基于NFC技術(shù)的移動(dòng)支付系統(tǒng)安全性研究
[Abstract]:With the development of mobile Internet and mobile payment, NFC technology has been sought after by banks, operators and manufacturers because of its convenience and security. Because it involves the transmission of sensitive data in mobile payment, the technology has also attracted the attention of security researchers and attackers. NFC technology is used in mobile payment. On the one hand, its own security is reflected in the close effective communication distance, and on the other hand, it is reflected in the collision detection mechanism when the communication is initialized. In addition, the security of NFC communication depends on encryption scheme and signature scheme. Therefore, the choice of secure encryption algorithm and signature scheme is an effective measure to ensure the security of NFC communication. 1. In this paper, the communication mechanism of NFC is analyzed firstly, and then the communication model of NFC is layered according to the communication situation. This paper introduces the protocol of each layer and the NFC standard communication specification at the bottom, then analyzes the processing flow of contactless PBOC transaction, and presents a secure transaction flow based on this signcryption scheme. Finally, the security threats to near field communication and the security requirements of near field communication are analyzed. 2. In near field communication, the data confidentiality is realized by encrypting the data. In this paper, the DES algorithm, which is commonly used in NFC communication, is improved to resist differential power attack. Differential power attack decrypts the encryption algorithm by analyzing the relationship between power consumption and intermediate value. The improved algorithm uses the mask technology to mask the intermediate value of the operation, which eliminates the correlation between the power consumption and the intermediate value, and can effectively resist the differential power attack. In order to make the encryption function correct, the input of the S-box is modified, and the encryption simulation is carried out. The experimental results also show that the mask DES algorithm can encrypt the information correctly. The improved algorithm is tested by differential power attack, and the results show that the improved algorithm can resist the differential power attack effectively. 3. In addition to the confidentiality of data, the integrity of data is also one of the security requirements. In order to ensure the confidentiality and integrity of communication, a publicly verifiable mixed signcryption scheme without certificates is proposed in this paper, which combines encryption with signature. The scheme is constructed by bilinear pairings and has no certificate, so it does not require the certification of a third party. In this paper, the confidentiality and unforgeability of the scheme are proved by a reduction method. In addition, the scheme can also be publicly verifiable, which can guarantee the non-repudiation of both parties to the transaction. Finally, comparing the computational efficiency and communication efficiency with the bilinear pair scheme, it is concluded that this scheme has a high computational efficiency under the premise of ensuring the privacy and unforgeability of the signcryption scheme.
【學(xué)位授予單位】:江南大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類(lèi)號(hào)】:TP309
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 陳明;袁少良;;標(biāo)準(zhǔn)模型下可證明安全的基于身份多代理簽名[J];計(jì)算機(jī)研究與發(fā)展;2016年08期
2 李明祥;安妮;;基于格的前向安全簽名方案[J];密碼學(xué)報(bào);2016年03期
3 李麗娟;郭亞杰;;一種改進(jìn)的ElGamal數(shù)字簽名方案[J];計(jì)算機(jī)工程與科學(xué);2016年06期
4 陳佳哲;李賀鑫;王亞楠;王宇航;;運(yùn)用t檢驗(yàn)評(píng)估3DES算法的側(cè)信道信息泄露[J];清華大學(xué)學(xué)報(bào)(自然科學(xué)版);2016年05期
5 俞惠芳;楊波;;使用ECC的身份混合簽密方案[J];軟件學(xué)報(bào);2015年12期
6 孫銀霞;張福泰;沈麗敏;;抗簽名密鑰泄露的可撤銷(xiāo)無(wú)證書(shū)簽名[J];軟件學(xué)報(bào);2015年12期
7 張玉清;王志強(qiáng);劉奇旭;婁嘉鵬;姚棟;;近場(chǎng)通信技術(shù)的安全研究進(jìn)展與發(fā)展趨勢(shì)[J];計(jì)算機(jī)學(xué)報(bào);2016年06期
8 徐甫;馬靜謹(jǐn);;基于中國(guó)剩余定理的門(mén)限RSA簽名方案的改進(jìn)[J];電子與信息學(xué)報(bào);2015年10期
9 俞惠芳;楊波;張文政;;混合簽密綜述[J];西安郵電大學(xué)學(xué)報(bào);2015年03期
10 羅鵬;李慧云;王鯤鵬;王亞偉;;對(duì)ECC算法實(shí)現(xiàn)的選擇明文攻擊方法[J];通信學(xué)報(bào);2014年05期
相關(guān)博士學(xué)位論文 前1條
1 王紅兵;基于雙線(xiàn)性配對(duì)的代理重加密的研究[D];上海交通大學(xué);2013年
,本文編號(hào):2351927
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2351927.html