English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46833/50693 (92%)
造訪人次 : 11867636      線上人數 : 716
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/23825


    題名: Mifare Classic模擬及安全性改良之研究
    作者: 李魁元
    貢獻者: 資訊管理研究所碩士在職專班
    關鍵詞: 非接觸式
    contactless
    智慧卡
    smart card
    Mifare Classic
    日期: 2012
    上傳時間: 2012-12-04 09:30:26 (UTC+8)
    摘要: 本研究主要探討「非接觸式」的智慧卡,因為「非接觸式」智慧卡溝通是透過無線電的方式做傳送,因此很容易讓攻擊者以側錄的手段,獲取相關的資訊,造成安全上的問題,例如:複製卡片,竄改卡片的資料…等。
    目前使用最廣泛的智慧卡是Mifare Classic卡,Mifare Classic卡是一種可在同一張卡片處理多種不同應用的卡片,因此,本研究以Mifare Classic卡為對象。
    2008年開始有許多對Mifare Classic卡之安全性的研究被提出,這些研究發現有許多弱點並透過某些攻擊 可以取得卡片的金鑰,藉以更改卡片的資訊,本研究會對這些方式做相關實驗,驗證其可行性。本研究成功利用proxmark3設備去模擬Mifare Classic卡片,與相關讀卡機實驗,可通過門禁與餘額查詢機。
    透過實驗了解到Mifare Classic卡鑑別上安全性之弱點,並從這些弱點中,提出改進的方式。對攻擊者可能產生的行為中,尋求因應的方法,能提高Mifare Classic卡安全性,減少被攻擊的機會,本研究提出相關的防禦方法能抵禦大部份現有攻擊方式。
    This study focused on the simulation and security problems of contactless smart card. Since contactless smart cards communicate through radio, it is easy for an attacker to eavesdrop and obtain the card related information. This causes security problems such as card duplicating and card data tampering.

    Currently, the most widely used smart card is Mifare Classic card, which is used in a broad range of applications including transport ticketing, access management, e-payment, etc. Therefore, this study targets Mifare Classic card.

    In the last few years, many articles have been devoted to the study of Mifare Classic card security. Their studies found that due to many weaknesses in Mifare Classic card the card key can be retrieved by certain attacks and accordingly the card data can be changed. According to their methods, this study conducts experiment to verify their feasibility. This study makes use of Proxmark3 device to read and emulate Mifare Classic card. In the card emulation experiments, the emulation card can be read by building access control reader and MRT balance inquiry machine, successfully.

    According to the security weakness of Mifare Classic card authentication learned through experiments, an improved method is proposed to increase the security of Mifare Classic card. Since the proposed method aimed at possible attacker behaviors, it can defend against most existing attacks.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    http___thesis.lib.pccu.edu.tw_cgi-bin_cdrfb3_gsweb.pdf235KbAdobe PDF744檢視/開啟
    http___thesis.lib.pccu.edu.tw_cgi-bin_cdrfb3_gsweb2.pdf2078KbAdobe PDF6273檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋