Implementation of IC Card Authentication Method Based on Self-defined Algorithm

Jia LIU, Xin KONG, Yan-fang YUAN, Peng HE, Rui NIE, Hong ZHANG

Abstract


The traditional IC card authentication method is single, once set, that can not be modified. In this paper, we propose an attack defense authentication method that can be used to define the authentication algorithm. IC card can be set according to the user's own algorithm authentication. This paper supports the algorithm can be divided into 8-byte packet and 16-byte packet packet length algorithm of two algorithms, the certification can be specified by the type of algorithm to complete the IC card authentication in order to achieve a certain security permissions to complete the need Operation of the authority certification. In this paper, we propose an authentication method of attack defense, which can limit the maximum number of external authentication key attempts to ensure the security of the transmitted data in the case of illegal attack.

Keywords


IC card, Self-defined algorithm, Algorithm packet length, Anti-attack


DOI
10.12783/dtetr/eeta2017/7750

Refbacks

  • There are currently no refbacks.