Sigurnosni mehanizmi za rad s
pametnim karticama
Vrsta: Diplomski | Broj strana: 70 | Nivo:
Elektrotehnički fakultet
SVEUČILIŠTE U ZAGREBU
FAKULTET ELEKTROTEHNIKE I RAČUNARSTVA
DIPLOMSKI RAD br. 1445
SIGURNOSNI MEHANIZMI ZA RAD S PAMETNIM KARTICAMA
Aleksander Radovan
Zagreb, rujan 2004.
2
Sadržaj
1. UVOD
....................................................................................................................................................5
2. FIZIČKA STRUKTURA I ŽIVOTNI CIKLUS KARTICE ..........................................................7
2.1. FIZIČKA STRUKTURA PAMETNE KARTICE
.......................................................................................7
2.2. ŽIVOTNI CIKLUS PAMETNE KARTICE ...............................................................................................8
2.2.1. Faza
proizvodnje....................................................................................................................8
2.2.2. Pripremna faza personalizacije .............................................................................................8
2.2.3. Faza personalizacije
..............................................................................................................9
2.2.4. Faza korištenja.......................................................................................................................9
2.2.5. Završna faza (faza poništavanja kartice)
..............................................................................9
3. LOGIČKA STRUKTURA I KONTROLA PRISTUPA
...............................................................11 3.1. LOGIČKA
STRUKTURA DATOTEKA
................................................................................................11
3.2. KONTROLA PRISTUPA....................................................................................................................12
3.2.1 Razine uvjeta
pristupa...........................................................................................................12
3.3. PREZENTACIJA PIN-A
...................................................................................................................13
3.3.1. Rukovanje PIN-om
...............................................................................................................13
4. PROCEDURALNA
ZAŠTITA.........................................................................................................15
4.1. IDENTIFIKACIJA
DOKUMENATA.....................................................................................................15
4.2. AUTENTIFIKACIJA KERBEROS SUSTAVOM
....................................................................................16
4.3. KONTROLA PRISTUPA OPERACIJSKOM SUSTAVU
..........................................................................20
4.4. NAPADI NA PAMETNE KARTICE
.....................................................................................................21
4.4.1. Logički
napadi......................................................................................................................21
4.4.2. Fizički
napadi.......................................................................................................................21
4.4.3. Probijanje kriptografskih
algoritama..................................................................................21
5. ARHITEKTURA I VRSTE PAMETNIH
KARTICA...................................................................23
5.1. ARHITEKTURA PAMETNIH
KARTICA..............................................................................................23
5.1.1
Mikroprocesor.......................................................................................................................23
5.1.2 Memorija
...............................................................................................................................23
5.1.3. Ulazno/izlazno
sučelje..........................................................................................................24
5.1.4. Izvor napajanja ....................................................................................................................24
5.2. VRSTE PAMETNIH KARTICA
..........................................................................................................25
5.2.1. Memorijske kartice...............................................................................................................25
5.2.2. Mikroprocesorske kartice
....................................................................................................26
5.2.3. Kartice s kriptografskim koprocesorom
..............................................................................27
5.2.4. Beskontaktne pametne kartice
.............................................................................................27
5.2.4.1. Induktivni
spoj..............................................................................................................................
28 5.2.4.2. Kapacitivni
spoj............................................................................................................................
28
5.2.5. Hibridne pametne kartice
....................................................................................................30
5.2.6. Napredne pametne kartice
...................................................................................................30
6. SIGURNOSNI MEHANIZMI
..........................................................................................................31
6.1. ALGORITMI KRIPTIRANJA..............................................................................................................31
6.1.1.
DES.......................................................................................................................................32
6.1.2. Trostruki DES......................................................................................................................38
6.2. ALGORITMI SAŽIMANJA
................................................................................................................38
6.2.1. SHA-1 ...................................................................................................................................38
6.2.1.1. Izračunavanje sažetka poruke
......................................................................................................
38
6.3. DIGITALNI POTPIS
.........................................................................................................................41
6.4. ALGORITMI ZA RAZMJENU KLJUČEVA
..........................................................................................41
6.4.1. RSA
.......................................................................................................................................42
6.4.1.1. Enkripcija......................................................................................................................................
42
3
6.4.1.2. Dekripcija
.....................................................................................................................................
42 6.4.1.3. Digitalno potpisivanje
..................................................................................................................
42 6.4.1.4. Verificikacija digitalnog potpisa ..................................................................................................
42 6.4.1.5. Jednostavan primjer RSA
enkripcije............................................................................................
43 6.4.1.6. Složeniji primjer RSA enkripcije
................................................................................................
43 6.4.1.7. Stvarni
primjer..............................................................................................................................
44 6.4.1.8. Duljine ključeva i njihov životni ciklus
.......................................................................................
45
6.5. DIGITALNI CERTIFIKATI
................................................................................................................46
7. PRAKTIČNI RAD – DEMONSTRACIJA SIGURNOSNIH MEHANIZAMA KORISTEĆI PAMETNE
KARTICE...
...............................NAMERNO UKLONJEN DEO
TEKSTA.................................
...............................................................................................................50
7.2.2. Popunjavanje elektroničke
uplatnice...................................................................................51
7.2.3. Provo enje transakcija ........................................................................................................52
7.3. IZVORNI TEKSTOVI
PROGRAMA.....................................................................................................53
7.4. ZAKLJUČAK O PRAKTIČNOM RADU ...............................................................................................53
8.
ZAKLJUČAK.....................................................................................................................................55
PRILOG 1 – NAJVAŽNIJI DIJELOVI PROGRAMSKOG KODA
..............................................56 P.1.1. PROVJERA UNESENOG PIN-A
.....................................................................................................56
P.1.2. DOHVAĆANJE CERTIFIKATA S KARTICE .....................................................................................58
P.1.3. DIGITALNO POTPISIVANJE NALOGA ZA ELEKTRONIČKO PLAĆANJE
...........................................60 P.1.4. PROVJERA DIGITALNOG
POTPISA ...............................................................................................61
DODATAK A
.........................................................................................................................................62
A.1. POPIS SVIH PAROVA VRIJEDNOSTI CNDN ......................................................................................62
A.2. POPIS SVIH KLJUČEVA DOBIVENIH PERMUTACIJOM PAROVA CNDN
.............................................63 A.3. POPIS SVIH S-KUTIJA
....................................................................................................................64
A.3.1. S1
kutija.................................................................................................................................64
A.3.2. S2 kutija.................................................................................................................................64
A.3.3. S3
kutija.................................................................................................................................64
A.3.4. S4
kutija.................................................................................................................................64
A.3.5. S5
kutija.................................................................................................................................64
A.3.6. S6
kutija.................................................................................................................................64
A.3.7. S7 kutija.................................................................................................................................65
A.3.8. S8
kutija.................................................................................................................................65
A.4. POPIS SVIH
KORAKA U PETLJI (T = 0 DO 79) U SHA-1 ALGORITMU
............................................65 LITERATURA
.......................................................................................................................................69
---------- OSTATAK TEKSTA NIJE PRIKAZAN. CEO RAD MOŽETE PREUZETI NA SAJTU. ----------
MOŽETE NAS KONTAKTIRATI NA E-MAIL: maturskiradovi.net@gmail.com
besplatniseminarski.net Besplatni seminarski Maturski Diplomski Maturalni SEMINARSKI RAD , seminarski radovi download, seminarski rad besplatno, www.besplatniseminarski.net, Samo besplatni seminarski radovi, Seminarski rad bez placanja, naknada, sms-a, uslovljavanja.. proverite!