| Cryptology is an elementary technique in IC card Application systems, and key management is the key in information security transmit. The dissertation is on task of the security problems of Smart IC Card and its application system that exist on information technology. At present, most of Encipher Algorithm data encryption and decipher techniques based on typical encrypt arithmetic, with the development of attack technology, and then there are some shortcomings in stability and reliability inevitably. So the transimittion of IC card information is facing to new challenge. Smart IC Card is classed into types that are Storage IC Card and CPU IC Card, on the base of its difference in structures and function in the dissertation, Furthermore, emphasis is paid to those two types on research projects on the information security technology respectively. In the research of IC Card, emphasis is paid to CPU Card especially non-touch IC Card on the security problem of information exchange, on the base of general analyze DES,RSA criterion encrypt arithmetic, introduce scroll code KEELOQ encrypt arithmetic, put forward a new type admixture encrypt arithmetic, and thorough research on the admixture encrypt arithmetic of security, DES encrypt arithmetic is the core of the admixture encrypt arithmetic, in the process of encryption, encrypt the work secret key two times, solving the shortage of secret key will be uncover easily because of the secret key is too short, and also remedy the disadvantage of unable to encrypt data of KEELOQ.Presently, the research on security of Smart IC Card is only a novel research branch in the world, and there has been no monographic study that takes the security of Smart IC Card as task comprehensively. Therefore, the research on the security of Smart IC Card has its urgent important significance in the development of chip and the research of the application system of Smart IC Card.In the study, the Cryptology Algorithm is designed with the method of software and VB (a design description language). According to the designing course and the necessary function, the encryption and decipher keys are divided into three modules. Every module is described with VB, and then all the programs would be simulated and tested. It takes modularized method to design the system, so it is easy to be designed, maintained and extended. |