天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 軟件論文 >

基于NFC技術(shù)的移動(dòng)支付系統(tǒng)安全性研究

發(fā)布時(shí)間:2018-11-23 15:37
【摘要】:隨著移動(dòng)互聯(lián)網(wǎng)和移動(dòng)支付的發(fā)展,NFC技術(shù)由于其便利性以及安全性,受到銀行,運(yùn)營(yíng)商,廠(chǎng)商等追捧。由于在移動(dòng)支付方面會(huì)涉及到敏感數(shù)據(jù)的傳輸,所以該技術(shù)也受到了安全研究人員和攻擊者的關(guān)注。NFC技術(shù)作為在移動(dòng)支付方面使用的技術(shù),其自身安全性一方面體現(xiàn)在比較近的有效通信距離,還有一方面體現(xiàn)在通信初始化時(shí)的沖突檢測(cè)機(jī)制。除此之外,NFC通信時(shí)的安全性需要依靠加密方案以及簽名方案來(lái)保證。因此,選擇安全的加密算法和簽名方案是保證NFC通信時(shí)安全的有效措施。1.本文首先分析了NFC的通信機(jī)制,然后按照通信情況對(duì)NFC通信模型進(jìn)行分層。介紹了每層的協(xié)議以及底層的NFC標(biāo)準(zhǔn)通信規(guī)范,隨后分析了非接觸式PBOC交易處理流程,給出了一個(gè)基于本文簽密方案的安全交易流程。最后分析了近場(chǎng)通信受到的安全威脅以及近場(chǎng)通信需要滿(mǎn)足的安全性要求。2.在近場(chǎng)通信中數(shù)據(jù)的保密性通過(guò)對(duì)數(shù)據(jù)加密來(lái)實(shí)現(xiàn)。本文對(duì)NFC技術(shù)通信時(shí)常用的DES算法進(jìn)行改進(jìn),用來(lái)抵抗差分功耗攻擊。差分功耗攻擊通過(guò)采集算法加密過(guò)程中功耗,分析功耗與中間值關(guān)系來(lái)破解加密算法。本方案的改進(jìn)算法采用掩碼技術(shù),對(duì)運(yùn)算中間值進(jìn)行掩碼處理,消除了功耗消耗與中間值的相關(guān)性,能有效的抵御差分功耗攻擊。為了使加密功能正確,修改了S盒的輸入,并且進(jìn)行了加密仿真,實(shí)驗(yàn)結(jié)果也顯示掩碼DES算法能正確的加密信息;對(duì)改進(jìn)的算法進(jìn)行差分功耗攻擊實(shí)驗(yàn),結(jié)果表明改進(jìn)的算法能有效的抵御差分功耗攻擊。3.除了數(shù)據(jù)的保密性外,數(shù)據(jù)的完整性也是安全要求之一。為保證通信時(shí)的保密性以及完整性,本文結(jié)合了加密與簽名的機(jī)制提出了一種可公開(kāi)驗(yàn)證的無(wú)證書(shū)混合簽密方案。該方案通過(guò)雙線(xiàn)性對(duì)構(gòu)造,并且采用了無(wú)證書(shū)的方式,不需要第三方的認(rèn)證中心認(rèn)證。本文通過(guò)歸約的一種方法證明了方案的保密性以及不可偽造性。除此之外,方案還具有可公開(kāi)驗(yàn)證性,能保證交易雙方對(duì)交易的不可抵賴(lài)。最后,與同樣使用了雙線(xiàn)性對(duì)的方案比較計(jì)算效率以及通信效率,可以得出在保證簽密方案保密性和不可偽造性的前提下本方案具有較高的計(jì)算效率。
[Abstract]:With the development of mobile Internet and mobile payment, NFC technology has been sought after by banks, operators and manufacturers because of its convenience and security. Because it involves the transmission of sensitive data in mobile payment, the technology has also attracted the attention of security researchers and attackers. NFC technology is used in mobile payment. On the one hand, its own security is reflected in the close effective communication distance, and on the other hand, it is reflected in the collision detection mechanism when the communication is initialized. In addition, the security of NFC communication depends on encryption scheme and signature scheme. Therefore, the choice of secure encryption algorithm and signature scheme is an effective measure to ensure the security of NFC communication. 1. In this paper, the communication mechanism of NFC is analyzed firstly, and then the communication model of NFC is layered according to the communication situation. This paper introduces the protocol of each layer and the NFC standard communication specification at the bottom, then analyzes the processing flow of contactless PBOC transaction, and presents a secure transaction flow based on this signcryption scheme. Finally, the security threats to near field communication and the security requirements of near field communication are analyzed. 2. In near field communication, the data confidentiality is realized by encrypting the data. In this paper, the DES algorithm, which is commonly used in NFC communication, is improved to resist differential power attack. Differential power attack decrypts the encryption algorithm by analyzing the relationship between power consumption and intermediate value. The improved algorithm uses the mask technology to mask the intermediate value of the operation, which eliminates the correlation between the power consumption and the intermediate value, and can effectively resist the differential power attack. In order to make the encryption function correct, the input of the S-box is modified, and the encryption simulation is carried out. The experimental results also show that the mask DES algorithm can encrypt the information correctly. The improved algorithm is tested by differential power attack, and the results show that the improved algorithm can resist the differential power attack effectively. 3. In addition to the confidentiality of data, the integrity of data is also one of the security requirements. In order to ensure the confidentiality and integrity of communication, a publicly verifiable mixed signcryption scheme without certificates is proposed in this paper, which combines encryption with signature. The scheme is constructed by bilinear pairings and has no certificate, so it does not require the certification of a third party. In this paper, the confidentiality and unforgeability of the scheme are proved by a reduction method. In addition, the scheme can also be publicly verifiable, which can guarantee the non-repudiation of both parties to the transaction. Finally, comparing the computational efficiency and communication efficiency with the bilinear pair scheme, it is concluded that this scheme has a high computational efficiency under the premise of ensuring the privacy and unforgeability of the signcryption scheme.
【學(xué)位授予單位】:江南大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TP309

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 陳明;袁少良;;標(biāo)準(zhǔn)模型下可證明安全的基于身份多代理簽名[J];計(jì)算機(jī)研究與發(fā)展;2016年08期

2 李明祥;安妮;;基于格的前向安全簽名方案[J];密碼學(xué)報(bào);2016年03期

3 李麗娟;郭亞杰;;一種改進(jìn)的ElGamal數(shù)字簽名方案[J];計(jì)算機(jī)工程與科學(xué);2016年06期

4 陳佳哲;李賀鑫;王亞楠;王宇航;;運(yùn)用t檢驗(yàn)評(píng)估3DES算法的側(cè)信道信息泄露[J];清華大學(xué)學(xué)報(bào)(自然科學(xué)版);2016年05期

5 俞惠芳;楊波;;使用ECC的身份混合簽密方案[J];軟件學(xué)報(bào);2015年12期

6 孫銀霞;張福泰;沈麗敏;;抗簽名密鑰泄露的可撤銷(xiāo)無(wú)證書(shū)簽名[J];軟件學(xué)報(bào);2015年12期

7 張玉清;王志強(qiáng);劉奇旭;婁嘉鵬;姚棟;;近場(chǎng)通信技術(shù)的安全研究進(jìn)展與發(fā)展趨勢(shì)[J];計(jì)算機(jī)學(xué)報(bào);2016年06期

8 徐甫;馬靜謹(jǐn);;基于中國(guó)剩余定理的門(mén)限RSA簽名方案的改進(jìn)[J];電子與信息學(xué)報(bào);2015年10期

9 俞惠芳;楊波;張文政;;混合簽密綜述[J];西安郵電大學(xué)學(xué)報(bào);2015年03期

10 羅鵬;李慧云;王鯤鵬;王亞偉;;對(duì)ECC算法實(shí)現(xiàn)的選擇明文攻擊方法[J];通信學(xué)報(bào);2014年05期

相關(guān)博士學(xué)位論文 前1條

1 王紅兵;基于雙線(xiàn)性配對(duì)的代理重加密的研究[D];上海交通大學(xué);2013年



本文編號(hào):2351927

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2351927.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶(hù)2666c***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com