Tunghai University Institutional Repository:Item 310901/3707
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4250621      Online Users : 417
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/3707


    Title: 植基於橢圓曲線密碼學之具有身分驗證金鑰交換協定研究
    Other Titles: A Study of Authenticated Key Agreement Schemes Based on Elliptic Curve
    Authors: 黃國榮
    Huang, Kuo-Jung
    Contributors: 林祝興
    Lin, Chu-Hsing
    東海大學資訊工程學系
    Keywords: 確認身份金鑰交換協定;橢圓曲線密碼學;Diffie-Hellman鑰匙交換方法;共享密碼;憑證
    Tripartite Authenticated Key Agreement Protocol;Elliptic Curve Cryptography;the Diffie-Hellman Key Agreement Protocol;Shared-password;Certificate;Man-in-the-middle Attack
    Date: 2003
    Issue Date: 2011-04-27T06:56:33Z (UTC)
    Abstract: 在本論文中,我們設計了兩個具有確認身份的金鑰交換方法,並且利用橢圓曲線密碼學來產生使用者的金鑰。傳統的Diffie-Hellman鑰匙交換方法並無提供通訊雙方身份的驗證,因此,Seo和Sweneey在1999年提出了共享密碼的概念來驗證通訊雙方的身份,並利用冪次方運算產生通訊鑰匙。另外,Joux在2000年利用Wail Pairing的特性提出了三方的Diffie-Hellman金鑰交換協定,在Joux的協定中每個人只需廣播一次公開的訊息就可協議出一把共同的通訊鑰匙,但無法提供使用者的身份驗證,在2003年Kyungah Shim年為了解決Joux協定的問題提出了具有身份驗證的三方金鑰交換協定,Kyungah的協定主要的概念是利用憑證來作身份的驗證,並將Wair Pairing運用在冪次方的運算。 在我們的方法中,第一個方法是先利用共享密碼產生認證訊息,雙方再互相驗證訊息來確認通訊雙方的身份、第二個方法則是藉由憑證來確認通訊者的身份、加強金鑰交換協定的安全度,在提出的兩個方法都加入了時戳限制認證訊息的有效時間並且透過橢圓曲線來加快運算速度,此外,在計算量方面第一個方法只需Seo-Sweeny協定的四分之一,第二個方法則維持與Kyungah Shim協定相同的安全度下,減少通訊鑰匙的計算量。最後,我們在論文中會討論這兩種協定的安全性質,並對常見的攻擊作分析。
    In this thesis, we proposed two authenticated key agreement protocols on Elliptic Curve Cryptography. The basic Diffie-Hellman protocol doesn’t authenticate the communicating entities and is vulnerable to the man-in-the-middle attack. To provide authenticity to key agreement protocols, we respectively use shared-password in our first protocol and certificates to our second protocol. Besides, we applied the elliptic curve cryptography for the generation of keys to improve the efficiency. In the first protocol, the authenticated message is generated with the shared-password and the receiver can verify it with his shared-password to ascertain the sender’s identify. The second protocol is one round tripartite authenticated key agreement protocol on the public key infrastructure. Each entity in the second protocol must send a message including his own signature to demonstrate that he is the owner of the certificate. To avoid an adversary intercepting the signature and resending it to others, signature of the sender includes his ephemeral public key and a short-lived timestamp. Besides, we provide the security analysis about our protocols.
    Appears in Collections:[Department of Computer Science and Information ] Master's Theses

    Files in This Item:

    File SizeFormat
    091THU00394020-001.pdf131KbAdobe PDF196View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback