(3.230.143.40) 您好!臺灣時間:2021/04/21 08:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:林世昌
研究生(外文):Shih-Chang Lin
論文名稱:改良非對稱式Rabin 密碼系統用於物聯網
論文名稱(外文):Improving the Asymmetric Rabin Cryptosystem
指導教授:江振瑞江振瑞引用關係
指導教授(外文):Jehn-Ruey Jiang
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程學系在職專班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:42
中文關鍵詞:物聯網非對稱式密碼系統Rabin 密碼系統安全性
外文關鍵詞:Internet of ThingsAsymmetric CryptographyRabin cryptosystemSecurity
相關次數:
  • 被引用被引用:1
  • 點閱點閱:256
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:42
  • 收藏至我的研究室書目清單書目收藏:0
物聯網是最近很熱門的議題,吸引非常多研究的關注,具有十分廣闊的市場
前景。透過物聯網技術,現實世界的真實物體皆可連結上網,因而延伸出許多新
穎的應用,例如居家照護、智慧城市與智慧工廠等。隨著物聯網的應用越來越廣
泛,資料的安全性也顯得越益重要。尤有甚者,許多物聯網設備藉由無線電傳輸
來交換資料,攻擊者很容易可以擷取以無線電傳輸的資料封包,造成使用者資料
外洩。因此,如何使用密碼系統的加解密技術來確保私密資料的安全性,成為發
展物聯網的一個重要議題。現今的加解密技術可分為對稱式與非對稱式兩類。對
稱式技術在加密與解密時所使用的金鑰是相同的,而其計算成本是兩類技術中較
低的,但是金鑰的發佈與管理確較為困難。非對稱式技術使用一組相關連但是不
同的公鑰和私鑰進行加密與解密,其計算成本是兩類技術中較高的,但是公鑰可
以公開發佈,因此金鑰的發佈與管理確較為容易,而且可以利用公鑰做為數位簽
章之用。本研究改良Rabin 密碼系統的非對稱式加解密技術應用於物聯網,其做
法為隨機選定某個在固定已知範圍內的數值,並根據此數值重複明文的最後幾個
字節進行加密產生密文,如此可以防止Rabin 密碼系統遭受選擇密文攻擊。本研
究也利用Rabin 密碼系統在加密與解密計算成本也不對稱的特性,讓物聯網中計
算能力與記憶體空間有限制的設備使用成本較低的計算進行加解密,而其他資源
較充足的設備則使用成本較高的計算進行加解密,預期可以使物聯網具有隱私性
(privacy) 、完整性(integrity) 、不可否認(non-repudiation)及驗證識別
(Authentication)等特性。
In recent years, Internet of Things (IoT) has been a hot topic; it
has attracted much research attention and has promising market
prospects. IoT can be used to connect real world objects to the Internet,
and thus creates novel applications, such as home care, smart cities,
and smart factories. With the increasing adoption of IoT applications,
the security of IoT data transmission is more and more important.
Moreover, many IoT systems exchange data via wireless communications.
Hackers are thus easy to intercept information to launch attacks. The
encryption and decryption techniques of cryptosystems are applied to
tackle the IoT security issues. The techniques are classified into two
kinds: symmetric techniques and asymmetric techniques. Symmetric
techniques use the same key to encrypt and decrypt data exchanged
between devices. Asymmetric techniques use a pair of a public key and
a private key to encrypt and decrypt data. Symmetric techniques have
lower computation costs, but the distribution and management of keys
are difficult for this kind of techniques. Asymmetric techniques have
higher computation costs, but the public keys can be publicly
distributed without leaking the system secrets. Moreover, they can be
used to achieve digital signatures. This study is to improve the
asymmetric Rabin cryptosystem for applying it to the IoT to resist the
chosen ciphertext attack by duplicating the last few plaintext bytes
of an arbitrary length that is within a fixed range. Moreover, this
iii
study utilizes the fact that the computation costs of encryption and
decryption are also asymmetric in the Rabin cryptosystem. IoT devices
with limited resources encrypt/decrypt data with lower computation,
while devices with adequate resources encrypt/decrypt data with higher
computation costs. The improved Rabin system is to endow the IoT with
the properties of privacy, integrity, non-repudiation and
authentication.
中文摘要 .......................................................... i
Abstract.......................................................... ii
目錄 .............................................................. v
圖目錄 ........................................................... vi
表目錄 .......................................................... vii
符號說明 ....................................................... viii
一、緒論 .......................................................... 1
1-1 研究背景與動機............................................................................................ 1
1-2 研究目的與貢獻............................................................................................ 4
1-3 論文架構........................................................................................................ 5
二、背景知識 ...................................................... 6
2-1 密碼學(Cryptology).................................................................................... 6
2-2 破密學(Cryptanalysis).............................................................................. 6
2-3 非對稱式加密(Asymmetric Cryptography).............................................. 7
2-4 Rabin 密碼系統.......................................................................................... 10
2-5 公開金鑰基礎建設(Public Key Infrastructure,PKI)...................... 11
三、系統設計 ..................................................... 13
3-1 系統架構圖.................................................................................................. 13
3-2 系統流程...................................................................................................... 14
3-3 安全性分析.................................................................................................. 16
3-4 嵌入式軟體實作.......................................................................................... 17
四、系統整合驗證與實作 ........................................... 19
4-1 系統測試流程.............................................................................................. 23
4-2 實作測試結果.............................................................................................. 26
4-3 分析及討論................................................................................................... 28
五、結論與未來展望 ............................................... 29
參考文獻 ......................................................... 30
附錄A 硬體規格 ................................................... 31
[1] 物聯網概論,碁峯資訊出版,2013 年1 月第1 版,ISBN:978-986-276-698-9
[2] 智慧城市,取自
https://zh.wikipedia.org/wiki/智慧城市
[3] 居家照護,取自
http://scimonth.blogspot.tw/2014/05/blog-post_2437.html
[4] Adlinktech,取自
http://www.adlinktech.com/big5/Internet_of_Things/IoT-based-Automated-Parking-
Systems.php?utm_source=
[5] Embedded innovator,取自
http://embeddedinnovator.com/2014/09/2601?lang=zh-hant
[6] Mullen, Gary & Mummert, Carl. Finite fields and applications. American Mathematical Society.
2007: 112. ISBN 9780821844182.
[7] W. Diffie and M. E. Hellman, “Multiuser Cryptographic techniques", In AFIPS
National Computer Conference, Vol. 45, pp. 109--112, 1976
[8] R.L. Rivest, A. Shamir, and L.M. Adleman, “A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21,
No. 2, Feb 1978, pp. 120-126.
[9] B. Schneier, “Applied Cryptography; Protocol, Algorithm, and Source Code in C,”
John Wiley & Sons, Inc., 1994.
[10]Menezes, Alfred; van Oorschot, Paul C.; and Vanstone, Scott A. Handbook of Applied
Cryptography. CRC Press, October 1996. ISBN 0-8493-8523-7
[11]Public Key Infrastructure,取自
https://zh.wikipedia.org/wiki/PKI
[12]Wikipedia, “Arduino”,取自
https://zh.wikipedia.org/wiki/Arduino
[13]Python,取自
https://zh.wikipedia.org/wiki/Python
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
無相關期刊
 
無相關點閱論文
 
系統版面圖檔 系統版面圖檔