跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.17) 您好!臺灣時間:2025/09/03 19:25
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:蔡善智
研究生(外文):Cai, Shan Zhi
論文名稱:一個基於加強進階訊息佇列協定的橢圓曲線加密算法
論文名稱(外文):An Elliptic Curve Cryptography Algorithm Based On An Enhance Advanced Message Queuing Protocol
指導教授:羅濟群羅濟群引用關係
指導教授(外文):Lo, Chi-Chun
口試委員:林熙禎黃興進
口試委員(外文):Lin, Shi-JenHwang, Hsin-Ginn
口試日期:2016-07-13
學位類別:碩士
校院名稱:國立交通大學
系所名稱:管理學院資訊管理學程
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:59
中文關鍵詞:訊息導向中介軟體進階訊息佇列協定橢圓曲線加密
外文關鍵詞:Message-Oriented MiddlewareAdvanced Message Queuing ProtocolElliptic Curve Cryptography
相關次數:
  • 被引用被引用:0
  • 點閱點閱:185
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
近年來,隨著無線網路的快速發展,跨平台通訊用的訊息導向中介軟體( message-oriented middleware )已經變得十分普遍,無所不在,且在這互聯網流行的議題上,如何讓智慧型移動裝置於異質平台服務中,能有快速又安全的資訊傳遞功能,將是一個重要的研究目標。因此本論文採用進階訊息佇列協定(Advanced Message Queuing Protocol )作為訊息傳遞基礎,並搭配橢圓曲線加密( Elliptic Curve Cryptography ),來保護資料安全,目的是透過加密把資料切割成區塊密文,再利用的混合式路由篩選方法,將資料平均分配至訊息佇列中儲存,最後解密並還原資料;藉此達到讓機密資訊使用者只需選擇適合的路由篩選方法,不須因資安問題,新增或修改應用程式本身,便可擁有高隱密資料傳輸所帶來的便利與彈性,符合快速又安全的異質平台數據傳輸目標。本方法建議在192 /224 bit橢圓曲線加密下搭配混合式路由篩選方法的雙工傳輸模式( Duplex-method )可達最佳傳輸效能與資安防護效果。

In recent years, with the rapid development of Internet, cross-platform communications with message-oriented middleware (message-oriented middleware) has become very widespread, ubiquitous, and the Internet in this popular issue, how to make smart mobile device heterogeneous platform to the service, to have information quickly and safely transfer function, will be an important research goal. Therefore, this paper uses Advanced Message Queuing Agreement (Advanced Message Queuing Protocol) as the basis for message passing, and with elliptic curve cryptography (Elliptic Curve Cryptography), to protect information security, aimed at cutting through the encryption of the data a block cipher text, hybrid routing screening methods reuse the materials evenly to the message queue storage, and finally decrypt and restore data; thereby allow confidential information to reach users only need to select the appropriate routing screening methods, not shall be due to information security issues, add or modify the application itself, you can have a high data transfer secret brings flexibility and convenience, quickly and safely meet the heterogeneous platform data transfer destination. This method is recommended 192/224 bit elliptic curve cryptography with lower hybrid duplex transmission mode (Duplex-method) can reach the optimum transmission performance and information security protection effect routing screening methods.
摘要 ii
Abstract iii
誌謝 v
目錄 vi
表目錄 viii
圖目錄 ix
第1章. 緒論 1
1.1 研究背景與動機 1
1.2 研究目標 2
1.3 研究方法 3
1.4 論文架構 3
第2章. 文獻探討 4
2.1訊息導向中介軟體message-oriented middleware 4
2.2進階訊息佇列協定 5
2.2.1進階訊息佇列協定之訊息格式 5
2.2.2進階訊息佇列協定之訊息功能及架構 9
2.2.3進階訊息佇列協定之訊息傳輸及狀態 12
2.2.4進階訊息佇列協定之傳輸架構 17
2.3橢圓曲線加密 19
2.3.1 美國國家標準與技術研究院( NIST )橢圓曲線Over Prime Fields 23
2.3.2 標準高效加密集團( SECG )橢圓曲線Domain Parameters 25
2.3.3 Koblitz曲線 27
2.3.4 橢圓曲線 Diffie-Hellman 28
第3章. 一個基於加強進階訊息佇列協定的橢圓曲線加密算法 29
3.1問題定義 29
3.2參數名詞定義 29
3.3一個基於加強進階訊息佇列協定的橢圓曲線加密算法 30
3.4 小結 34
第4章. 系統實作與實驗分析結果 35
4.1 系統實作 35
4.1.1系統平台和程式語言 36
4.1.2 實驗模擬方法步驟 38
4.2 實驗與結果分析 43
4.2.1 實驗模擬情境假設 43
4.2.2 實驗模擬數據輸出 48
4.2.3 實驗結果分析比較 52
4.3 實驗結論 54
第5章. 結論與未來研究方向 55
5.1結論 55
5.2未來研究方向 55
參考文獻 57
附錄A: Configuration 59

[1]Vinoski, S. (2006). "Advanced Message Queuing Protocol" . Ieee Internet Computing 10 (6): 87–89. doi:10.1109/MIC.2006.116.
[2]Definition of: wire protocol. PCMAG.COM. Retrieved 2011-04-11 Available: http://www.pcmag.com/
[3]Jacques Vélu, Courbes elliptiques , Société Mathématique de France, 57, 1-152, Paris, 1978.
[4]The Original RSA Patent as filed with the U.S. Patent Office by Rivest; Ronald L. (Belmont, MA), Shamir; Adi (Cambridge, MA), Adleman; Leonard M. (Arlington, MA), December 14, 1977, U.S. Patent 4,405,829.
[5]Portal 2 PC/PS3 Cross-platform. Eurogamer. Retrieved January 24, 2012.
[6]Technologies and Applications of Artificial Intelligence: 19th. Shin-Ming Cheng, ‎Min-Yuh Day - 2014 - ‎Computers.
[7]OASIS Forms AMQP Technical Committee to Advance Business Messaging Interoperability Within Middleware, Mobile, and Cloud Environments. Available: http://www.openamq.org/
[8]AMQP version 1.0 provides the pieces necessary to enable messaging clients and servers to interoperate seamlessly, regardless of their technology. Available: https://www.amqp.org/product/architecture/
[9]Vinoski, S. (2006). «Advanced Message Queuing Protocol». IEEE Internet Computing 10: 87-89. doi:10.1109/MIC.2006.116.
[10]NIST, Recommended Elliptic Curves for Government Use July 1999.
[11]The selection a = -3 for the coefcient of x was made for reasons of efciency; see IEEE P1363.
[12]NIST, Special Publication 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, March, 2006.
[13]Standards for Efficient Cryptography Group. SEC 1: Elliptic Curve Cryptography, Mar. 2009. Version 2.0.
[14]SECG, SEC 2: Recommended Elliptic Curve Domain Parameters January 27, 2010.
[15]OASIS AMQP version 1.0, section 3.2.1. OASIS AMQP Technical Committee. Retrieved 18 June 2012. Available: http://docs.oasis-open.org/amqp/core/v1.0/amqp-core-messaging-v1.0.html/
[16]Wikipedia. Message-oriented middleware. Available: https://en.wikipedia.org/wiki/Message-oriented_middleware
[17]Aurea SonicMQ, Available: http://www.aurea.com/legal/sonic-mq/
[18]Fiorano Software's FioranoMQ, Available: http://www.fiorano.com/products/Enterprise-Messaging/JMS/Java-Message-Service/FioranoMQ.php
[19]Project OpenJMS, Available: http://openjms.sourceforge.net
[20]Rabbit MQ. Available: http://www.rabbitmq.com/
[21]Wikipedia. Erlang. Available: https://zh.wikipedia.org/wiki/Erlang
[22]Wikipedia. Hypervisor. Available: https://en.wikipedia.org/wiki/Hypervisor
[24]Tanja Lange, " Koblitz curve cryptosystems", in Information-Security and Cryptography, Ruhr-University of Bochum, Universitätsstrasse 150, D-44780 Bochum, Germany, 24 August 2004.
[25]Tawny Lim, "A Study of Koblitz Curves," in Department of Computer Science, University of California, Santa Barbara, CA 93106.
[26]Wikipedia. Secure Hash Algorithm 1. Available: https://en.wikipedia.org/wiki/SHA-1
[27]A (relatively easy to understand) primer on elliptic curve cryptography. Available: http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography/
[28]National Security Agency. “The Case for Elliptic Curve Cryptography,” 2009. Available: http://www.nsa.gov/business/programs/elliptic_curve.shtml.
[29]M. Alimohammadi, and A. A. Pouyan. “Performance Analysis of Cryptography Methods for Secure Message Exchanging in VANET,” 2014. Available: http://www.ijser.org/paper/Performance-Analysis-of-Cryptography-Methods-for-Secure.html..
[30]FatCow Web Hosting. Available: http://www.fatcow.com/.
[31]Hannes Tschofenig, Manuel Pégourié-Gonnard "ARM ECC Performance
nvestigations". 25th March 2015.

連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top