文化大學機構典藏 CCUR:Item 987654321/20197
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46962/50828 (92%)
造访人次 : 12449135      在线人数 : 651
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/20197


    题名: Mifare Classic的僅卡攻擊
    作者: 楊博宏
    贡献者: 資訊安全產業研發碩士專班
    关键词: 智慧卡 RFID
    Mifare Classic
    Crypto-1
    日期: 2010
    上传时间: 2011-11-07 12:20:15 (UTC+8)
    摘要: RFID系統在人們的生活中被廣泛的運用,如:門禁系統、付款系統與存取系統等。其中,大多採用智慧卡與讀卡機的結合。Mifare Classic是目前RFID系統中最常使用的非接觸式智慧卡。但Mifare Classic所專屬的密碼系統,Crypto-1與鑑別協定含有許多嚴重的漏洞。而這些漏洞足以讓不肖人士被利用來取得雙方於鑑別時使用的金鑰。由於大部分的RFID系統皆設在人群眾多的公共場合。因此,本研究採取真卡片與假讀卡機的情境,發展兩種方法進行隱密的僅卡攻擊,並取得卡片中的金鑰。在本研究所發展的方法中,還可以大幅漸少破解金鑰時的搜尋空間。最後更進一步的研究被某地區廣泛使用的卡片內儲值的格式,並成功的修改其內容。
    Radio Frequency Identification (RFID) systems have been widely used in our daily life, such as access control systems, payment systems, access systems etc. Generally these systems consist of card readers and contactless smart cards. The Mifare Classic is the most widely used contactless smartcard on the market. However, the proprietary cryptosystem of Mifare Classic, called Crypto-1, has very serious vulnerabilities. Hackers can exploit these vulnerabilities to obtain the key used in the authentication. Since the RFID systems are often located in public places with many people and video monitors, this study adopts a scenario of using the fake reader and genuine card in concealed places. Two card-only attacks are developed in this study to retrieve the keys. Moreover, the developed methods can reduce the key search space. Finally, this study investigates the data format in a widely used store-value card and modifies the stored value successfully.
    显示于类别:[資訊工程學系] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    gsweb339.pdf1146KbAdobe PDF876检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈