English  |  正體中文  |  简体中文  |  Items with full text/Total items : 65318/65318 (100%)
Visitors : 22012061      Online Users : 241
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/72030


    Title: 改良非對稱式Rabin 密碼系統用於物聯網;Improving the Asymmetric Rabin Cryptosystem
    Authors: 林世昌;Lin,Shih-Chang
    Contributors: 資訊工程學系在職專班
    Keywords: 物聯網;非對稱式密碼系統;Rabin 密碼系統;安全性;Internet of Things;Asymmetric Cryptography;Rabin cryptosystem;Security
    Date: 2016-07-21
    Issue Date: 2016-10-13 14:22:36 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 物聯網是最近很熱門的議題,吸引非常多研究的關注,具有十分廣闊的市場
    前景。透過物聯網技術,現實世界的真實物體皆可連結上網,因而延伸出許多新
    穎的應用,例如居家照護、智慧城市與智慧工廠等。隨著物聯網的應用越來越廣
    泛,資料的安全性也顯得越益重要。尤有甚者,許多物聯網設備藉由無線電傳輸
    來交換資料,攻擊者很容易可以擷取以無線電傳輸的資料封包,造成使用者資料
    外洩。因此,如何使用密碼系統的加解密技術來確保私密資料的安全性,成為發
    展物聯網的一個重要議題。現今的加解密技術可分為對稱式與非對稱式兩類。對
    稱式技術在加密與解密時所使用的金鑰是相同的,而其計算成本是兩類技術中較
    低的,但是金鑰的發佈與管理確較為困難。非對稱式技術使用一組相關連但是不
    同的公鑰和私鑰進行加密與解密,其計算成本是兩類技術中較高的,但是公鑰可
    以公開發佈,因此金鑰的發佈與管理確較為容易,而且可以利用公鑰做為數位簽
    章之用。本研究改良Rabin 密碼系統的非對稱式加解密技術應用於物聯網,其做
    法為隨機選定某個在固定已知範圍內的數值,並根據此數值重複明文的最後幾個
    字節進行加密產生密文,如此可以防止Rabin 密碼系統遭受選擇密文攻擊。本研
    究也利用Rabin 密碼系統在加密與解密計算成本也不對稱的特性,讓物聯網中計
    算能力與記憶體空間有限制的設備使用成本較低的計算進行加解密,而其他資源
    較充足的設備則使用成本較高的計算進行加解密,預期可以使物聯網具有隱私性
    (privacy) 、完整性(integrity) 、不可否認(non-repudiation)及驗證識別
    (Authentication)等特性。;In recent years, Internet of Things (IoT) has been a hot topic; it
    has attracted much research attention and has promising market
    prospects. IoT can be used to connect real world objects to the Internet,
    and thus creates novel applications, such as home care, smart cities,
    and smart factories. With the increasing adoption of IoT applications,
    the security of IoT data transmission is more and more important.
    Moreover, many IoT systems exchange data via wireless communications.
    Hackers are thus easy to intercept information to launch attacks. The
    encryption and decryption techniques of cryptosystems are applied to
    tackle the IoT security issues. The techniques are classified into two
    kinds: symmetric techniques and asymmetric techniques. Symmetric
    techniques use the same key to encrypt and decrypt data exchanged
    between devices. Asymmetric techniques use a pair of a public key and
    a private key to encrypt and decrypt data. Symmetric techniques have
    lower computation costs, but the distribution and management of keys
    are difficult for this kind of techniques. Asymmetric techniques have
    higher computation costs, but the public keys can be publicly
    distributed without leaking the system secrets. Moreover, they can be
    used to achieve digital signatures. This study is to improve the
    asymmetric Rabin cryptosystem for applying it to the IoT to resist the
    chosen ciphertext attack by duplicating the last few plaintext bytes
    of an arbitrary length that is within a fixed range. Moreover, this
    iii
    study utilizes the fact that the computation costs of encryption and
    decryption are also asymmetric in the Rabin cryptosystem. IoT devices
    with limited resources encrypt/decrypt data with lower computation,
    while devices with adequate resources encrypt/decrypt data with higher
    computation costs. The improved Rabin system is to endow the IoT with
    the properties of privacy, integrity, non-repudiation and
    authentication.
    Appears in Collections:[資訊工程學系碩士在職專班 ] 博碩士論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML210View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明