Applying AES Decryption on Personal Identification for QR Code Security System

碩士 === 建國科技大學 === 電機工程系暨研究所 === 102 === People often used the personal identity documents to deal with official work or money-related matters because government institutions or banks needed their identity authentication. To enhance the security and convenience of identity recognition, the study adop...

Full description

Bibliographic Details
Main Authors: Ying-Neng Sun, 孫英能
Other Authors: Chih-Hung Wu
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/96069160407003886260
id ndltd-TW-102CTU00442016
record_format oai_dc
spelling ndltd-TW-102CTU004420162017-07-22T04:28:52Z http://ndltd.ncl.edu.tw/handle/96069160407003886260 Applying AES Decryption on Personal Identification for QR Code Security System 運用AES加解密個人身分識別資料於QR Code安全保密系統之設計 Ying-Neng Sun 孫英能 碩士 建國科技大學 電機工程系暨研究所 102 People often used the personal identity documents to deal with official work or money-related matters because government institutions or banks needed their identity authentication. To enhance the security and convenience of identity recognition, the study adopted the ICCID code stored in the SIM card inside mobile phone to substitute for personal identity documents. The study developed the Android program to convert ICCID code into ciphertext by AES encryption, and then encoded the ciphertext to QR code. The QR code could replace the personal identity documents to avoid the personal identity documents being stolen to do illegal matters. Because the QR code could be produced any time by Android program on the personal mobile phone, it had better security and convenience compared with personal identity documents. The staff of government institutions or banks used webcam connected with the PC to photograph the QR code and then decode the QR code into ciphertext. The PC convert ciphertext into ICCID code by AES decryption and then search the database to process the identity authentication. The study proposed three security protections of personal identification. (1)The first security protection was QR code. People could not recognize the QR code by naked eye unless they photographed the QR code and then decode it. (2)The second security protection was to adopt key in the process of ICCID code encryption and decryption by AES algorithm. (3)To avoid the QR code is taken by others without agreement, so the study proposed a time-sensitive key as the third security protection. The key is combined user's password input on the side with time data, so it cannot be reused. Chih-Hung Wu 吳志宏 2014 學位論文 ; thesis 75 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 建國科技大學 === 電機工程系暨研究所 === 102 === People often used the personal identity documents to deal with official work or money-related matters because government institutions or banks needed their identity authentication. To enhance the security and convenience of identity recognition, the study adopted the ICCID code stored in the SIM card inside mobile phone to substitute for personal identity documents. The study developed the Android program to convert ICCID code into ciphertext by AES encryption, and then encoded the ciphertext to QR code. The QR code could replace the personal identity documents to avoid the personal identity documents being stolen to do illegal matters. Because the QR code could be produced any time by Android program on the personal mobile phone, it had better security and convenience compared with personal identity documents. The staff of government institutions or banks used webcam connected with the PC to photograph the QR code and then decode the QR code into ciphertext. The PC convert ciphertext into ICCID code by AES decryption and then search the database to process the identity authentication. The study proposed three security protections of personal identification. (1)The first security protection was QR code. People could not recognize the QR code by naked eye unless they photographed the QR code and then decode it. (2)The second security protection was to adopt key in the process of ICCID code encryption and decryption by AES algorithm. (3)To avoid the QR code is taken by others without agreement, so the study proposed a time-sensitive key as the third security protection. The key is combined user's password input on the side with time data, so it cannot be reused.
author2 Chih-Hung Wu
author_facet Chih-Hung Wu
Ying-Neng Sun
孫英能
author Ying-Neng Sun
孫英能
spellingShingle Ying-Neng Sun
孫英能
Applying AES Decryption on Personal Identification for QR Code Security System
author_sort Ying-Neng Sun
title Applying AES Decryption on Personal Identification for QR Code Security System
title_short Applying AES Decryption on Personal Identification for QR Code Security System
title_full Applying AES Decryption on Personal Identification for QR Code Security System
title_fullStr Applying AES Decryption on Personal Identification for QR Code Security System
title_full_unstemmed Applying AES Decryption on Personal Identification for QR Code Security System
title_sort applying aes decryption on personal identification for qr code security system
publishDate 2014
url http://ndltd.ncl.edu.tw/handle/96069160407003886260
work_keys_str_mv AT yingnengsun applyingaesdecryptiononpersonalidentificationforqrcodesecuritysystem
AT sūnyīngnéng applyingaesdecryptiononpersonalidentificationforqrcodesecuritysystem
AT yingnengsun yùnyòngaesjiājiěmìgèrénshēnfēnshíbiézīliàoyúqrcodeānquánbǎomìxìtǒngzhīshèjì
AT sūnyīngnéng yùnyòngaesjiājiěmìgèrénshēnfēnshíbiézīliàoyúqrcodeānquánbǎomìxìtǒngzhīshèjì
_version_ 1718503121843388416