跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/02/08 02:03
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:陳彥宏
研究生(外文):Yen-Hung Chen
論文名稱:PMI+,低成本智慧卡密碼系統實作
論文名稱(外文):An Implementation of PMI+ on Low-Cost SmartCard
指導教授:陳俊良陳俊良引用關係
學位類別:碩士
校院名稱:國立臺灣大學
系所名稱:資訊工程學研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
畢業學年度:93
語文別:英文
論文頁數:58
中文關鍵詞:智慧卡密碼系統
外文關鍵詞:smartcardPMI+
相關次數:
  • 被引用被引用:0
  • 點閱點閱:232
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
PMI 是去年在 “International Workshop on Practice and Theory in Public Key Cryptography” 的會議上,由辛辛那提大學的丁津泰教授所提出來的密碼系統,而PMI+則是PMI為了避免“differential”的攻擊方式所作的改進。在我的論文內,我將會提出兩種在低成本智慧卡(無輔助運算器)上實作PMI+的方式,一種採取傳統的實作方式並提出最佳化的方法,另一種採取金字塔般的方式來實作PMI+中會用到的Galois Field,在此我們特別稱為Composite Galois Field。
後者的實作方式使得在Galois Field 內的運算速度大為提升,並且也可以配合傳統的實作方式來做最佳化,目前實作成果在一般以8051為架構 的CPU下(10MHz),每次加密大小為84/96bit的區塊只需要2.5/5.3 秒,我們可以宣稱PMI+的解密速度快於RSA-1024,而且不需要任何的輔助運算器。
PMI is a cryptosystem brought up by Prof. Jintai Ding, a professional of Cincinnati University, on the 2004 International Workshop on Practice and Theory in Public Key Cryptography. PMI+ is a further modification from PMI system to avoid the differential cryptanalysis. This thesis is about two kinds of implementations of PMI+ on a low-cost smart card without co-processor. One implementation takes traditional method to construct the field and another takes tower-like method to build the field named Composite Galois Field.
Composite Galois Field has great performance of decryption than traditional one. It takes 2.5/5.3 seconds per 84/96-bit block on a 8051 based CPU at 10-MHz. We may say that PMI(84, 96) without co-processor beats RSA-1024 with co-processor.
Abstract i
摘要 iii
誌謝 v
Contents vii
List of Figures ix
List of Tables xi
Chapter 1. Introduction 1
1.1. Background 1
1.2. RSA 3
1.2.1. Related Research 3
1.2.2. Application on SmartCard 3
1.3. ECC (Elliptic Curve) 4
1.3.1. Related Research 4
1.3.2. Application on SmartCard 5
1.4. Perturbed MI (PMI) 6
1.5. Research Motivation 6
1.6. Thesis Organization 7
Chapter 2. Perturbation of Matsumoto-Imai System 9
2.1. The Original Matsumoto-Imai Cipher 9
2.2. The Perturbed Matsumoto-Imai Cipher 10
2.3. The Public Key and the Encryption 11
2.4. The Private Key and the Decryption 11
2.5. Security Analysis 12
Chapter 3. Implementation 13
3.1. Main Structures and Operation 13
3.2. Decryption 16
3.2.1. Bit-String Analysis and New Operator “power256” 17
3.2.2. Example 19
3.3. Perturbation 20
3.4. Key Generation 21
Chapter 4. Structure of the Smart Card 23
4.1. Summary of the 8051 Hardware Platform 23
4.2. Hardware Resource Requirements 24
4.3. Performance Data 25
Chapter 5. Composite Galois Field Implementation 27
5.1. Composite Galois Field GF((((2)n1)n2)…)nl) 27
5.2. Application to Composite GF(284) 28
5.3. Computer Arithmetic in Composite Galois Fields 29
5.3.1. Multiplication in the Ground Galois Fields GF(2n1) 29
5.3.2. Addition in Composite Galois Fields 30
5.3.3. Multiplication in Composite Galois Fields 30
5.3.4. Squaring in Composite Galois Fields 31
5.4. Arithmetic in Composite GF(284) 32
5.5. Strategy of Factoring n 38
5.6. Best Composition 41
Chapter 6. Performance and Analysis 43
6.1. PC Environment 43
6.1.1. Optimization of decryption in single Finite Field 43
6.1.2. Performance of basic implementation 44
6.1.3. Two Kind Factoring of n=96 in Composite Finite Field 47
6.1.4. Performance in Composite Finite Field 47
6.1.5. Comparison 48
6.2. Smart Card Environment 49
6.2.1. “Bit level” vs. “Group level” Multiplication 49
6.2.2. Performance in Single Finite Field 50
6.2.3. Performance in Composite Finite Field 52
Chapter 7. Conclusion and Discussion 55
7.1. Conclusion 55
7.2. Future Work 55
7.2.1. Inversion in Composite Galois Field 55
7.2.2. Normal Basis 56
Reference 57
[ACDG03] M.Akkar, N. Courtois, R. Duteuil , and L. Goubin, A fast and secure Implementation of SFLASH, PKC2003, LNCS 2567, pp.267-278.
[Benchmark] “Crypto++ library 5.2.1” is a free c++ class library of cryptographic schemes. See homepage, http://www.eskimo.com/~weidai/cryptlib.html
[Ding04] J. Ding, A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation, PKC 2004, LNCS 2947, pp.305–318.
[DGW+05] J. Ding, J. Gower, D. Schmidt, C.Wolf, and Z. Yin. Complexity Estimates for the F4 attack on the Perturbed Matsumoto-Imai Cryptosystem, 2004 manuscript.
[Datesheet1] Security & Chip Card ICs SLE 66CX642P, 16-bit Security Controller with Advanced Crypto Engine, see web site: http://www.infineon.com
[Datasheet2] High Speed/Low Power Microcontrollers Dollas DS80C320C, see web site, http://www.chipcatalog.com/Maxim/DS80C320.htm
[FGS05] P.-A. Fouque, L. Granboulan, and J. Stern, Differential Cryptanalysis for Multivariate Schemes, Eurocrypt 2005.
[Gua97] J. GUAJARDO, Efficient Algorithms for Elliptic Curve Cryptosystems, Master''s Thesis, Worcester Polytechnic Institute, May 1997
[Has99] M.A. Hasan, Look-up Table Based Large Finite Field Multiplication in Memory constrained Cryptosystems, IMA-Crypto & Coding’99, LNCS 1746, pp.213-221
[IT88] T.Itoh and S.Tsuji, A Fast Algorithm for Computing Multiplicative Inverses using Normal Bases, Info. and computing, 78 (1998), pp.171-177
[KO63] A. Karatsuba and Yu. Ofman , Multiplication of Many-Digital Numbers by Automatic Computers, Doklady Akad. Nauk SSSR 145(1962), pp.293-294. Translation in Physics-Doklady 7(1963), pp.595-596
[LC83] R. Lidl and H. Niederreiter. Finite Field, volume 20 of Encyclopedia of Mathematics and its Applications. Addition-Wesley, Reading, Massachusetts, 1983.
[MI88] T. Matsumoto and H. Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, Eurocrypt 1988, LNCS 330, pp.419-453
[NESSIE] NESSIE project , see web site http://www.cryptonessie.org
[Pat95] J.Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88, Crypto’95, LNCS 963, pp.248-261.
[PGC98] J. Patarin, L. Goubin, and N. Courtois, C.+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai, Asiacrypt’98, LNCS 1514, pp.35–49.
[SCS01] Sheueling Chang Shantz , From Euclid’s GCD to Montgomery Multiplication to the Great Divide, SML. Technical Report SMLI TR-2001-95, Sun Microsystems Laboratories, 2001
[Sil99] H. Silverman, Fast Multiplication in Finite Fields GF(2N), CHES’99 , LNCS 1717, pp.122-134
[Sma01] N.P. Smart, The Exact Security of ECIES in the Generic Group Model, Cryptography and Coding’01, LNCS 2260, pp.73-84
[Wolf04] C. Wolf , Efficient Public Key Generation for Multivariate Cryptosystems, Proc. ERACOM Conference and Workshop on Cryptographic Algorithms and their Uses, July 5-6, 2004. http://www.minrank.org/hfe/#implement
[WP05] C. Wolf and B. Preneel, Taxonomy of Public-Key Schemes based on the Problem of Multivariate Quadratic Equations, manuscript, ePrint 2005/077.
[WP05a] C.Wolf and B.Preneel, Superfluous Keys in Multivariate Quadratic Asymmetric Systems, PKC 2005, LNCS 3386, pp.275-287. Extended version: eprint 2004/361.
[YCC04] B.Y. Yang, J.-M. Chen, and Y.-H. Chen, TTS: High-speed Signatures from Low-End Smartcards, CHES 2004, LNCS 3156, pp.371-385
[YCC05] B.Y. Yang, J.-M. Chen, and Y.-H. Chen, Perturbed Matsumoto-Imai Plus (PMI+) on the 8051
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
1. 翁秀琪、孫秀蕙,1994,〈選民的媒介使用行為及其政治知識、政黨偏好與投票行為之間的關聯---兼論台灣媒體壟斷對政治認知與行為之影響〉,《選舉研究》,第一卷第二期,頁1至25。
2. 耿曙、陳陸輝,2003,〈兩岸經貿互動與台灣政治版圖:南北區塊差異的推手〉,《問題與研究》,第四十二卷第六期,頁1至27。
3. 吳乃德,1993,〈國家認同和政黨支持-臺灣政黨競爭的社會基礎〉,《中央研究院民族學研究所集刊》,第七十四期,頁33至61。
4. 何思因,1994,〈台灣地區選民政黨偏好的變遷:1982-1992〉,《選舉研究》,第一卷第一期,頁39至52。
5. 王甫昌,1998,〈族群意識、民族主義與政黨支持:一九九○年代臺灣的族群政治〉,《臺灣社會學研究》,第二期,頁1至45。
6. 麥朝成、黃鴻,1996,〈Weber區位模型一階段與二階段分析之比較〉,《人文及社會科學集刊》,第八卷第二期,頁153至179。
7. 陳文俊,1995,〈統獨議題與選民的投票行為—民國83 年省市長選舉之分析〉,《選舉研究》,第二卷第二期,頁99至136。
8. 陳文俊,1997,〈族群、統獨立場,與公共政策:台灣地方菁英個案分析〉,《國立中山大學社會科學季刊》,第一卷第一期,頁29至76。
9. 陳文俊,2003,〈藍與綠—台灣選民的政治意識型態初探〉,《選舉研究》,第十卷第一期,頁41至80。
10. 陳陸輝、周應龍,2004,〈台灣民眾統獨立場的持續與變遷〉,《東亞研究》,第三十五卷第二期,頁145至185。
11. 陳義彥、陳陸輝,2003,〈模稜兩可的態度還是不確定的未來:台灣民眾統獨觀的解析〉,《中國大陸研究》,第四十六卷第五期,頁1至20。
12. 張卿卿,2002,〈大學生的政治媒介認知、政治媒介行為與其政治效能與政治參與之間的關係〉,《選舉研究》,第九卷第二期,頁37至63。
13. 盛杏湲,2002,〈統獨議題與台灣選民的投票行為:一九九○年代的分析〉,《選舉研究》,第九卷第一期,頁41至80。
14. 盛治仁,2004,〈媒體、民調和議題:談競選過程中民意的變動性和穩定性〉,《選舉研究》,第十一卷第一期,頁73至98。
15. 盛治仁,2000,〈統獨不再對決-從2000年總統選舉看台灣新社會分歧的興起及影響〉,《理論與政策》,第十四卷第二期,頁119至139。