English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46962/50828 (92%)
造訪人次 : 12438681      線上人數 : 611
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/28280


    題名: 從代數差分攻擊的角度分析比較Hitag2和Crypto1
    A comparative analysis of Hitag2 vs Crypto1 from an algebraic differential cryptanalytic viewpoint
    作者: 王昶凱
    Wang, Chang-Kai
    貢獻者: 資訊管理學系碩士在職專班
    關鍵詞: RFID
    代數差分
    Crypto1
    Hitag2
    Stream cipher
    SAT solver
    algebraic differential
    日期: 2014-06
    上傳時間: 2014-09-26 17:45:34 (UTC+8)
    摘要: RFID,於目前於人類生活中已是不可或缺,因為它的便利性使得人類不得不如此倚賴,它可被用於門禁、貨物的電子標籤、汽車電子門鎖、電子支付系統(電子貨幣)...等等,應用範圍非常廣泛,因此我們不得不檢視它的安全性是否足以讓人類安心的使用,在眾多的RFID應用中我們將探討應用於小額支付系統,而且在全世界已經發售幾十億張以上的Mifare非接觸式智慧卡,因此有人發現,此類型卡片使用的Crypto1安全保護隱藏著一個安全性隱憂。
    Mifare智慧卡所使用的加密演算法為Crypto1,在2008年已經被發現有一些安全性上的缺失,而在台灣後期所發售的智慧卡已有修正這些缺點,正當人們認為它補強之後已經足夠安全時,有研究在已修正的智慧卡中嘗試以SAT solver對Crypto1使用代數差分攻擊的手法進行分析,並取得了有效的成果。

    因此我們想更進一步的探討,Mifare的弱點並不僅在於它的Stream cipher有問題,期更根本的原因在於Mifare Classic認證機制本身隱藏了安全性上的缺陷,因此選了同樣為Stream cipher的Hitag2套用進Mifare Classic的認證機制,使用代數差分攻擊與先前於Crypto1上的兩個攻擊手法作分析與比較,顯示代數差分攻擊對於兩種串流式架構的影響效力。
    同時,基於本論文的比較結果,Crypto1的安全性與同類型的Hitag2相較之下明顯低的多,因此建議應該立刻停止使用基於 Crypto1 的 Mifare Classic 系統,改換成有更高安全性的保護機制,以免造成更大的資安損失。

    RFID, At present lives in the humanity already is indispensable, because its more convenience let the humanity to rely, it may use in the entrance guard, the cargo electronic label, the automobile electron door lock, the electronic payment system (electronic currency),…etc. The application be used very widespread, therefore we will be able to inspect whether its security does enough or not. Then we will discuss in the Small-payment system in many RFID application, moreover Mifare classic contactless smart card already be sold several dozens hundred million in the world, therefore some one discovered, The Crypto1 maybe hide some secure issue.

    Mifare used the Crypto1 as the protect algorithm . It have be found some risk of the secure flaw in 2008, the smart card which later period sells in Taiwan had revises these weakness. After every one believe it has been safe enough reinforcement. Then a research have try to attack Crypto1 cipher use SAT solver Tool from an algebraic differential cryptanalytic and achieved effective results

    So we would like to explore further, The weakness of Mifare not only with the Crypto1 structure issue but also contains the Mifare Classic framework design of the LFSR streaming architecture. After we find Hitag2 have the Similar streaming architecture, We mount Hitag2 into Mifare Classic and use algebraic differential cryptanalytic. Then Observation the impact of the two streaming architecture.

    Algebraic differential attack has effective results on Mifare Classic - Crypto1 and Mifare Classic - Hitag2. The Hamming distance between them is 13 by this paper of experimental results, but solver time did not growth with exponential.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    fb140926174519.pdf11427KbAdobe PDF492檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋