跳到主要內容

臺灣博碩士論文加值系統

(44.220.247.152) 您好!臺灣時間:2024/09/16 22:13
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:翁承宏
研究生(外文):Cheng-Hung Weng
論文名稱:一個基於三個背包和具有明文編碼的新型加密系統實現
論文名稱(外文):A New Cryptosystem Implement Based on Three Knapsacks with Plaintext Encoding
指導教授:歐陽彥杰
指導教授(外文):Yen-Chieh Ouyang
口試委員:張建禕陳享民
口試委員(外文):Chein-Ⅰ ChangHsian-Min Chen
口試日期:2017-01-05
學位類別:碩士
校院名稱:國立中興大學
系所名稱:電機工程學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2017
畢業學年度:105
語文別:中文
論文頁數:36
中文關鍵詞:高階加密標準輸出反饋模式計數器模式三個背包加密
外文關鍵詞:Advanced Encryption StandardOutput FeedbackCounter ModeThree Knapsacks Encryption
相關次數:
  • 被引用被引用:0
  • 點閱點閱:221
  • 評分評分:
  • 下載下載:13
  • 收藏至我的研究室書目清單書目收藏:0
對稱式加密系統是應用範圍最廣的加密演算法,優點是速度快,但金鑰匙不能公開,需要有一個安全方式將金鑰匙送至對方,所以金鑰匙與密文的傳送不能在同一通道。而非對稱式加密系統的優點是金鑰匙可以公開,金鑰匙與密文的傳送可在同一通道,但速度會比對稱式加密系統慢。本論文對稱式加密是使用高階加密標準,非對稱式加密使用的是三個背包加密,它和RSA加密比起來,RSA n值的位元數至少要1500bits才是安全的,但三個背包加密用兩個非絕對遞增數列的乘積再加上一個絕對遞增數列的和,只要256bits可有效的抵抗攻擊。結合兩種加密系統的優點,利用對稱式加密的高階加密標準輸出反饋模式和計數器模式,來加密檔案大的明文,再利用非對稱式加密的三個背包加密來加密初始化向量,使得初始化向量與密文的傳送可在同通道,加強傳送的安全性。
The advantage of using symmetric encryption system is the fast encryption and decryption speed however the secret key cannot be publicized therefore we need a secure channel to transmit the secret key. The public key and private key used in asymmetric encryption system are slow but no need for key transmission. In this thesis, we have developed a secure and fast data transmission system that can take both the advantages on symmetric and asymmetric systems cryptosystem to transmit a large amount of data. The secure transmission system is combined an Advanced Encryption Standard(AES) with a symmetric key which is using Output Feedback(OFB)、Counter mode(CTR) and a Three Knapsacks Encryption(TKE) asymmetric key system. Compared to RSA cryptosystem, the RSA key needs at least 1500 bits but the TKE key needs only 256 bits. The TKE key is composed by a product of two non-superincresing knapsack and add one superincresing knapsack therefore can resist attack. A larger number of plaintext files are transmitted on this secure system and the test results show that the proposed system can have a great promise on both security and speed.
摘要 i
ABSTRACT ii
目次 iii
圖目次 v
表目次 vi
第一章 緒論 1
1.1 資料安全 1
1.2 對稱式加密 1
1.3 非對稱式加密 2
1.4 研究目的 3
第二章 AES架構與演算法 4
2.1 AES演算法概述 4
2.2 AES加密演算法 5
2.2.1 SubBytes 6
2.2.2 ShiftRows 8
2.2.3 MixColumns 8
2.2.4 AddRoundKey 8
2.3 AES解密演算法 9
2.3.1 INVSubBytes 9
2.3.2 INVShiftRows 11
2.3.3 INVMixColumns 11
2.4 OFB模式 11
2.5 CTR模式 13
第三章 三個背包加密系統 15
3.1 背包加密系統 15
3.2 金鑰匙產生 15
3.3 加密系統 18
3.4 解密系統 20
3.5 範例 22
3.6 背包的安全性 26
第四章 研究結果與比較 27
4.1 AES OFB和AES CTR模式 27
4.2 AES OFB和AES CTR加入Three Knapsacks模式 28
4.2.1 AES OFB加入Three Knapsacks模式 28
4.2.2 AES CTR加入Three Knapsacks模式 29
4.2.3 比較AES OFB和AES CTR加入Three Knapsacks模式 30
4.2.4 Three Knapsacks Load Key和Generation Key的比較 32
4.3 Encoding message size 33
第五章 結論與未來研究 35
5.1 結論 35
5.2 未來研究 35
參考文獻 36
[1]Behrouz A. Forouzan “Cryptography And Network Security ”, pp.55-58, 293-297, 2007.
[2]J. Daemen and V. Rijmen, “ AES Proposal: Rijndael ”, Document Version2, March9, 1999.
[3]C. S. Division. “Recommendation for block cipher modes ofoperation”,http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf.
[4]Yao-Zhang Huang. Master’s thesis. “A New Cryptosystem Base On Three Knapsacks with Plaintext Encoding,”2011.
[5]National Institute of Standards and Technology, “ Specification for the Advanced encryption Standard(AES)”, FIPS PUB197, November26, 2001.
[6]National Institute of Standards and Technology, “ Specification for the Data encryption Standard(DES)”, FIPS PUB46-3, October, 1999.
[7]R. C. Merkle and M. E. Hellman, “Hiding Information and Signatures in” Trapdoor Knapsacks,” IEEE Trans. Inf. Theory, IT-24(5), pp.525–530, 1978.
[8]J. C. Lagarias and A. M. Odlyzko, Solving Low Density Subset Sum Problems, J. Assoc. Comp. Math., vol.32, pp.229–246, Preliminary version in Proc. 24th IEEE, 1985.
[9]M. J. Coster. B. A. LaMACCHIA, A. M. Odlyzko and C. P. Schnorr. “An improved low-density subset sum algorithm.” Advance in Cryptology Proc. EUROCRYPT, 91, LNCS, vol.547, pp.54-67. Springer-Verlag, Berlin, 1991.
[10]K. Kobayashi, K. Tadaki, M. Kasahara and S. Tsujii: A Knapsack Cryptosystem Based on Multiple Knapsacks, International Symposium on Information Theory and its Applications, ISITA2010, 2010.
[11]T. Hattori, Y. Murakami and M. Kasahara :“Notes on security of SHP cryptosystems,” The 24th Symposium on Information Theory and Its Applications, pp.351–354,2001.
[12]T. DOUZONO, T. NASAKO, Y. MURAKAMI: “Effectiveness of Plaintext Encoding in Knapsack PKC,” International Symosium on Information Theory and its Applications, ISITA2008,2008.
[13]E.R. Blahut, “Algebraic Codes for Data Transmission,” Cambridge University Press, New York, USA, 2003
[14]M. Dworkin, “Recommendation for Block Cipher Modes of Operation: Methods and Techniques,” National Institute of Standards and Technology,Tech. Rep. NIST Special Publication 800-38a, 2001.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top