资源描述:
《etc系统中金融ic卡安全性-研究与实践》由会员上传分享,免费在线阅读,更多相关内容在应用文档-天天文库。
1、上海交通大学工程硕士学位论文ABSTRACTRESEARCHANDPRACTICEONSECURITYOFFINANCIALICCARDOFETCABSTRACTWiththedevelopmentofChina'sGoldencardproject,banksbegintoissuefinancialICcardsinsteadofmagneticstripecards,andintroducedmanyapplicationsbasedonit.InadditiontothebasicfunctionssuchasdepositandPOSpurchase
2、,wecanalsomakeourselvestakebus,shopping,andmakeanappointmentinhospitaljustbyusingfinancialICcards.ETCtrafficcardisthetypicalfinancialICcardapplicationinrecentyears.Nowadays,it’sdifferentfromthepastthatwegettheETCtrafficcardfromHighwayAdministration,thankstothecooperationbetweenbanks
3、andHighwayAdministration,afinancialICcardcansolvetheproblem.FinancialICcardsbecamemorepowerful,applicationsarebecomingmoreandmorepopular,andinformationsecurityforICcardattackshasbecomeincreasinglyprominent.Whichmainlyabouttwoaspects,ononehand,thesecuretransmissionoftransactioninform
4、ationbetweentradingterminals,ontheotherhand,authentication.ThispapermainlydiscussedfinancialICcard’sapplicationinETCsystem,focusonmulti-systeminformationsecuritybetweenETCsystemandbank’sICcardsystem.BasedonanalysisofthePBOCstandardencryptionalgorithms,thispaperproposethatapplytheChi
5、nesecommercialencryptionstandardalgorithmintheprotectionofICcardinformationsecurity.Meanwhile,thispaperanalyzedthedefectandpotentialrisksabouton-boardunits(OBU)andICcardIII万方数据上海交通大学工程硕士学位论文ABSTRACTauthenticationprocess,proposedsomeprevensionmeasures.Intheend,accordingtotheauthor'sw
6、orkingbackground,thispaperprovideanimplementationplan,theICcardnamed"Longyuantransportationcard”,whichisjointlyissuedbyHighwayAdministrationofXXprovinceandlocalXXcommercialbank.Thecontributionofthispaperisasfollowing:1.OnthebasisofanalysisandcomparisonofPBOC2.0andPBOC3.0,thispaperpo
7、intoutthenecessityofadoptingPBOC3.0standardsintheconstructionoftheETCsystem.ConsideringPBOC3.0standardisnotancompulsoryrequirement,sotheauthorputittoaforward-lookingdesignthatusingtheChinesecommercialencryptiontoensuretheinformationsecurityofETCcards.SM2,SM3forthelegitimacyofICcarda
8、uthentication,andSM