手機支付積分商城系統(tǒng)的設計與實現(xiàn)
發(fā)布時間:2018-01-15 07:13
本文關鍵詞:手機支付積分商城系統(tǒng)的設計與實現(xiàn) 出處:《湖南大學》2014年碩士論文 論文類型:學位論文
更多相關文章: 積分商城 手機支付公司 電子商務 積分換禮 智能終端
【摘要】:據2012年工業(yè)和信息化部的統(tǒng)計報告顯示,中國手機支付公司在以大約每年百分之五的速度遞增。每個手機支付公司都在面臨著日益嚴重的商業(yè)競爭、日益萎縮的客戶資源、日益增高的售后服務要求等問題。積分商城的建設已經成為了手機支付公司增強競爭實力、穩(wěn)定客戶資源、提高售后服務水平的有效出路。論文的創(chuàng)新點在于手機支付加密算法的設計。現(xiàn)有遠程加密支付算法的主要問題在于加密過程中的基于DES的分散參數(shù)X通過三次種子密鑰加密過程中是對稱的,這樣很容易因為左半部分或右半部分的密鑰參數(shù)被破解而導致密鑰失效。在借鑒了現(xiàn)有的手機支付加密算法的設計思想與實現(xiàn)手段的基礎上,論文提出了一種STK遠程支付加密算法。STK算法的設計思想核心在于采用左半邊參數(shù)采用反X形式存在,這樣就避免了現(xiàn)有算法的對稱破譯漏洞。STK算法的主要設計步驟是:首先,敏感數(shù)據加密密鑰(DEK)和空中報文完整性密鑰(MCK)的生成;其次,敏感數(shù)據加密密鑰(DEK)和空中報文完整性密鑰(MCK)的生成采用二級密鑰體制:種子密鑰、卡片遠程支付STK子密鑰;最后,不同類型的密鑰有不同的種子密鑰,再由種子密鑰按分散算法分散獲得對應的遠程支付STK子密鑰。
[Abstract]:According to the statistics report in 2012, the Ministry of industry and information technology, China mobile phone payment company increase at an annual rate of around five percent. Each mobile phone payment companies are facing increasingly serious business competition, shrinking customer resources, increasing customer service service requirements and other issues. The construction of integral mall has become a mobile phone payment company to increase the competitive strength, stable customer resources, improve the effective way to customer service service level. The innovation of this paper is to design the encryption algorithm of mobile phone payment. The existing problems of remote payment encryption algorithm X distributed parameter through the three seed key encryption process is symmetric based on DES in the encryption process, so it is easy for the key parameters of the left half or the right half cracked due to key failure. In reference to the existing mobile phone payment encryption algorithm design thinking Based on the thought and the realization method is proposed in this paper, the design of the core ideas of a STK remote payment encryption algorithm.STK algorithm is that the left half parameter by reverse X form, thus avoiding the main design steps of symmetric.STK algorithm algorithm to decipher existing vulnerabilities are: first, the sensitive data encryption key (DEK) and the message integrity key (MCK) generation; secondly, the sensitive data encryption key (DEK) and the message integrity key (MCK) generated by two key system: seed key, remote payment card STK key; finally, different types of keys have different seed key, then the key by seed the dispersion algorithm of decentralized remote payment STK to obtain the corresponding key.
【學位授予單位】:湖南大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP311.52;TN918.4
【參考文獻】
相關期刊論文 前1條
1 徐寧;楊庚;;基于身份加密機制的光學加密密鑰系統(tǒng)[J];通信學報;2012年04期
,本文編號:1427314
本文鏈接:http://sikaile.net/kejilunwen/wltx/1427314.html
最近更新
教材專著