Font Size: a A A

The Design And Implementation Of Software For Double-factor Authentication&Encryption Of Mobile Hard Disk

Posted on:2015-12-13Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhouFull Text:PDF
GTID:2298330452961139Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Mobile hard disk faces two security threats in its daily use. One is data leakageresulting from the storage of data in plain text. The other is lack of authentication,as a result, data could be tampered by unauthorized users. This paper aims toaddress these two security problems by making data stored in mobile hard diskinaccessible by unauthorized users, so as to protect user data. The main parts of thispaper include the following.The paper first discusses USB2.0protocol, and on that basis, interprets USBdevice request command and Bulk-Only Transport Protocol.The paper then analyzes authentication technology and proposes a two-factorauthentication method which takes smart IC card as the hardware device, combinedwith user password. User password is input through a keyboard in the device,without having to go through the user mainframe, thus leaving no trace on themainframe and avoiding being captured illegally. Through analyzing dataencryption and decryption technologies, the paper proposes SM1, a symmetricalgorithm, as the algorithm for data encryption and decryption. Data encryptedthrough hardware is stored in cipher text.Through analyzing key management, thepaper proposes a double key management and a split storage mechanism: the workkey is used to encrypt data and the encryption key is used to encrypt the work key.The encryption key is divided into two parts and stored in a chip and a smart ICcard respectively.In the following chapters, the paper completes the design, implementation andtesting of the double-factor authentication and encryption system. First, it usesUML modeling technology to build system use case model. Then it adopts astructural development approach to design key management chip and control chipfirmware program, and on that basis, realizes the system using development toolsCodeWarrior and Keil uVision3. Finally, it tests the realized function prototype. Ananalysis and comparison of the test results proves that the program proposed by thispaper is feasible. It achieves encrypted storage of data and makes data stored inmobile hard disk inaccessible by unauthorized users. The program can be used inreal life and can run well. The advantage of the proposed program lies in that itoccupies very few CPU resources.
Keywords/Search Tags:Mobile Hard Disk, Authentication, Data Encryption, Key Management
PDF Full Text Request
Related items