English  |  正體中文  |  简体中文  |  Items with full text/Total items : 73032/73032 (100%)
Visitors : 23067965      Online Users : 267
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/72030

    Title: 改良非對稱式Rabin 密碼系統用於物聯網;Improving the Asymmetric Rabin Cryptosystem
    Authors: 林世昌;Lin,Shih-Chang
    Contributors: 資訊工程學系在職專班
    Keywords: 物聯網;非對稱式密碼系統;Rabin 密碼系統;安全性;Internet of Things;Asymmetric Cryptography;Rabin cryptosystem;Security
    Date: 2016-07-21
    Issue Date: 2016-10-13 14:22:36 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 物聯網是最近很熱門的議題,吸引非常多研究的關注,具有十分廣闊的市場
    章之用。本研究改良Rabin 密碼系統的非對稱式加解密技術應用於物聯網,其做
    字節進行加密產生密文,如此可以防止Rabin 密碼系統遭受選擇密文攻擊。本研
    究也利用Rabin 密碼系統在加密與解密計算成本也不對稱的特性,讓物聯網中計
    (privacy) 、完整性(integrity) 、不可否認(non-repudiation)及驗證識別
    (Authentication)等特性。;In recent years, Internet of Things (IoT) has been a hot topic; it
    has attracted much research attention and has promising market
    prospects. IoT can be used to connect real world objects to the Internet,
    and thus creates novel applications, such as home care, smart cities,
    and smart factories. With the increasing adoption of IoT applications,
    the security of IoT data transmission is more and more important.
    Moreover, many IoT systems exchange data via wireless communications.
    Hackers are thus easy to intercept information to launch attacks. The
    encryption and decryption techniques of cryptosystems are applied to
    tackle the IoT security issues. The techniques are classified into two
    kinds: symmetric techniques and asymmetric techniques. Symmetric
    techniques use the same key to encrypt and decrypt data exchanged
    between devices. Asymmetric techniques use a pair of a public key and
    a private key to encrypt and decrypt data. Symmetric techniques have
    lower computation costs, but the distribution and management of keys
    are difficult for this kind of techniques. Asymmetric techniques have
    higher computation costs, but the public keys can be publicly
    distributed without leaking the system secrets. Moreover, they can be
    used to achieve digital signatures. This study is to improve the
    asymmetric Rabin cryptosystem for applying it to the IoT to resist the
    chosen ciphertext attack by duplicating the last few plaintext bytes
    of an arbitrary length that is within a fixed range. Moreover, this
    study utilizes the fact that the computation costs of encryption and
    decryption are also asymmetric in the Rabin cryptosystem. IoT devices
    with limited resources encrypt/decrypt data with lower computation,
    while devices with adequate resources encrypt/decrypt data with higher
    computation costs. The improved Rabin system is to endow the IoT with
    the properties of privacy, integrity, non-repudiation and
    Appears in Collections:[資訊工程學系碩士在職專班 ] 博碩士論文

    Files in This Item:

    File Description SizeFormat

    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明