(18.206.238.77) 您好!臺灣時間:2021/05/18 07:06
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

: 
twitterline
研究生:陳世斌
研究生(外文):Shih-Pin Chen
論文名稱:行動通訊上使用者認證協定之探討
論文名稱(外文):A Study of User Authentication Protocols in Mobile Communication System
指導教授:洪國寶洪國寶引用關係
指導教授(外文):Gwo-Boa Horng
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:中文
論文頁數:58
中文關鍵詞:密碼學認證協定行動通訊網路安全公開金匙密碼系統
外文關鍵詞:cryptographyauthentication protocolmobile communicationnetwork securitypublic key cryptosystemsserver-aided computation
相關次數:
  • 被引用被引用:2
  • 點閱點閱:154
  • 評分評分:
  • 下載下載:11
  • 收藏至我的研究室書目清單書目收藏:2
行動通訊可以帶給我們非常大的便利,因為有了行動通訊我們便可隨時隨地達到通訊的目的,不會再受到”線”制,所以現在行動通訊儼然成為科技的新寵兒。可是行動通訊的環境不像一般有線的通訊,使用者和HLR(或VLR)之間能有一條固定明顯的通道連接著,可以保有適當的隱密性,比較不會遭受到太多的威脅;無線通訊並不存在一個明顯的通道,它是透過開放的空間傳送,這可以讓任何人都可輕易的接收到通訊的信號,進而達到竊聽和冒用的目的。因此一套無線通訊系統,為了達到上述基本的安全需求,必須也有一個安全的使用者識別協定(User Authentication Protocol)。
本篇論文將針對幾個使用公開金匙系統安全的使用者識別協定加以討論,並且對Park協定所遭受的攻擊,提出改進的方法。我們使用挑戰─回應的方法來讓使用者驗證系統端的身份,並且加入了Server-Aided的觀念,來減輕使用者的負荷;而另一方面使用類似Schnorr Identification Scheme的方法來讓系統端驗證使用者的身份。所以我們的協定除了具有和Park協定相同的優點外,並且達到比較高的安全性。也就是說我們的協定也能讓使用者和客地的VLR(Visited Location Register)直接識別,而不用再藉由本地的HLR(Home Location Register)來幫忙識別使用者的合法性;此外,使用者也能對VLR加以識別,以防止VLR被有心人士惡意冒用,進而奪取使用者的私有資訊;亦即所謂的相互認證。此外在認證協定的過程中同時也交換了一把通訊金匙,可作為加密通訊資料用。總而言之,我們在增加合理的計算量之下,加強了Park協定的安全上缺點。
Recently, with the development of computer and communication technology, the amount of wireless communication users has rapidly grown. Now we can communicate with other people at anytime, anywhere. In the future, people will more and more rely on this technology. As we enjoy this convenience, we should notice that the transmission media is radio channel. And the radio channel is vulnerable to eavesdropping by unauthorized users. How to prevent illegal users from passive eavesdropping and active tampering is an emergent topic.
There are many authentication protocols based on public key cryptography. Some use heavy computations and some are not secure enough. In this thesis, we introduce several protocols based on public key cryptography. We found there is a secure flaw in Park’s protocol, which will allow an attacker to masquerade the base station. An revised protocol is proposed. To enhance Park’s protocol, we use two different ways to authentication the two parties. One is Challenge─Response with server aided, and the other is similar to Schnorr’s Identification Scheme. They have the same properties as the original protocol yet they are more secure. Our new protocol provides mutual authentication and session key exchange. It also has offline authentication mechanism on the dynamic certificate and a secure end-to-end communication between two mobile users.
目 錄
第1章、簡介………………………………………………………………1
1.1 研究動機………………………………………………………1
1.2 現況概要………………………………………………………4
1.3 研究貢獻………………………………………………………7
1.4 論文大綱………………………………………………………9
第2章、背景知識………………………………………………………10
2.1 對稱與非對稱式密碼系統……………………………………11
2.2 行動通訊上的安全性需求……………………………………19
2.3 現有行動通訊系統的使用者認證協定………………………21
2.4 其他機構所提的使用者認證協定……………………………26
第3章、相關工作………………………………………………………29
3.1 MSR協定……………………………………………………30
3.2 Park的使用者認證協定………………………………………34
3.3 Park協定所遭受的攻擊………………………………………36
3.4 Jakobsson 和Pointcheval的方法…………………………….38
第4章、我們的方法……………………………………………………40
4.1 使用Challenge─Response 機制……………………………41
4.2 採用ElGamal數位簽章………………………………………43
4.3 採用Schnorr數位簽章………………………………………46
4.4 最後的方法……………………………………………………48
第5章、安全性和效率分析……………………………………………52
5.1 安全性分析及比較……………………………………………53
5.2 效率分析及比較………………………………………………56
第6章、結論……………………………………………………………58
參考文獻………………………………………………………………59
參考文獻(References)
1.AES, http://csrc.nist.gov/encryption/aes/
2.Aziz A., Diffie W., “Privacy and Authentication for Wireless Local Area Networks”, IEEE Personal Communications First Quarter,Page(s).25-31
3.Boyd C. Park D. G., "Public Key Protocols for Wireless Communications", Proceedings of ICISC''98, Korea Institute of Information Security and Cryptology, Page(s).47-57
4.Boyd C., Mathuria A, “Key Establishment Protocols for Secure Mobile Communications:A Selective Survey”, ACISP’98, Page(s). 344-355
5.Boyd C., Mathuria A, “Key Establishment Protocols for Secure Mobile Communications:A critical survey”, Computer Communications 23, Page(s). 575-587
6.Brown D., “Techniques for Privacy and Authentication in Personal Communication Systems”, IEEE Personal Communications , Volume: 2 Issue: 4 , Aug. 1995, Page(s): 6 -10
7.Brutch T.G., Brutch P.C. “Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) System for Mobile Computing and Wireless Communication”, Computer Security Applications Conference, 1998. Proceedings. 14th Annual , 1998, Page(s): 308 -317
8.Chang C. H., Tu K., Chen K. C., “Efficient End-to-End Authentication Protocols for Mobile Networks”, The seventh IEEE International Symposium on Personal Indoor and Mobile Radio Communications, PLMRC’96, Vol.3, Page(s).1252-1256
9.Chris C., Yair F., Yiannis T., “Efficient key distribution for slow computing devices: achieving fast over the air activation for wireless systems”, Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on , 1998 , Page(s): 66 —76
10.Coomaraswamy G., Kumar, S.P.R.,”A Novel Method for Key Exchange and Authentication with Cellular Network Applications“, Universal Personal Communications, 1993. Personal Communications: Gateway to the 21st Century. Conference Record., 2nd International Conference on , Volume: 1 , 1993, Page(s): 186 —190
11.Carlsen U., “Optimal Privacy and Authentication for Portable Communication Systems”, ACM Operation Systems Review 28(3) (1994) Page(s):16—23
12.Harn, L.; Xu, Y., “Design of generalised ElGamal type digital signature schemes based on discrete logarithm”,Electronics Letters , Volume: 30 Issue: 24 , 24 Nov. 1994, Page(s): 2025 —2026
13.Horn G., Preneel B., “Authentication and Payment in Future Mobile Systems”, In Computer Security -- ESORICS ''98 Proceedings, , Lecture Notes in Computer Science vol. 1485, SpringerVerlag, Berlin, 1998. Page(s). 277-293
14.Horng G. B., “A Secure Server-Aided RSA Signature Computation Protocol for Smart Cards”, Journal of Information Science And Engineering, 2000, Volume 16, Page(s). 847-855
15.Jakobsson M., Pointccheval D., “Mutual Authentication for Low-Power Mobile Devices” Proceedings of Financial Cryptography 2001 (February 19 - 22, 2001, Grand Cayman Island, British West Indies), P. Syverson Ed., Springer-Verlag, 2001.
16.Khalid A., Ali A., ”A New Authentication Protocol for Roaming Users in GSM Networks”, Computers and Communications, 1999. Proceedings. IEEE International Symposium on , 1999, Page(s): 93 —99
17.Kim J., Oh M., Kim T., “Security Requirements of Next Generation Wireless Communications”, Communication Technology Proceedings, 1998. ICCT ''98. 1998 International Conference on , 1998 , Page(s): 6 Page(s). Vol.1
18.Lim C. H., Lee P. J.,"Server (Prover/Signer)-aided verification of identity proofs and signatures", Advanced in Cryptology - Eurocrypt''95, Springer-Verlag, Page(s). 64-78
19.Lin H.Y., “Security and Authentication in PCS” Computers & Electrical Engineering, Vol. 25, No. 4, July1999, Page(s): 225-248
20.Lin H.Y.、Harn L., “Authentication in Wireless Communications”, IEEE Global Telecommunication Conference, including a Communications Theory Mini-Conference Technical Program Conference Record, GLOBECOM’93, Vol.1, Page(s). 550-554
21.Liu J., Wang Y, “A User Authentication Protocol for Digital Mobile Communication Network”,Personal, Indoor and Mobile Radio Communications, PIMRC’95. Wireless: Merging onto the Information Superhighway. Sixth IEEE International Symposium on, Volume 2 Page(s).608 -612
22.Liu J., Wang Y., “Authentication of Mobile Users in Personal Communication System”, Personal, Indoor and Mobile Radio Communications, PIMRC''96, Volume: 3, Page(s).1239 -1242
23.Liu J., Wang Y.,”Authentication of mobile users in personal communication system“, Personal, Indoor and Mobile Radio Communications, 1996. PIMRC''96., Seventh IEEE International Symposium on , Volume: 3 , 1996, Page(s): 1239 —1242
24.Lo C. C., Chen Y. J., “Secure Communication Mechanisms for GSM Networks”, IEEE Transactions on Consumer Electronics, Nov. 1999Volume:45 Issue:4, Page(s).1074 —1080
25.Martin K., Mitchell C.,“Evaluation of Authentication Protocols for Mobile Environment Value-added Services”, Draft 1998
26.Menezes A., “Elliptic Curve Public Key Cryptosystems”, Boston: Kluwer Academic Publishers, 1993
27.Park C.S., “On Certificate-Based Security Protocols for Wireless Mobile Communication Systems”, IEEE Network, Volume: 11 Issue: 5, Sept.-Oct. 1997, Page(s): 50 -55
28.Patiyoot D., Shepherd S.J.,“Authentication Protocols for Wireless ATM Networks”ATM, 1998. ICATM-98, Page(s). 87 —96
29.Putz S., Schmitz R., Tonsing F.,”Authentication Schemes for Third Generation Mobile Radio Systems“, Personal, Indoor and Mobile Radio Communications, 1998. The Ninth IEEE International Symposium on , Volume: 1 , 1998, Page(s): 126 -130
30.Putz S., Schmitz R.,”Secure Interoperation Between 2G and 3G Mobile Radio Networks“, 3G Mobile Communication Technologies, 2000. First International Conference on (Conf. Publ. No. 471) , 2000, Page(s): 28 —32
31.RSA Security Inc., http://www.rsa.com
32.Samarakoon M.I., Honary B. “Novel Authentication and Key Agreement Protocol for Low Processing Power and Systems Resource Requirements in Portable Communications Systems ” Novel DSP Algorithms and Architectures for Radio Systems (1999/184), IEE Colloquium on , 1999, Page(s): 9/1 -9/5
33.Stach J.F., Park E.K., “Analysis of a non-repudiation authentication protocol for personal communication systems”Computer Communications and Networks, 1998. Proceedings. 7th International Conference on, Page(s): 289 —293
34.Stach, J.S., Park, E.K., Su, Z.”An Enhanced Authentication Protocol for Personal Communication Systems”, Application-Specific Software Engineering Technology, 1998. ASSET-98. Proceedings. 1998 IEEE Workshop on , 1998 Page(s): 128 —132
35.Stallings W., “Cryptography and Network Security:Principles and Practice” second edition”, Prentice Hall 1999
36.Varadharajan V., Mu Y., “Preserving Privacy in Mobile Communications:A Hybrid Method”, IEEE Proceedings International conference on Persona; Wireless Communications, ICPWC’97,Page(s).532-536,1997
37.Zheng Z., Zhang N., ”Dynamic Authentication Protocol for Personal Communication System(PCS)”, Communication Technology Proceedings, 1998. ICCT ''98. 1998 International Conference on , 1998, Page(s): 96 -100 vol.1
38.曾志嘉、曾文貴, ”Certificate-Based Security Protocols for Wireless Networks”, 第九屆全國資訊安全會議, 民國八十四年五月, 第340-347頁
39.賴溪松、韓亮、張真誠,近代密碼學及其應用,松崗電腦圖書資料股份有限公司,初版,民國八十四年九月
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊