跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.85) 您好!臺灣時間:2024/12/12 09:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:曹志良
研究生(外文):Chih-Liang Traw
論文名稱:橢圓曲線密碼系統於GSM網路上的應用
論文名稱(外文):Application of Elliptic Curve Cryptosystems on GSM Network
指導教授:馬 杰
指導教授(外文):Jeich Mar
學位類別:碩士
校院名稱:元智大學
系所名稱:電機工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2001
畢業學年度:89
語文別:中文
論文頁數:43
中文關鍵詞:金鑰橢圓曲線密碼系統金鑰交換識別協議行動通訊密碼系統亂數金鑰分配
外文關鍵詞:Authentication protocolElliptic curve cryptographyMobile communicationGSMkey exchangePublic key cryptosystemPrivate key cryptosystemCipher text
相關次數:
  • 被引用被引用:3
  • 點閱點閱:350
  • 評分評分:
  • 下載下載:32
  • 收藏至我的研究室書目清單書目收藏:0
本篇論文提出一種應用於GSM(Global system mobile communication)無線電行動通訊網路的識別協議(Authentication protocol)。GSM的原識別協議使用A3,A5,A8的函數執行識別功能,加、解密運算及產生通訊金鑰,提供GSM網路的安全機制,但A3,A5,A8三個函數的演算法並未對外界公開,也就難以驗證這些函數是否真的安全可靠。本篇論文的識別協議以公開金鑰密碼系統之橢圓曲線密碼系統(Elliptic curve cryptography,ECC)的理論為基礎,建立產生任意橢圓曲線參數的方法,設置系統參數,並且運用橢圓曲線執行金鑰交換的功能,並以安全性及傳輸參數量分析比較與GSM識別協議及Lo and Chen識別協議及本篇論文提出之識別協議間之優劣點。分析結果顯示本論文提出之識別協議具有保密性高及傳輸參數少之優點,較易以軟硬體實現識別協議於無線行動通訊系統中。
In this thesis, a authentication protocol applied for the Global System for Mobile communication(GSM) networks is proposed. The current authentication protocol of GSM uses A3, A5 and A8 algorithms,which are proprietary and can not be verified.The elliptic cuve cryptography(ECC) is used for user authentication and key exchange.The security performance and the total number of the transmission parameters between the proposed authentication protocol and other protocol are analyzed .The analytical results indicate that the proposed authentication protocol has the dvantages of the best security and the minimum number of transmission parameters. The protocol proposed in the thesis is more easy to be realized in the mobile radio system.
目錄
頁次
中文摘要.............................. i
英文摘要............................. ii
誌謝................................ iii
目錄................................. iv
圖目錄............................... v
表目錄............................. . vi
符號說明............................ vii
第一章 導論...................... 1
1.1 前言............................. 1
1.2 研究動機與目的................... 1
1.3 研究項目方法..................... 2
1.4 各章內容提要..................... 2
第二章 密碼系統...................... 4
2.1 私密金鑰密碼系統................. 4
2.2 公開金鑰密碼系統................. 6
2.3 混合式密碼系統.................... 9
第三章 橢圓曲線密碼系統......... 10
3.1 橢圓曲線之定義................... 12
3.2 橢圓曲線參數之建立............... 14
3.3 橢圓曲線ECC的表示法.............. 15
3.4 Diffie-Hellman 金鑰交換.......... 15
3.5 如何運用ECC來執行金鑰交換........ 18
第四章橢圓曲線密碼系統於GSM網路上的應用20
4.1GSM系統簡介....................... 20
4.2GSM識別協議....................... 22
4.3Lo and Chen提出之識別協議......... 24
4.4論文提出之識別協議................ 26
第五章 與GSM識別協議的分析與比較. 29
5.1 安全性方面之比較............ 29
5.2 GSM系統辨證流量分析......... 31
5.3 辨證所需傳輸量分析.......... 37
5.4 計算結果比較................ 39
第六章 結論......................... 41
參考文獻 ......................... 42
[1] Diffie H. and Hellman M. E., ”New Directions in Cryptography”, IEEE Transactions on Information eory,Vol.IT-22,No.6,pp644-654,November 1976.
[2] Koblitz N., “Elliptic curve cryptosystems”, Mathematics of Computation,Vol.48,No.177,pp203-209,1987.
[3] Chi-Chun Lo;Yu-Jen Chen, “A secure communication architecture for GSM networks”, Communications,Computers and Signal Processing,1999.
[4] Miller V., “Uses of elliptic curves in cryptography”,Advances in Cryptology,CRYPTO’85,pp417-426,1985
[5] Chi-Sung Laih;Lein Harn;Chin- Chen Chang, “近代密碼學及其應用” 松崗電腦圖書資料股份有限公司
[6] R.Rivest,A.Shamir,and L.Adleman, “A method for obtaining digital signatures and public-key cryptosystem”, Comm.of ACM,Vol.21,pp. 120-126,1978
[7] William Stallings, “CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice”,SECOND EDITION,Prentice Hall International,Inc.
[8] Jurisic,A.,and Menezes,A. “Elliptic curves and Crptography” Dr.Dobb’s Journal,April 1997.
[9] J.Pollard, “Monte Carlo methods for index computation mod P”,Mathematics of Computation,32,pp 918-924,1978.
[10] Botes,J.J.;Penzhorn,W.T., “Public-key cryptosystems based on elliptic curves” Communications and Signal Processing, 1993 .
[11] Chi-Chun Lo;Yu-Jen Chen, “Secure communication mechanisms for GSM networks”, Consumer Electronics, IEEE Transactions on Published: Nov. 1999
[12] Al-Tawil,K;Akrami,A.;Youssef,H.;, “A new authentication protocol for GSM networks”,Local Computer Networks,1998.
[13] http://csrc.nist.gov/encryption/aes.
[14] R.Thomas;H.Gilbert;G.Mazziotto, “Influence of the Mobile station on the Performance of the Radio Mobile Cellular Network”, Proc. 3rd Nordic Seminar, Paper 9.4,Copenhagen,Danmark,Sept.1988.
[15] Schoof par R., “Counting Points on Elliptic Curves over Finite Fields”,Journal de Theories des Nombres de Bordeaux,Vol.7,pp219-254,1995.
[16] Schoof par R. “Elliptic curves over finits fields and the computation of square roots modp”, Mathmatics of Computation,vol 44,No 170 pp483-494,1985.
[17] Chi-Chun Lo;Yu-Jen Chen, “Stream ciphers for GSM networks”, Communications, IEEE International Conference o Published :2000,Vol 1,pp 80-84,2000.
[18] Gregory P. Pollini;Kathleen S. Meier-hellstern,; David J.Goodman, “Signaling Traffic Volume Generated by Mobile and Personal Communications”,IEEE Communications Magazine,pp60-65,June 1995.
[19] Sutikno,S.;Surya, A.;Effendi,R., “An implementation of ElGamal elliptic curves cryptosystems”,Circuits and system,IEEE APCCAS,1998
[20] Koblitz N., “Algebraic Aspects of Crptography”, Springer.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊