淡江大學機構典藏:Item 987654321/35181
English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64198/96992 (66%)
造訪人次 : 7930538      線上人數 : 2459
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://tkuir.lib.tku.edu.tw/dspace/handle/987654321/35181


    題名: A study of authentication protocol for mobile networks
    其他題名: 行動通訊網路鑑別技術之研究
    作者: 蘇豐富;Su, Feng-fu
    貢獻者: 淡江大學資訊工程學系博士班
    黃仁俊;Hwang, Ren-junn
    關鍵詞: 行動通訊網路;鑑別技術;RSA實現;解密演算法;串流密碼;mobile networks;authentication protocol;RSA implementation;decryption algorithm;stream cipher
    日期: 2006
    上傳時間: 2010-01-11 06:07:24 (UTC+8)
    摘要: 在現今的行動通訊中,個人的隱私與安全是使用者最關心的議題。密碼系統是保障機密與敏感性資料的一種重要技術,然而,主流的行動通訊設備製造商採用的處理器計算能力有限,以致於無法採用先進的安全技術。本論文將設計開發一些鑑別技術實現方法與有效率的鑑別技術。目前有許許多多的行動通訊安全協定是架構在RSA方法上,所以,我們首先設計一個架構於德州儀器公司的TMS320C55x系列數位訊號處理器的RSA實現方法,使得先進的安全協定可以運用於行動通訊設備上。然而,在許多的RSA應用中,常常選用較小的公開金鑰來縮短加密時間,解密部分依舊要耗費許多時間。為解決此一問題,我們提出一個利用強質數特性的RSA解密方法,此方法可以有效的提昇RSA的解密效率。最後,我們設計一個適用於行動通訊網路的鑑別機制。此機制植基於對稱式密碼系統、詢問-回覆與雜湊鍊節等密碼技術,而且提供了相互鑑別的特性。除此之外,本方法將產生使用者與服務供應商之間的通訊會談金鑰,以保護通訊內容,而且金鑰分配中心可利用金鑰轉換函數來避免使用者秘密金鑰的維護工作。
    In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobile manufacturers can hardly adopt advanced security protocol to mobile devices, due to the limited computational ability of the processor they employ. Against the backdrop that many good authentication protocols of mobile network are based on RSA operations, the author of this dissertation shall design and propose some implementation methods and authentication protocols. First, the author designs an efficient and practical method to implement RSA algorithm originated from Texas Instruments TMS320C55x family, in order to make it possible to add an advanced security protocol to mobile networks. The TMS320C55x family is widely adopted in many wireless and mobile devices. While most of these RSA applications use a small public key to speed up the encryption operation, the decryption operation inevitably takes more computational time performing an operation of modular exponentiation. To solve this problem, the author proposes a RSA decryption method based on the strong prime criterion. The proposed method can greatly enhance the performance of the RSA decryption. The author proposes some implementation methods of public key cryptosystem to enhance the performance; however, the public key cryptosystem is still slower than the symmetric key cryptosystem. Finally, the author proposes a new efficient authentication protocol for mobile networks. The proposed protocol is based on the symmetric cryptosystem, challenge-response, and hash chaining, in which the user, the service provider, and the key distribution center authenticate mutually. In addition, the user and the service provider will generate a secret session key for their communication in this protocol. With the key derivation function, the key distribution center of mobile networks does not need to maintain the secret key database of users. The proposed protocol can be properly applied to the mobile networks.
    顯示於類別:[資訊工程學系暨研究所] 學位論文

    文件中的檔案:

    檔案 大小格式瀏覽次數
    0KbUnknown526檢視/開啟

    在機構典藏中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋