跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.84) 您好!臺灣時間:2024/12/14 20:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:林志興
研究生(外文):Chih-Hsing Lin
論文名稱:3G行動通訊使用者認證協定之研究
論文名稱(外文):A Study on Authentication Protocol for 3G Mobile Communication Systems
指導教授:涂世雄涂世雄引用關係
指導教授(外文):Shih -Hsiung Tu
學位類別:碩士
校院名稱:中原大學
系所名稱:電機工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:98
中文關鍵詞:第三代行動通訊認證機制第二代行動通訊密碼學
外文關鍵詞:Authentication Protocol2G3GCryptography
相關次數:
  • 被引用被引用:5
  • 點閱點閱:183
  • 評分評分:
  • 下載下載:29
  • 收藏至我的研究室書目清單書目收藏:3
摘要
近幾年來,由於行動通訊技術發展迅速,帶給我們生活上許多便利與好處,例如:可以利用手機上網、進行電子交易、下載電子地圖、收發電子信件、視訊會議等等。在存取這一些服務時會有大量的重要訊息在無線通道中傳遞,如此會造成有心人士對這一些資料進行擷取或竊聽的動作,因此,我們必須考量到重要訊息在無線通道中傳輸的安全問題。在本論文中,我們提出新的三個基於公開金匙密碼系統的認證機制。所提出的三個認證機制是用來解決第三代行動通訊的安全問題,在安全性方面也比傳統式密碼系統來的安全。在第一個認證架構中,是使用者擁有網路運作者的公開金匙,網路運作者也擁有使用者的公開金匙。在第二個認證架構中,是利用交換使用者與網路運作者雙方證書的方法,去達成互相交換彼此的公開金匙。在第三個認證架構中,是藉由證書服務者發證書給使用者與網路運作者,藉由這一些證書來獲得雙方的公開金匙。在此,我們針對第三代行動通訊系統所提出的認證機制,是被分析能夠達到安全性的需求與威脅的準則與目標。此外,也能夠達到較低的運算複雜度和設計簡單但足以符合安全性認證協定。
Abstract
In this thesis, we propose three new authentication mechanisms based on Asymmetric-key cryptosystems. The three authentication protocols are designed based on the security requirements of the third generation mobile communication systems, which is proposed by UMTS. The advantages of the Asymmetric-key cryptosystems are to solve a very important key management problem for key distribution. Besides, it can provide non-repudiation for the part of the transmitted data. Therefore, we adopt the Asymmetric-key cryptosystems to design our authentication schemes. The characteristic of the first schemes is that the User and the Network Operator have the public keys from each other, respectively. The characteristic of the second schemes is that we exploit the exchange of certificate to achieve the goal of exchange of the public key between the User and the Network Operator. The characteristic of the third schemes is that the Network Operator can obtain the public key from the User’s certificate sent by Certificate Server. Similarly, the User can obtain the public key from the Network Operator that is sent be Certificate Server. The proposed authentication protocols for 3G mobile communication systems are analyzed to be correct to achieve the critical goals of the requirements of security and threats, and these protocols are efficient and effective because they are computationally low complexity and are simple but secure enough.
Contents
Abstract…………………………………………………………………....I
List of Figures…………………………………………………………..II
List of Tables…………………………………………………………...Ⅲ
Chapter 1. Introduction………………………………………………...1
1.1Authentication and UMTS…………………………………....1
1.2Proposed Scheme………………………………………………..7
1.3Organization of The Thesis………………………………...8
Chapter 2. Review of the 2G Mobile System and Security Considerations for UMTS…………………………………………..................................9
2.1 Terminology………………………………………………………............ 9
2.2 Previous Research on Authentication Protocol of the Second Generation Mobile Systems and UMTS Authentication Protocol……..................11
2.2.1 GSM Authentication Protocol……………………………..........11
2.2.2 UMTS Authentication Protocol…………………………….........14
2.3 Security Threats and Requirements of UMTS……………………........25
Chapter 3. Three Proposed Schemes of Authentication Protocol….......26
3.1 Reconstruction of Three Authentication Protocols Using the A Representation of Message Flow………………………………………........................26
3.2 The First Scheme of Authentication Protocol……………………......29
3.3 The Second Scheme of Authentication Protocol………………….......37
3.4 The Third Scheme of Authentication Protocol……………………......44
3.5 Performance Analysis……………………………………………….........51
Chapter 4. Conclusions and Future Research………………….............53
Appendix A. A New Representation of Message Flow of Authentication Protocol……………………………………………………………….............54
Appendix B. A Security Threats And Requirement…………………….......57
Appendix C .General objectives for 3G security features………………..72
Reference………………………………………………………………............74
Reference[1] A. T. Khalid and A. Ali, “A new authentication protocol for Roaming users in GSM Network,” IEEE International Symposium on Computers and Communications Proceedings, pp.93-98, 1999.[2] V. Bharghavan and C. V. Ramamoorthy, “Security Issues in Mobile Communications,” Second International Symposium on Autonomous Decentralized Systems Proceedings. ISADS 95, pp.19-24, 1995.[3] J. Liu and Y. Wang, “A User Authentication Protocol for Digital Mobile Communication Network,” Wireless: Personal, Indoor and Mobile Radio Communications Merging onto the Information Superhighway, PIMRC''95. Sixth IEEE International Symposium , Vol.2 , pp.608-612, 1995. [4] W. Stallings, Cryptography and network security principles and practice, 2nd ed, Prentice Hall, Inc, 1999.[5] ETSI TS 133.120. “3G Security”, http://www.etsi.org/ [6] ETSI TS 21.133.”Security Threats and Requirements, http://www.etsi.org/ [7] C. S. Park, “On certificate-based security protocols for wireless mobile communication systems,” IEEE Network, Vol.115, pp.28-32, Oct 1997.[8] N Jefferies, “Security in third-generation mobile systems,” IEEE Colloquium on Security in Network, pp.8/1-8/5, 1995.[9] C. Metz, “AAA protocols: authentication, authorization, and accounting for the Internet,” IEEE Internet Computing, Vol.36, pp. 75-79, Nov.-Dec. 1999.[10] S. Putz, R. Schmitz and F. Tonsing, “Authentication schemes for third generation mobile radio systems,” The Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 1, pp.126-130, 1998.[11] S. M. Yen, “Cryptanalysis of an authentication and key distribution protocol,” IEEE Communications Letters, Vol.31, pp.7-8, Jan 1999.[12] Z. Zheng, N. Zhang, “Dynamic Authentication Protocol for Personal Communication System (PCS),” International Conference on Communication Technology, ICCT’98, Beijing, China, pp.7-1-7-5, Oct 1998.[13] V. Varadharajan and M. Yi, “Preserving privacy in mobile communications: a hybrid method,” IEEE International Conference on Personal Wireless Communications, pp.532-536, 1997.[14] B.Askwith, M. Merabti, Qi Shi, K. Whiteley, “Achieving user privacy in mobile networks,” Proceedings of the 13th Annual Computer Security Applications Conference, pp.108-116, 1997.[15] R. Bird, I. Gopal, A. Herzberg, P. A. Janson, S. Kutten, R. Molva, M. Yung, “Systematic design of a family of attack-resistant authentication protocols,” IEEE Journal on Selected Areas in Communications, Vol.115, pp.679-693, June 1993.[16] T. G. Brutch and P. C. Brutch, “Mutual Authentication, Confidentiality, and Key MANagement (MACKMAN) system for mobile computing and wireless communication,” Proceedings of the 14th Annual Computer Security Applications Conference, pp. 308-317, 1998.[17] L. Gong, M.A. Lomas, R.M. Needham, J.H. Saltzer, “Protecting poorly chosen secrets from guessing attacks,” IEEE Journal on Selected Areas in Communications, Vol.115, pp.648-656, June 1993.[18] S. Keung and K. Y. Siu, “Efficient protocols secure against guessing and replay attacks,” Proceedings of the Fourth International Conference on Computer Communications and Networks, pp.105-112, 1995.[19] T. Kwon and J. Song, “Authenticated key exchange protocols resistant to password guessing attacks,” IEEE Proceedings of Communications , Vol.1455, pp.304-308, Oct 1998.[20] G. Li, “Optimal authentication protocols resistant to password guessing attacks,” Proceedings of the Eighth IEEE Computer Security Foundations Workshop, pp.24-29, 1995.[21] S. P. Shieh, W. H. Yang and H. M. Sun, “An authentication protocol without trusted third party,” IEEE Communications Letters, Vol.13, pp.87-89, May 1997.[22] K. Heikki, A. Ari, N. Valtteri, L. Lauri, N. Siamak, UMTS Network: Architecture, Mobility and Services, Wiley, Inc, 2001. [23] J. Rapeli, “UMTS: targets, system concept, and standardization in a global framework,” IEEE Personal Communications, Vol.2(1), pp.20-28, Feb 1995.[24] Y. B. Lin, “Mobility management for PCS,” Tutorial: First Workshop on Mobile Computing, Applied Research, Bellcore Morristown, NJ, USA, 1995.[25] 賴溪松, 韓亮, 張真誠, 近代密碼學及其應用, 松岡電腦圖書, 1994.[26]Y. B. Lin, “ No wires attached,” IEEE Potentials ,” Vol. 14 Issue: 4 , pp.28 —33, Oct.-Nov. 1995.[27] F. G. Constantinos, I. M. Sotirios and S. V. Iakovos, “Towards the Introduction of the Asymmetric Cryptography in GSM, GPRS, and UMTS Networks,” Computers and Communications, 2001. Proceedings. Sixth IEEE Symposium, pp.15-21, 2001.[28] 張鴻泰, “UMTS認證協定之研究,” M.S.Thesis, Dept. of electrical engineering, Chung Yuan Christian University, 2000.[29] http://www.esat.kuleuven.ac.be/cosic/aspect/aspect.html [30] ETSI TS 121.133.”Security Threats and Requirements, http://www.etsi.org/[31] W. Diffie, M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, pp.644-654, 1976.[32] R. Moe, “Overview of the GSM system and protocol architecture,” IEEE Communication Magazine, pp. 92-100, April 1993.[33] B. Schneier, “Applied cryptography: Protocols , algorithms, and source code in C,” Wiley.[34] R. Bird et al., “Systematic Design of Two-Party Authentication Protocols,” Advances in Cryptology-CRYPTO’91, pp. 44-61, 1991.[35] G. Li, “Optimal authentication protocols resistant to password guessing attacks,” Proceedings of Eighth IEEE on Computer Security Foundations Workshop, pp.24-29, 1995.[36] G. Tsudik, E. Herreweghen, “Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks,” Proceedings of The 12th Symposium on Reliable Distributed Systems, pp.136-141, 1993.[37] G. Lowe, “Some new attacks upon security protocols,” Proceedings of The 9th IEEE on Computer Security Foundations Workshop, pp.162-169,1996.[38] L. Gong, “Verifiable-text attacks in cryptographic protocols.” Ninth Annual Joint Conference of the IEEE Computer and Communication Societies, Vol.2, pp.686-693,1990.[39] P. Syverson, “A taxonomy of replay attacks,” Proceedings of Computer Security Foundations Workshop VII, pp.187-191, 1994.[40] S. Keung, K. Y. Siu, “Efficient protocols secure against guessing and replay attacks,” Proceedings of Fourth International Conference on Computer Communications and Networks, pp.105-112, 1995.[41] T. Kwon, J. Song, “ Security and efficiency in authentication protocols resistant to password guessing attacks,” Proceedings of The 22nd Annual Conference on Local Computer Networks, pp.245-252, 1997.[42] Y. Zheng, J. Seberry, “Immunizing public key cryptosystems against chosen ciphertext attacks,” IEEE Journal on Selected Areas in Communications, Vol.11, NO.5, pp.715-724, June 1993.
電子全文 電子全文(本篇電子全文限研究生所屬學校校內系統及IP範圍內開放)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top