跳到主要內容

臺灣博碩士論文加值系統

(3.239.4.127) 您好!臺灣時間:2022/08/16 02:39
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鄧旭敦
研究生(外文):Hsu-Tun Teng
論文名稱:植基於數位傳輸內容保護標準的兩項研究議題:設計具備安全認證機制的隨選視訊和會議金鑰之通訊協定
論文名稱(外文):IMPLEMENTATION OF SECURE VIDEO ON DEMAND SYSTEM AND CONFERENCE KEY ESTABLISHMENT BASED ON DIGITAL TRANDMISSION CONTENT PROTECTION
指導教授:楊慶隆楊慶隆引用關係
指導教授(外文):Ching-Nung Yang
學位類別:碩士
校院名稱:國立東華大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2002
畢業學年度:90
語文別:英文
論文頁數:45
中文關鍵詞:會議金鑰IEEE1394數位傳輸內容保護標準
外文關鍵詞:Conference KeyIEEE1394Digital Transmission Content Protection(DTCP)
相關次數:
  • 被引用被引用:0
  • 點閱點閱:344
  • 評分評分:
  • 下載下載:37
  • 收藏至我的研究室書目清單書目收藏:0
本論文主要研究的主題有下列兩個,我們分述如下:
一、 將已經實作在IEEE1394傳輸協定中的數位傳輸內容保護標準應用在高速乙太網路的資料傳輸上,參考其設計原理並將原先所使用的加密演算法做更具安全性的改進,設計一個具備雙向認證機制與密文傳輸的隨選視訊系統。
二、 針對目前的數位傳輸內容保護標準架構,提出兩種具有彈性的會議金鑰建立機制,作為日後群播、服務分級制度、或者是秘密會議通訊時會議金鑰建立之參考依據。
  數位傳輸內容保護(DTCP, Digital Transmission Content Protection)標準是一種防止多媒體資料在傳輸過程中遭受惡意第三者攔截或竄改的通訊協定,目前已被廣泛的嵌入在IEEE1394的資料連結層中。伺服器端可以直接從硬體層去認證提出服務要求的使用者身分是否為合法,通過認證後再對指定傳輸的資料以密文的方式傳送以保障資料在傳輸過程中不會被完整的拷貝或竄改,並且利用硬體的方式來減少認證過程與加解密資料的時間,使得整個傳輸的速度不會因為安全上的考量而受到嚴重的影響。隨著光纖大量鋪設於電信網路以及寬頻網路技術的快速發展,近來全世界的電信公司無不積極投入於寬頻服務,企圖整合通訊、娛樂、以及資訊服務於目前的高速乙太網路。但是如何來保護傳輸中的多媒體資料也是我們所關注的議題,所以我們將DTCP的構想應用在寬頻服務的隨選視訊上,並且以AES(Rijndael)演算法作為資料傳輸時的加密演算法,實作於高速乙太網路。除此之外,我們也針對DTCP標準提出兩種具有彈性的會議金鑰(Conference Key)建立機制。在一個開放的通訊環境裡面利用會議金鑰,我們可以很容易的達到服務分級制度、私密的訊息廣播、以及秘密的視訊會議等等目的
In this dissertation, we will mainly discuss with the following two subjects:
1. Design a video on demand system with a mechanism using DTCP-like techniques over TCP/IP high-speed network, where DTCP is a digital transmission content protection standard.
2. Propose two flexible schemes of conference key establishment for the latest version of DTCP standards, which can be applied to service classification, secure conference communication, and specific message broadcasting.
DTCP specification specifies a secure communication protocol which makes good use of mutual authentication and robust cipher scheme to protect the transmission content from unauthorized, casual copying or intercepting through the public network. In addition, the DTCP standard is widely used in IEEE1394 chipset to achieve the security requirement. As the rapidly improvement with the telecommunication and high speed network, many companies devote themselves to integrate the multimedia, communication, entertainment, and information services over the fast Ethernet. However, how to protect the data transmitted through the wire/wireless media is a significant issue. Here, we make good use of the concept of DTCP standard and use AES (Rijndael) cipher to implement a DTCP-like, secure video on demand system. We also propose our conference key communication protocol that can be used in conference communication, service classification, and secure message broadcasting so that the members belongs to each individual conference are able to share the secret data efficiently.
Chapter 1 Introduction 1
1.1 Background Knowledge 1
1.2 Organization of the Thesis 2
1.3 Contribution of the Thesis 2
Chapter 2 Digital Transmission Content Protection Standard 4
2.1 Overview 5
2.2 Full Authentication and Restricted Authentication 8
2.2.1 Full Authentication 8
2.2.2 Restricted Authentication 9
2.3 Content Channel Management and Protection 12
2.4 Implementation of 5C Content Protection on IEEE1394 14
2.4.1 Basic Features of IEEE1394 14
2.4.2 IEEE1394 Protocol Layers 15
2.4.3 Philips 1394-compliant AV Link Chipset 16
Chapter 3 Implementation of the Secure Video on Demand System 18
3.1 Platform and Software Development Kits 18
3.2 The Proposed Authentication Scheme 19
3.3 DTCP-like VOD System 25
3.4 Performance Analysis 30
Chapter 4 Conference Key Establishment based on DTCP Standard 32
4.1 Introduction 32
4.2 Inner-Control Communication 33
4.3 Outer-Control Communication 34
4.4 Dynamic Ability 36
4.5 Security Analysis 38
4.6 Practicability in IEEE1394 40
Chapter 5 Conclusions and Future Works 42
5.1 Conclusions 42
5.2 Future Works 43
References 44
[1] Wen-Guey Tzeng, “A secure fault-tolerant conference-key agreement protocol,” IEEE Transactions on Computers,” vol. 51, 2002, pp.: 373 -379.
[2] Digital transmission content protection specification information version vol. 1 July, 2001.
[3] Digital transmission content protection specification information version supplement A “Mapping DTCP to USB,” vol. 1 July, 2001.
[4] Digital transmission content protection specification information version supplement B “Mapping DTCP to MOST,” vol1 July, 2001.
[5] Siaw-Lynn Ng, Comments on “Dynamic participation in a secure conference scheme for mobile communications,” IEEE Trans. vol. 50, 2001, pp.334 -335.
[6] Federal Information Processing Standards (FIPS) Publication 186-2 Digital Signature Standard January 27, 2000.
[7] IEEE 1394 “IEEE Standard for a High Performance Serial Bus,” June 2000.
[8] IEEE 1363 “IEEE Standard for Public-Key Cryptography,” Aug 2000.
[9] DTLA “Policy Statements Regarding DTCP Adapters,” January 1999.
[10] NIST “Recommended Elliptic Curve for Federal Government Use,” July 1999.
[11] M. S. Hwang, “Dynamic participation in a secure conference scheme for mobile communications,” IEEE Trans. Vehicular Technology vol. 48, September 1999 pp.1469 -1474.
[12] 5C Digital Transmission Content Protection White Paper July 1998.
[13] PKCS#13 Elliptic Curve Cryptography Standard January 1998.
[14] ANSI X9.62 “Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA),” 1998.
[15] T. C. Wu, “Conference key distribution system with user anonymity based on algebraic approach,” IEE Proceedings on Computers and Digital Techniques vol. 144, 1997 pp. 145 -148.
[16] M. S. Hwang and W. P. Yang, “Conference key distribution schemes for secure digital mobile communications,” IEEE Journal Selected Areas in Communications,” vol. 13, 1995, pp. 416 -420.
[17] C. S. Laih and S. M. Yen, “On the design of conference key distribution systems for the broadcasting networks,” Annual Joint Conf. of the IEEE Computer and Communications Societies,” 1993, pp. 1406 -1413.
[18] PKCS#3 Diffie-Hellman Key Agreement Standard, November 1993.
[19] Diffie, W., and Hellman, M. “New Directions in Cryptography.” IEEE Transactions on Information Theory, 1976 pp.644-654.
[20] Jonathan Knudsen “Java Cryptography” Publisher: O’Reilly.
[21] Elliotte Rusty Harold “Java Network Programming” Publisher: O’Reilly.
[22] Elliotte Rusty Harold “Java I/O” Publisher: O’Reilly.
[23] Harvey M. Deitel and Paul J. Deitel, “Java How to Program 4/e” Publisher: Prentice Hall.
[24] American National Standard Institute (ANSI) http://www.ansi.org/.
[25] National Institute of Standard Technology (NIST) http://www.nist.gov/.
[26] Digital Transmission Licensing Administrator http://www.dtcp.com.
[27] The Source for Java Technology http://java.sun.com/.
[28] JCE Provider-IAIK http://jcewww.iaik.tu-graz.ac.at//index.php.
[29] JCE Provider-Bouncy Castle http://www.bouncycastle.org/.
[30] Philips PDI1394 AV Link Chipset Information http://www-us7.semiconductors.philips.com/pip/PDI1394L41.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top