(3.236.118.225) 您好!臺灣時間:2021/05/16 15:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:李明忠
研究生(外文):Lee,ming-chung
論文名稱:AdHoc網路運用於數位化戰場之安全探討
論文名稱(外文):The application of Ad Hoc networks in digitization battle-field
指導教授:蘇品長蘇品長引用關係
學位類別:碩士
校院名稱:國防大學管理學院
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
畢業學年度:98
語文別:中文
論文頁數:78
中文關鍵詞:Ad Hoc網路橢圓曲線密碼金鑰管理
外文關鍵詞:Ad Hoc networkElliptic curve cryptographyKey Management
相關次數:
  • 被引用被引用:2
  • 點閱點閱:174
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
行動隨意網路(Ad Hoc)網路因具備容易佈建的特性,以網路化作戰概念,為數位化戰場指管系統,提供整合性、機動性及即時性戰況體認資訊,惟對於使用無線網路而言,安全上的疑慮,為本文所研究的重點與方向,在考量國軍戰場的需求、各種網路頻寬的差異及未來數位化戰場環境的多變下,以橢圓曲線密碼學為理論基礎研究,設計具身分識別之Ad Hoc網路金鑰管理及加密的機制,實現未來在各種資訊與網路環境中身分鑑別需求及數位資訊傳遞安全性的可行性探討並導入國軍無線網路作業構想,期待後續系統開發及研討。
According to the characteristic of easy deploying of Ad Hoc network, it can provide the battled-field awareness include with the conformability, mobility and Immediacy for the digital C2 system. Because Ad Hoc is wireless, the goal of our research we concerned is the security. In this thesis, based on elliptic curve cryptography, considering requirements of battle-field, bandwidth of different network and variety of digital battlefield environment in the future, we design a mechanisms to manage and encrypt the key of Ad Hoc with identification to archive the feasibility of security of the identification and transmission in order to implement a system applied to the military wireless network.
目錄
摘要 i
圖次 v
表次 vi
第一章 緒論 1
1.1研究背景與動機 1
1.2研究目的 4
1.3研究方法與步驟 6
1.4研究範圍與限制 8
1.5論文架構 9
第二章 文獻探討 10
2.1無線隨意網路(Ad Hoc網路) 10
2.2網路安全模型 17
2.3對稱式加密法 18
2.4公開金鑰基礎建設 20
2.5雜湊函數 22
2.6背包式公開金鑰密碼系統 24
2.7橢圓曲線密碼系統 26
第三章 系統架構 33
3.1註冊及認證階段 36
3.2資訊加密階段 46
3.3資料標籤解密及驗證階段 49
第四章 安全性分析及效益評估 52
4.1相關攻擊法 52
4.2本設計之Ad Hoc網路系統可以抵抗的攻擊分析 53
4.3本設計之Ad Hoc網路系統的安全性分析 55
4.4效益評估 59
第五章 結論與未來方向 62
5.1結論 62
5.2未來方向 63
參考文獻 64
附錄一:如何將訊息轉換成橢圓曲線上之座標 68
附錄二:作者介紹 70
中文部分
[1]吳榮煌、王立柏、陳怡庭,2007,企業資訊安全重要課程—身分認證與文件加密,第76期中華技術第二章專題報導,頁66~75。
[2]祝躍飛、張亞娟,2006,橢圓曲線公鑰密碼導引,科學出版社
[3]粘天壽、吳順裕,2004,資訊與網路安全技術,旗標出版股份有限公司。
[4]張真誠、韓亮和賴溪松,1999,近代密碼學及其應用,松崗電腦圖書資料股份有限公司。
[5]楊中皇,2008,網路安全理論與實務第二版,學貫行銷股份有限公司。
[6]楊松諺,上官飛鳳,2004,Java Security 全方位解決方案,碁峰出版社。
[7]賴榮樞,2007,密碼學與網路安全,第四版,培生出版社。
[8]蘇品長,2007,植基於LSK和ECC技術之公開金鑰密碼系統,長庚大學電機工程研究所博士論文。
[9]蘇品長,2008,適用於Ad Hoc網路之快速交換金鑰機制設計,中正嶺學報,第37卷,第1期,頁219-228。
[10]廖述煌,張克章,2005,Ad Hoc Network在軍中運用的探討,黃埔學報,第49期,頁1-8。

英文部分
[11]B.M. Leiner, R. Ruth, and A.R. Sastry, 3(6), “Goals and Challenges of the DARPA GloMo Program,” IEEE Personal Communications, 1996.
[12]B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens, “An On-Demand Secure Routing Protocol Resilent to Byzantine Failures,” In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia , 2002.
[13]B. Awerbuch, D. Holmer, and H. Rubens, “Provably Secure Competitive Routing against Proactive Byzantine Adversaries via Reinforcement Learning,” Technical Report Version 1, May 16, 2003.
[14]E.F.Brickell., “Breaking Iterated Knapsacks”, Advances in Cryptology: Proceedings of Crypto84, G.R. Blakely and D. Chaum. eds., Springer-Verlag, 1985, pp. 342-358,.
[15]D.B. Johnson, D.A. Maltz and Y-C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks(DSR),” IETF MANET Working Group Internet-Draft, available at http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt., July 19, 2004
[16]R. S.,Douglas, “Cryptography: Theory and Practice 2rd,” Chapman & Hall/CRC, 2002.
[17]W. ,Diffie and M ,Hellman., “New Directions in Cryptography”, 1976.
[18]D.,Henry, “Who’s Got the Key?” Proceedings of the 27th Annual ACM SIGUCCS Conference on User Service: Mile High Expectations, 1999, pp.106-110.
[19]N.Kobiltz, “Elliptic Curve Cryptosystems,”Mathematics of Comutation, pp 203-209, 1987.
[20]K. Kieer. “A Weakness of the Menezes-Vanstone Cryptosystem”, Security Protocols Workshop, 1997, pp.201-206.
[21]L. Zhou and J.H. Zygmunt, “Securing Ad Hoc networks,” IEEE Network, 13(6) , 1999, pp.24-30.
[22]R.C. Merkle and M.,Hellman, “Hiding Information and Signatures in Trap-door Knapsacks”, IEEE Trans. Inform. Theory, Vol. IT-24, 1978, pp. 525-530.
[23]V.Miller ,“Use of Elliptic curves in Cryptography.”Advances in Cryptography-GRYPTO’85 Proceedings ,Springer-Verlag, 1986, pp.417-426.
[24]A. Menezes and S. ,Vanstone, “Elliptic curve cryptosystems and their implementation. Journal of Cryptology”, 1993, pp.209-224.
[25]N. Koblitz, “Elliptic Curve Cryptosystems”. Mathematics of Computation. 48(177), 1987, pp. 203-209.
[26]N. Milanovic, M. Malek, A. Davidson and V. Milutinovic, “Routing and Security in Mobile Ad Hoc Networks,” IEEE Computer, 37(2), 2004, pp.61-65.
[27]P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, “Optimized Link State Routing Protocol for Ad Hoc Networks.” Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings. IEEE International, 2001, pp.62-68.
[28]A. Shamir, “A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem”, Proceedings of the Twenty-Third Annual Symposium on Foundations of Computer Science, IEEE, 1982, pp. 145-152.
[29]S. Sarwono, S. Andy and E. Rendi, “An implementation of ElGamal elliptic curves cryptosystems”, Circuits and Systems, 1998, pp. 483-486.
[30]S. Bhargava and D. P. Agrawal,“Security enhancements in aodv proocol for wireless Ad Hoc networks, ” Vehicular Technology Conference, 2001.
[31]S. Buchegger and J.Y.L. Boudec, “The Selfish Node: Increasing Routing Security in Mobile Ad Hoc Networks.” IBM Research Report RR 3354, 2001.
[32]S. Buchegger and J.Y.L. Boudec, “Cooperative Routing in Mobile Ad-hoc Networks: Current Efforts Against Malice and Selfishness.” In Lecture Notes on Informatics, Mobile Internet Workshop, Informatik 2002, Dortmund, Germany, 2002.
[33]S. William, “Cryptography and Network Security Principles and Practices(Fourth Edition)”, Prentice Hall, 2006.
[34]ANSI X9.62 Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm (ECDSA), 2001.
[35]http://tech.ccidnet.com/pub/article/c1084_a196219_p1.html.
[36]http://www.ieee802.org/11/
[37]http://www.cteccb.org.tw/pdf/IECQ-49-6.pdf.
[38]http://www.csai.cn.
[39]Mobile Ad Hoc Networks. http://www.ietf.org/html.charters/Ad Hoc network-charter.html. 2000.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top