博碩士論文 87325042 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:23 、訪客IP:18.226.185.207
姓名 楊書青(Shu-Ching Yang)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 利用分享會議金鑰之構成要素演算法, 完成點對點之安全無線通訊
(The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication)
相關論文
★ 具多重樹狀結構之可靠性群播傳輸★ 在嵌入式行動裝置上設計與開發跨平台Widget
★ 在 ARM 架構之嵌入式系統上實作輕量化的手持多媒體播放裝置圖形使用者介面函式庫★ 基於網路行動裝置所設計可擴展的服務品質感知GStreamer模組
★ 針對行動網路裝置開發可擴展且跨平台之GSM/HSDPA引擎★ 於單晶片多媒體裝置進行有效率之多格式解碼管理
★ IMS客戶端設計與即時通訊模組研發:個人資訊交換模組與即時訊息模組實作★ 在可攜式多媒體裝置上實作人性化的嵌入式小螢幕網頁瀏覽器
★ 以IMS為基礎之及時語音影像通話引擎的實作:使用開放原始碼程式庫★ 電子書嵌入式開發: 客制化下載服務實作, 資料儲存管理設計
★ 於數位機上盒實現有效率訊框參照處理與多媒體詮釋資料感知的播放器設計★ 具數位安全性的電子書開發:有效率的更新模組與資料庫實作
★ 適用於異質無線寬頻系統的新世代IMS客戶端軟體研發★ 在可攜式數位機上盒上設計並實作重配置的圖形使用者介面
★ Friendly GUI design and possibility support for E-book Reader based Android client★ Effective GUI Design and Memory Usage Management for Android-based Services
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 無論是有線或是無線網路,隱密性和安全性愈來愈受到重視。有線的通訊環境,不但線路架設費時昂貴外,更限制使用者接受服務時的行動;反觀,在無線通訊環境,人們可以隨時隨地、方便迅速地接受服務。對於資料傳送時的隱密性和安全性,通常我們都是利用加解密演算法來達成。然而,如果加解密演算法被犯罪者濫用,進而隱藏犯罪過程,如此一來,必定違害社會安全。
近年來,無線通訊市場的快速發展,提供更多的電信加值服務及應用,WAP (無線應用協定) 提供手機能夠隨時隨地查閱最即時的訊息,如:新聞報導、股市行情、行動銀行、電子商務、瀏覽網際網路等最新的資料。雖然可以利用加解密演算法的輔助,保護傳送時的訊息,但是,以手機的運算能力和電力,卻不適合使用複雜運算的公開金鑰演算法,只能使用對稱金鑰演算法完成資料的隱密和安全。
在本篇論文,我們提出新的、且適用於數位通訊系統的加解密演算法,這個演算法,不但能夠兼顧資料傳送時的隱密性和安全性之外,更能在可能危及社會安全時,對可疑通訊進行合法監聽。考量手機本身不足的電力和運算能力,我們決定改良對稱金鑰演算法,來達成點對點的安全傳輸和不可否認性的服務,不可否認性服務,在以前的對稱金鑰算法是不可能達成的,但在我們改進的演算法中,我們提供了如同公開金鑰演算法才能完成的不可否認性服務。不同於公開金鑰演算法,我們改進的對稱金鑰演算法,是當通訊發生可疑或是對訊息內容有所爭議時,才由公正第三者做評斷。
要完成點對點的安全傳輸及不可否認性,我們把會議金鑰之構成要素分給幾個可信賴的金鑰託管機構,在通訊可疑或有爭議時,在政府法院許可之下,調查單位便可以和金鑰託管機構,對發生爭議的通訊對合法的監聽。
我們提出的演算法,不但加強了第二代行動通訊系統的安全程度,更能提供原有系統所缺乏的點對點安全傳輸和不可否認性服務。雖然使用我們的演算法,卻不會佔用系統太多的頻寬,也不會增加太多傳輸時的延遲時間。
摘要(英) No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quickly and conveniently. The essential of most security methods is encryption. Encryption can be used to provide message privacy and integrity. However, if encryption is strong enough and becomes readily available in communications equipment, once manipulated by rascals or criminals, public safety could be seriously risked.
With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information including news reports, stock fluctuation, mobile bank, E-Commerce and browse Internet any time, anywhere. For current device with lower power and finite computing capability, it is not suitable to encrypt transmission message using public-key encryption algorithm.
In the thesis, we propose a new protocol for digital mobile communications. This protocol permits users to hold a secure conference and ensures public safety. Considering the limited computing capability of mobile phone device, we improve traditional symmetric key encryption algorithm to achieve end-to-end security and non-repudiation for each individual communication connection. Different from public-key encryption algorithm, non-repudiation of our proposed symmetric key encryption algorithm is arbitrated once the communication is disputed or doubted to endanger public safely.
To achieve end-to-end security and non-repudiation service, we will distribute ‘Session Key Components’ to several believable organizations, called KETO (Key Escrow Trust Organization). As long as one particular communication transmission is doubted to endanger or dispute with public safety, the CS (Count System) will consult with KETOs to recover session key after the government agreement.
Our new security protocol of the thesis not only enhances the second-generation wireless communication, but also provides end-to-end confidentiality and non-repudiation service. Although ‘Sharing Session Key Component’ algorithm is used in the wireless communication, the required bandwidth is much lower than the GSM capacity, and signaling message transaction delay time increases only one RDT (Radio Delay Time), in addition to original ADT (Authentication Delay Time) of GSM.
關鍵字(中) ★ 安全的無線通訊
★ 行動銀行
★ 行動電子商務
★ 電子商務
★ 點對點加解密
★ 金鑰分享
★ GSM安全性
★ 行動通訊
關鍵字(英) ★ secure wireless communication
★ mobile bank
★ mobile E-Commerce
★ E-Commerce
★ end-to-end encryption
★ key sharing
★ GSM security
★ mobile communications
論文目次 Chapter 1 Introduction9
1.1 E-Commerce requirement9
1.2 E-Commerce on the wireless environment10
1.3 Security methods10
1.4 Current wireless network approach11
1.5 End to End Secure Protocol for Digital Mobile Users13
Chapter 2 Overview of the wireless network environment15
2.1 The recent cellular wireless network system15
2.1.1 GSM15
2.1.2 WTLS (Wireless Transport Layer Security)17
2.1.3 General Packet Radio Service system security development18
2.2 Security cellular wireless network proposition19
2.3 System architecture21
Chapter 3 Descriptions of the authentication functions for mobile service24
3.1 Mobile station regulative model24
3.2 Operational components requirement26
3.2.1 Administrator26
3.2.2 Access controller27
3.2.3 Authenticator28
3.2.4 Security service29
Chapter 4 Protocol description on end-to-end confidentiality and non-repudiation service30
4.1 Improved symmetric key encryption31
4.2 Secure session key negotiated32
4.3 Protocol to realize end-to-end confidentiality and non-repudiation service36
Chapter 5 Protocol algorithm analysis38
5.1 Bandwidth requirement on improved wireless system38
5.2 Delay time on improved wireless system41
5.3 Comparison of encryption algorithm43
Chapter 6 Conclusion45
Reference47
參考文獻 [1]K. Al-Tawil, A. Akrami, H. Youssef, “A new authentication protocol for GSM networks, ” Local Computer Networks, 1998. LCN '98. Proceedings., 23rd Annual Conference on , 1998 , Page(s): 21 -30
[2]B. Askwith, M. Merabti, Q. Shi, K. Whiteley, “Achieving user privacy in mobile networks,” Computer Security Applications Conference, 1997. Proceedings., 13th Annual , 1997 , Page(s): 108 -116
[3]C. Brookson, “GSM security: a description of the reasons for security and the techniques,” Security and Cryptography Applications to Radio Systems ,IEE Colloquium on , 1994 , Page(s): 2/1 -2/4
[4]D. Brown, “Techniques for privacy and authentication in personal communication systems, ” IEEE Personal Communications Volume: 2 4 , Aug. 1995 , Page(s): 6 -10
[5]D. G. W. Birch, I. J. Shaw, “Mobile communications security-private or public, ” Security and Cryptography Applications to Radio Systems, IEE Colloquium on , 1994 , Page(s): 5/1 -5/6
[6]C. Carroll, Y. Frankel, Y. Tsiounis, “Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems,” Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on , 1998 , Page(s): 66 -76
[7]C. H. Chang, K. Tu, K. C Chen, “Efficient end-to-end authentication protocols for mobile networks,” Personal, Indoor and Mobile Radio Communications, 1996. PIMRC'96., Seventh IEEE International Symposium on Volume: 3 , 1996 , Page(s): 1252 -1256 vol.3
[8]L. P. Chin, “A secure registration protocol for wireless Internet, ” Personal, Indoor and Mobile Radio Communications, 1997. Waves of the Year 2000. PIMRC '97., The 8th IEEE International Symposium on Volume: 2 , 1997 , Page(s): 495 -499 vol.2
[9]D. E. Denning, M. Smid, “Key escrowing today,“ IEEE Communications Magazine Volume: 32 9, Sept. 1994, Page(s): 58 -68D. Brown, “Techniques for privacy and authentication in personal communication systems, ” IEEE Personal Communications Volume: 2 4 , Aug. 1995 , Page(s): 6 -10
[10]H. L. Galiano, L. L. Ling, “An analysis of signaling traffic for authentication and privacy protocols in cellular and PCS systems, ” Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International , 1998 , Page(s): 329 -334 vol.1
[11]S. R. Hall and D. P. Maher, “Closing in on wireless privacy,” AT&T Technol., vol. 8, pp. 22-25, 1993
[12]N. Jefferies, “Security in third-generation mobile systems, ” Security in Networks (Digest No. 1995/024), IEE Colloquium on 1995 , Page(s): 8/1 -8/5
[13]J. Kim, M. Oh, T. Kim, “Security requirements of next generation wireless communications,” Communication Technology Proceedings, 1998. ICCT '98. 1998 International Conference on , 1998 , Page(s): 6 pp. vol.1
[14]C. C Lo, Y. J. Chen ,“Secure communication mechanisms for GSM networks, ” Consumer Electronics, IEEE Transactions on Volume: 45 4 , Nov. 1999 , Page(s): 1074 -1080 N. Jefferies, “Security in third-generation mobile systems, ” Security in Networks (Digest No. 1995/024), IEE Colloquium on 1995 , Page(s): 8/1 -8/5
[15]L. Makris, N. Argiriou, M. G. Strintzis, “Network access and data security design for telemedicine applications,” Computers and Communications, 1997. Proceedings., Second IEEE Symposium on , 1997 , Page(s): 523 -527
[16]S. Mohan, “Two User Location Strategies for Personal Communications Services,” IEEE Personal Communications, p.42-50. First Quarter 1994.
[17]S. Mohan, “Privacy and authentication protocols for PCS, ” IEEE Personal Communications Volume: 3 5 , Oct. 1996 , Page(s): 34 —38
[18]C. P. Pfleeger, “Security In Computing,” 1st ed: Pentice Hall International, 1989.
[19]G. Pollini, D. Goldman, “Signaling System Performance — Evaluation for PCS,” IEEE Transactions On Vehicular Technology, p. 131-138, Feb. 1996.
[20]R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” communications of the ACM, vol. 21, no.2, pp.120-126, 1978
[21]K. T. Salli, T. Hamalainen, J. Knuutila, J. Saarinen, “Security design for a new wireless local area network TUTWLAN, ” Personal, Indoor and Mobile Radio Communications, 1998. The Ninth IEEE International Symposium on Volume: 3 , 1998 , Page(s): 1540 -1544 vol.3
[22]V. Varadharajan, Y. Mu ,“Preserving privacy in mobile communications: a hybrid method,” Personal wireless Communications, 1997 IEEE International Conference on , 1997 , Page(s): 532 —536
[23]D. Weissman, D. W. Dudich, M. S. Grob, “End-to-end security for commercial PCS networks,” Military Communications Conference, 1995. MILCOM '95, Conference Record, IEEE Volume: 3 , 1995 , Page(s): 1253 -1257 vol.3
[24]M. Walker, R. Forbes, D. Gollman, “Security aspects of third generation mobile telecommunications systems, ” Mobility in support of Personal Communications, IEE Colloquium on , 1993 , Page(s): 5/1 -5/4
[25]“The SSL Protocol Version 3.0” , Netscape Communications Corporation, March 1996
[26]“GSM 03.20 version 7.2.0 Release 1998: Digital cellular telecommunications system (Phase 2+) ; Security Related Network Functions”, European Telecommunications Standards Institute, Nov, 1999
[27]“GSM 01.61 version 6.0.1 Release 1997: Digital cellular telecommunications system (Phase 2+) ;General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements”, European Telecommunications Standards Institute, July, 1998
[28]“WAP WTLS version 18-Feb-2000, Wireless Application Protocol: Wireless Transport Layer Security Specification”, Wireless Application Protocol Forum Ltd.
指導教授 吳曉光(Hsiao-kuang Wu) 審核日期 2000-7-18
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明