IC card technology lecture 5 data security and encryption of IC card

The IC card records a large amount of important information, which can be used for personal documents, and can also be used for trading in place of cash and checks. Therefore, it is inevitable that criminals will carry out various attacks on IC cards and their application systems. The purpose includes Obtaining illegal benefits or damaging the application system. Therefore, IC card application system developers must provide reasonable and effective security measures for IC card systems to ensure data security of IC cards and their application systems. These technologies include: Identity authentication and IC Card legality confirmation, message authentication technology, data encryption communication technology, etc. These technologies can ensure the integrity, validity and authenticity of the data of the IC card during storage and transaction, thus effectively preventing illegal IC cards. Read and write and modify.
The main ways to affect the security of IC cards and application systems are as follows:
1. Use the IC card lost or stolen by the user, impersonate the legitimate user to enter the application system and gain illegal benefits.
2. Illegal copying data with fake or blank cards and entering the application system.
3. Use the IC card reading and writing device outside the system to modify the data on the legal card. For example, increase the deposit amount, change the operation level, etc.
4. In the process of IC card transaction, after completing the identity authentication with the normal card, the IC card is changed midway, so that the data stored on the card is inconsistent with the system.
5. In the IC card read and write operation, the information flow exchanged between the interface device and the IC card is intercepted, modified, or even inserted into illegal information to obtain illegal interests or damage the system.
In response to the above various insecurities, developers need to take protective measures in several aspects to ensure data security.
The primary task of IC card security protection is to prevent attacks on the IC card itself. This kind of precaution has already started in the process of IC card manufacturing and personalization. It is very complicated in the process of IC card production and card surface printing. Anti-counterfeiting technology to increase the difficulty of illegal counterfeiters. There is a strict confidentiality method for the manufacturer code, and a special protection layer for the IC chip can prevent direct analysis of the stored content using electromagnetic technology. In the process of IC card issuance and personalization, the publisher Passwords, erasure passwords should be generated by the system, not for the operator to prevent crimes inside the system.
In the process of using the IC card, it is necessary to prevent the illegal holder from fraudulent use. Therefore, the identity of the cardholder must be verified before the IC card is read or written, that is, personal identification is performed. The user password (total password) is provided on the IC card. It is input by the user when personalizing, and is not saved in the system. When using, the user is required to type it to confirm the identity of the user. If the input is incorrect several times in succession, the IC card will lock itself and cannot be used again. This measure can be effectively used. Prevent illegal cardholders from using multiple heuristics to decipher passwords. Biometrics are also used on some new IC cards, such as cardholder fingerprint recognition, retina recognition, etc. Even if the user password is leaked, others cannot use their own. IC card.
For IC cards that are lost after loss and IC cards that are invalid for special reasons, a so-called blacklist should be set up in the system database to record the issue number of these cards. When someone re-uses, the system will alarm and the card will be Take back.
In the use of the IC card, the legality of the reader must also be authenticated. This can be achieved by partitioned cryptographic erasure. If the system cannot provide the correct password, the contents of the IC card cannot be read and modified. The device is used to steal data from the card.
For the data stored in the IC card, the area protection technology can be adopted, that is, the IC card is divided into several storage areas, and each area is set with different access conditions. If the access meets the conditions of the area, the access is allowed, otherwise the lock is performed. For example, free access. The area is allowed to read, write and modify at will, to protect the reading, erasing and writing in the data area protected by password; while the password stored in the secret area is not allowed to read, write and modify at all. For illegal intrusion, that is, locking the system. This method can effectively prevent illegal intruders from using the reader to probe the memory contents one by one.
The biggest threat to IC card data security is not in the static storage of data, but in the normal reading and writing process of the IC card. Because of the user password, the system password must be sent to the IC card through the reader interface when verifying. A technical means to steal communication data during the reading and writing process, so that it is very possible to understand the storage partition and system password. For example, after a legal IC card is input into the reader to complete the user ID, the reading and writing process is replaced with other IC card, thus avoiding the verification process, illegally reading or writing data. This situation can be solved by adding a special mechanism to the reader/writer. That is, every time the card is changed, the user identity is required to be re-verified. Eavesdropping on communication content, including the way to verify the intrusion process of the password process, can only be effectively protected by encrypting the input and output information. This can utilize the data processing capability of the smart IC card (ie CPU card) to run the encryption and decryption algorithm program. Implement the transmission to solve.
There are two ways to protect the information transmitted by the reader and the IC card.
1. The authentication transmission method encrypts the information transmitted between the reader/writer and the IC card by adding the corresponding encryption algorithm and encryption key, which includes the information header (transmission control information) and the information body portion. The obtained ciphertext is transmitted to the receiving end at the end of the plaintext information, which is called authentication information. The receiving end authenticates the received information according to a prescribed algorithm, and the normal authentication is performed by the authentication, otherwise the alarm is generated. This method can effectively prevent Illegal insertion or deletion of transmitted data. Although the transmission is performed in clear text, it will not be modified without being discovered. The authentication information is encrypted and generated and processed by the cryptographic algorithm. If the design is reasonable, the additional authentication information has authentication. In addition to the function, it can also have the function of checking and even correcting.
2. Encrypted transmission mode This method is to encrypt all transmitted information and then transmit it, so that the information itself is confidential and difficult to decipher. Therefore, even if the information is obtained after invading the system, it cannot be used.
Usually the basic working mode of an encryption system is called the cryptosystem. A cryptosystem consists of two elements: the encryption algorithm and the key. The encryption algorithm is some formula or rule, which is generally executed by a program stored in a computer. The key can be regarded as an optional parameter in the execution of the cryptographic algorithm. Without the key, the algorithm cannot be decrypted. Therefore, the password is generally public, such as the DES algorithm developed by IBM and widely used. 64-bit plaintext is processed into a 64-bit ciphertext by key processing. There is also a DSA algorithm belonging to an asymmetric key system. In this algorithm, the encryption key is a public key, and the decryption key is different from the encryption key. This method is more suitable for an open application environment. Now there are special chips for implementing the corresponding encryption algorithm on the market, which can be conveniently selected in the IC card system. Encrypted transmission mode can greatly improve the security performance of the IC card application system. Of course, it is also subject to certain restrictions. It is difficult to adopt on a simple memory card, mainly used in the intelligent CPU card system.
In short, the card application system is a kind of application system with large usage, large number of users and wide field, so it has high security requirements. As a developer, when designing the system, it must carefully consider the information security and take effective errors. Good. IC card has huge storage capacity and intelligent processing capability. It is very convenient, effective and safe to achieve various security measures. It is much better than magnetic card and photoelectric card. This is the main advantage of IC card application system.

Champagne glass

champagne glasses luxury,

champagne coupe glasses,

champagne glass flute,

ribbed champagne glass,

crystal champagne glass,

champagne glasses with diamond,

wine and champagne glasses,

gold champagne glasses,

rose champagne glass,

champagne flutes glass,

glass champagne flutes

champagne coupe glasses,champagne glasses,black champagne glasses,champagne flutes,champagne bucket

Shaanxi Freeway Export and Import Co.,LTD. , https://www.fw-deco.com

Posted on