KEYWORDS: Computer security, Symmetric-key encryption, Data centers, Algorithm development, Information security, Data transmission, Switching, Data processing, Transportation security, Switches
This paper introduces the current application status and main security issues of IC card in the field of urban public transport internationally and domestically, and proposes to strengthen the application security of IC card by using dual algorithms. Dual algorithms mean the two most popular types of encryption algorithms currently used: algorithms 3DES and SM4 in terms of symmetric keys; RSA algorithm and SM2 algorithm based on ECC in terms of asymmetric keys. The two types of encryption algorithms have their own characteristics: algorithms 3DES and RSA, as internationally agreed cryptographic algorithms, have the advantages of good applicability and compatibility. However, the technological progresses pose a risk of being decoded constantly. If we enhance the decoding difficulty by increasing the encryption length, the computing speed will become lower and resources consumption higher. Algorithms SM2 and SM4 which are the cryptographic algorithms independently researched and developed in China, are superior to the algorithms 3DES and RSA in terms of encryption and decryption speed, resource consumption and security, but they don’t bring enough applicability. In view of the features of the two types of cryptographic algorithms, this Paper proposes to integrate the two types of algorithms into one IC card, and to switch the algorithm by the algorithm indicator or the algorithm switching instruction, so as to achieve the adaptive execution of appropriate algorithm based on practical conditions. Therefore, it can enhance the application security of IC card while ensure the wide application range.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.