Study of Applying RSA to Combining NFC Access Control System with OTP Secure Design

碩士 === 國立宜蘭大學 === 資訊工程學系碩士班 === 102 === Since RFID (Radio Frequency Identification, RFID) technology shows up , there are more and more mature development status, and the application of radio frequency identification systems slowly combine intelligent life. Now, RFID access control systems is everyw...

Full description

Bibliographic Details
Main Authors: Bo-Ting Chen, 陳柏廷
Other Authors: Chao-Hsi Huang
Format: Others
Language:zh-TW
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/6gv5vg
Description
Summary:碩士 === 國立宜蘭大學 === 資訊工程學系碩士班 === 102 === Since RFID (Radio Frequency Identification, RFID) technology shows up , there are more and more mature development status, and the application of radio frequency identification systems slowly combine intelligent life. Now, RFID access control systems is everywhere in our daily life, and soon RFID technology will become Indispensable. However, there are still some serious security defects in RFID access control system. In this paper, we investigate the asymmetric encryption algorithms (Asymmetric Encryption algorithms, RSA) and one-time password technology (One Time Password, OTP) in combination, through secure hash algorithm (Secure Hash Algorithm, SHA1), and by irreversible way, to enhance the strength of the password, which allows users take advantage of the near Field communication (Near Communication, NFC) Tagging feature. To replace the existing wired connection operations and related data transfer complicated settings for password. Speaking of RFID authentication security, we all know that RFID has security threats, yet this study proposes a password strength enhanced solutions through the RSA decryption. Decoders must have its own private key, and the replacement of aging OTP password technology. Therefore, we made use of the public and private keys through Double Hash way to do defensive action against these attacks, force approach by comparing the three algorithms to construct a more secure algorithm, which provides our users more security.