淡江大學機構典藏:Item 987654321/35181
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64198/96992 (66%)
Visitors : 7915080      Online Users : 8612
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/35181


    Title: A study of authentication protocol for mobile networks
    Other Titles: 行動通訊網路鑑別技術之研究
    Authors: 蘇豐富;Su, Feng-fu
    Contributors: 淡江大學資訊工程學系博士班
    黃仁俊;Hwang, Ren-junn
    Keywords: 行動通訊網路;鑑別技術;RSA實現;解密演算法;串流密碼;mobile networks;authentication protocol;RSA implementation;decryption algorithm;stream cipher
    Date: 2006
    Issue Date: 2010-01-11 06:07:24 (UTC+8)
    Abstract: 在現今的行動通訊中,個人的隱私與安全是使用者最關心的議題。密碼系統是保障機密與敏感性資料的一種重要技術,然而,主流的行動通訊設備製造商採用的處理器計算能力有限,以致於無法採用先進的安全技術。本論文將設計開發一些鑑別技術實現方法與有效率的鑑別技術。目前有許許多多的行動通訊安全協定是架構在RSA方法上,所以,我們首先設計一個架構於德州儀器公司的TMS320C55x系列數位訊號處理器的RSA實現方法,使得先進的安全協定可以運用於行動通訊設備上。然而,在許多的RSA應用中,常常選用較小的公開金鑰來縮短加密時間,解密部分依舊要耗費許多時間。為解決此一問題,我們提出一個利用強質數特性的RSA解密方法,此方法可以有效的提昇RSA的解密效率。最後,我們設計一個適用於行動通訊網路的鑑別機制。此機制植基於對稱式密碼系統、詢問-回覆與雜湊鍊節等密碼技術,而且提供了相互鑑別的特性。除此之外,本方法將產生使用者與服務供應商之間的通訊會談金鑰,以保護通訊內容,而且金鑰分配中心可利用金鑰轉換函數來避免使用者秘密金鑰的維護工作。
    In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobile manufacturers can hardly adopt advanced security protocol to mobile devices, due to the limited computational ability of the processor they employ. Against the backdrop that many good authentication protocols of mobile network are based on RSA operations, the author of this dissertation shall design and propose some implementation methods and authentication protocols. First, the author designs an efficient and practical method to implement RSA algorithm originated from Texas Instruments TMS320C55x family, in order to make it possible to add an advanced security protocol to mobile networks. The TMS320C55x family is widely adopted in many wireless and mobile devices. While most of these RSA applications use a small public key to speed up the encryption operation, the decryption operation inevitably takes more computational time performing an operation of modular exponentiation. To solve this problem, the author proposes a RSA decryption method based on the strong prime criterion. The proposed method can greatly enhance the performance of the RSA decryption. The author proposes some implementation methods of public key cryptosystem to enhance the performance; however, the public key cryptosystem is still slower than the symmetric key cryptosystem. Finally, the author proposes a new efficient authentication protocol for mobile networks. The proposed protocol is based on the symmetric cryptosystem, challenge-response, and hash chaining, in which the user, the service provider, and the key distribution center authenticate mutually. In addition, the user and the service provider will generate a secret session key for their communication in this protocol. With the key derivation function, the key distribution center of mobile networks does not need to maintain the secret key database of users. The proposed protocol can be properly applied to the mobile networks.
    Appears in Collections:[Graduate Institute & Department of Computer Science and Information Engineering] Thesis

    Files in This Item:

    File SizeFormat
    0KbUnknown525View/Open

    All items in 機構典藏 are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback