当前位置:主页 > 科技论文 > 网络通信论文 >

手机支付积分商城系统的设计与实现

发布时间:2018-01-15 07:13

  本文关键词:手机支付积分商城系统的设计与实现 出处:《湖南大学》2014年硕士论文 论文类型:学位论文


  更多相关文章: 积分商城 手机支付公司 电子商务 积分换礼 智能终端


【摘要】:据2012年工业和信息化部的统计报告显示,中国手机支付公司在以大约每年百分之五的速度递增。每个手机支付公司都在面临着日益严重的商业竞争、日益萎缩的客户资源、日益增高的售后服务要求等问题。积分商城的建设已经成为了手机支付公司增强竞争实力、稳定客户资源、提高售后服务水平的有效出路。论文的创新点在于手机支付加密算法的设计。现有远程加密支付算法的主要问题在于加密过程中的基于DES的分散参数X通过三次种子密钥加密过程中是对称的,这样很容易因为左半部分或右半部分的密钥参数被破解而导致密钥失效。在借鉴了现有的手机支付加密算法的设计思想与实现手段的基础上,论文提出了一种STK远程支付加密算法。STK算法的设计思想核心在于采用左半边参数采用反X形式存在,这样就避免了现有算法的对称破译漏洞。STK算法的主要设计步骤是:首先,敏感数据加密密钥(DEK)和空中报文完整性密钥(MCK)的生成;其次,敏感数据加密密钥(DEK)和空中报文完整性密钥(MCK)的生成采用二级密钥体制:种子密钥、卡片远程支付STK子密钥;最后,不同类型的密钥有不同的种子密钥,再由种子密钥按分散算法分散获得对应的远程支付STK子密钥。
[Abstract]:According to the statistics report in 2012, the Ministry of industry and information technology, China mobile phone payment company increase at an annual rate of around five percent. Each mobile phone payment companies are facing increasingly serious business competition, shrinking customer resources, increasing customer service service requirements and other issues. The construction of integral mall has become a mobile phone payment company to increase the competitive strength, stable customer resources, improve the effective way to customer service service level. The innovation of this paper is to design the encryption algorithm of mobile phone payment. The existing problems of remote payment encryption algorithm X distributed parameter through the three seed key encryption process is symmetric based on DES in the encryption process, so it is easy for the key parameters of the left half or the right half cracked due to key failure. In reference to the existing mobile phone payment encryption algorithm design thinking Based on the thought and the realization method is proposed in this paper, the design of the core ideas of a STK remote payment encryption algorithm.STK algorithm is that the left half parameter by reverse X form, thus avoiding the main design steps of symmetric.STK algorithm algorithm to decipher existing vulnerabilities are: first, the sensitive data encryption key (DEK) and the message integrity key (MCK) generation; secondly, the sensitive data encryption key (DEK) and the message integrity key (MCK) generated by two key system: seed key, remote payment card STK key; finally, different types of keys have different seed key, then the key by seed the dispersion algorithm of decentralized remote payment STK to obtain the corresponding key.

【学位授予单位】:湖南大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP311.52;TN918.4

【参考文献】

相关期刊论文 前1条

1 徐宁;杨庚;;基于身份加密机制的光学加密密钥系统[J];通信学报;2012年04期



本文编号:1427314

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/1427314.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户0a5bd***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com