and H. B. Yu, ”Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. ” Rump session of Crypto’04 and IACR Eprint archive, August 2004.
[14]Xiaoyun Wang, Hongbo Yu , “How to Break MD5 and Other Hash Functions.” Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005.
[15]Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, “Fing collision in the full SHA-1.” Advances in Cryptology – CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005.
[16]C. C. Chang, T. C. Wu, “Remote password authentication with smart cards.” IEEE Proceedings 138, pp.165-168, 1991.
[17]C. C. Chang, W. Y. Liao, “A remote password authentication scheme based upon EI Gamal’s signature scheme.” Computer and Security, vol. 13,pp. 137-144, 1994.
[18]T. C. Wu, “Remote log in authentication scheme based on a geometric approach.” Computer Communications, vol. 18, pp.959-963, 1995.
[19]M.-S. Hwang, “A remote password authentication scheme based on the digital signature method.” International Journal of Computer Mathematics, vol. 70, pp. 657-666, 1999.
[20]W. H. Yang, S. P. Shieh, “Password authentication schemes with smart cards.” Computer and Security, vol. 18, pp.727-733, 1999.
[21]M.-S. Hwang, L. H. Li, “A new remote user authentication scheme using smart cards.” IEEE Transactions on Consumer Electronics, vol. 46, pp.28-30, 2000.
[22]H. Sun, “An efficient remote user authentication scheme using smart cards.” IEEE Transactions on Consumer Electronics, vol. 46, No.4, pp.958-961, 2000.
[23]Wei-Chi Ku, Hao-Chuan Tsai, and Maw-Jinn Tsaur, “Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Protocol,” to appear in IEICE Transaction on Communications, Vol.E87-B, No.8, Aug. 2004.
[24]余彥宏,智慧卡離線交易認證機制之研究,碩士論文,民國93年。
[25]I. C. Lin, M. S. Hwang and L. H. Li, “A new remote user authentication scheme for multi-server architecture, Future Generation Computer Systems, Vol. 19, pp. 13-22, 2003.
[26]Workshop on Smart Card Standards and Practical Applications, Sep.2005.
[27] 劉建良,“健保IC卡與分散式電子病歷系統整合探討”,國立暨南國際大學資訊管理學系碩士學位論文,2001年。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top