English  |  正體中文  |  简体中文  |  Items with full text/Total items : 51897/87065 (60%)
Visitors : 8468238      Online Users : 163
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/87949

    Title: 利用智慧卡做網路使用者認證之研究
    Other Titles: Study of remote user authentication using smart cards
    Authors: 劉昭聖;Liu, Chao-Sheng
    Contributors: 淡江大學資訊工程學系碩士班
    洪文斌;Horng, Wen-Bing
    Keywords: 智慧卡;密碼分析;認證;會議金鑰;動態 ID;smart card;Cryptanalysis;authentication;session key;Dynamic ID
    Date: 2012
    Issue Date: 2013-04-13 11:53:40 (UTC+8)
    Abstract: 智慧卡又稱IC卡、晶片卡,是1968年德國科學家 Jurgen Dethloff 和 Helmut Grotrupp 將積體電路加入了身分識別卡所發明,並在同年期間獲得了專利。
    1975年,法國公司CII-Honeywell Bull 生產出第一張類似信用卡的ID卡。同年的3月17號,法國科學家Roland Moreno 獲得了IC卡在法國的專利。
    1976 年法國布爾電腦公司首先製成IC卡產品,並開始應用在各個領域,像是電子錢包、IC 金融卡、信用卡、悠遊卡、健保IC卡、自然人憑證等等各領域上的運用。
    Smart card, also called IC card or chip card, was first invented by the German scientists Jurgen Dethloff and Helmut Grotrupp, who added the identity card with integrated circuits and obtained a patent in the same year.
    In 1975, the French company CII-Honeywell Bull produced the first credit card that was like ID card. In the same year, French scientists Roland Moreno obtained the patent of IC card in French.
    In 1976, the French computer company Bull produced the products of IC card first and began to apply in various areas, just like E-purse, IC debit card, credit card, easy card, national health insurance IC card, natural person''s evidence and so on.
    Since the data of smart card will transmit over the Internet, there are some problems to cope with. For example, the transmission of data channels is unsafe; it is easy to be monitored or intercepted the user’s data by the attacker or to perform some of the Internet attacks, like replay attack, masquerade attack, man-in-the-middle attack, and so on. Furthermore, the data stored in smart card can be retrieved by the attacker to launch other attacks, resulting unsafe transactions. Although many scholars proposed their method to improve the security of authentication schemes, there are some weaknesses found by other scholars. Hence, improvements of security of authentication schemes become an endless cycle.
    In this thesis, we propose an authentication scheme to improve other methods proposed by other scholars. We assume that the data stored in smart card can be obtained by the attacker, and our scheme can resist various attacks.
    Appears in Collections:[資訊工程學系暨研究所] 學位論文

    Files in This Item:

    File SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback