文化大學機構典藏 CCUR:Item 987654321/28280
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46962/50828 (92%)
造访人次 : 12443847      在线人数 : 612
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/28280


    题名: 從代數差分攻擊的角度分析比較Hitag2和Crypto1
    A comparative analysis of Hitag2 vs Crypto1 from an algebraic differential cryptanalytic viewpoint
    作者: 王昶凱
    Wang, Chang-Kai
    贡献者: 資訊管理學系碩士在職專班
    关键词: RFID
    代數差分
    Crypto1
    Hitag2
    Stream cipher
    SAT solver
    algebraic differential
    日期: 2014-06
    上传时间: 2014-09-26 17:45:34 (UTC+8)
    摘要: RFID,於目前於人類生活中已是不可或缺,因為它的便利性使得人類不得不如此倚賴,它可被用於門禁、貨物的電子標籤、汽車電子門鎖、電子支付系統(電子貨幣)...等等,應用範圍非常廣泛,因此我們不得不檢視它的安全性是否足以讓人類安心的使用,在眾多的RFID應用中我們將探討應用於小額支付系統,而且在全世界已經發售幾十億張以上的Mifare非接觸式智慧卡,因此有人發現,此類型卡片使用的Crypto1安全保護隱藏著一個安全性隱憂。
    Mifare智慧卡所使用的加密演算法為Crypto1,在2008年已經被發現有一些安全性上的缺失,而在台灣後期所發售的智慧卡已有修正這些缺點,正當人們認為它補強之後已經足夠安全時,有研究在已修正的智慧卡中嘗試以SAT solver對Crypto1使用代數差分攻擊的手法進行分析,並取得了有效的成果。

    因此我們想更進一步的探討,Mifare的弱點並不僅在於它的Stream cipher有問題,期更根本的原因在於Mifare Classic認證機制本身隱藏了安全性上的缺陷,因此選了同樣為Stream cipher的Hitag2套用進Mifare Classic的認證機制,使用代數差分攻擊與先前於Crypto1上的兩個攻擊手法作分析與比較,顯示代數差分攻擊對於兩種串流式架構的影響效力。
    同時,基於本論文的比較結果,Crypto1的安全性與同類型的Hitag2相較之下明顯低的多,因此建議應該立刻停止使用基於 Crypto1 的 Mifare Classic 系統,改換成有更高安全性的保護機制,以免造成更大的資安損失。

    RFID, At present lives in the humanity already is indispensable, because its more convenience let the humanity to rely, it may use in the entrance guard, the cargo electronic label, the automobile electron door lock, the electronic payment system (electronic currency),…etc. The application be used very widespread, therefore we will be able to inspect whether its security does enough or not. Then we will discuss in the Small-payment system in many RFID application, moreover Mifare classic contactless smart card already be sold several dozens hundred million in the world, therefore some one discovered, The Crypto1 maybe hide some secure issue.

    Mifare used the Crypto1 as the protect algorithm . It have be found some risk of the secure flaw in 2008, the smart card which later period sells in Taiwan had revises these weakness. After every one believe it has been safe enough reinforcement. Then a research have try to attack Crypto1 cipher use SAT solver Tool from an algebraic differential cryptanalytic and achieved effective results

    So we would like to explore further, The weakness of Mifare not only with the Crypto1 structure issue but also contains the Mifare Classic framework design of the LFSR streaming architecture. After we find Hitag2 have the Similar streaming architecture, We mount Hitag2 into Mifare Classic and use algebraic differential cryptanalytic. Then Observation the impact of the two streaming architecture.

    Algebraic differential attack has effective results on Mifare Classic - Crypto1 and Mifare Classic - Hitag2. The Hamming distance between them is 13 by this paper of experimental results, but solver time did not growth with exponential.
    显示于类别:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    fb140926174519.pdf11427KbAdobe PDF493检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈