English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46867/50733 (92%)
造訪人次 : 11877653      線上人數 : 572
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/28154


    題名: 以多項式為基礎的智慧卡認證協議之改良
    Improvement of Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards
    作者: 凃承澔
    貢獻者: 資訊管理學系
    關鍵詞: 智慧卡
    Chaotic Maps
    Diffie-Hellman金鑰交換演算法
    安全雜湊函數
    認證
    日期: 2014
    上傳時間: 2014-09-18 14:48:14 (UTC+8)
    摘要: 隨著Smart Card運用越來越頻繁,Smart Card資訊安全上的問題也漸漸出現,如果使用Smart Card所制定的認證協議不夠完善,可能會遭到不明人士的假冒、攔截、竄改或重複發送資料等攻擊。由於Smart Card面臨各種威脅,對於Smart Card的資訊安全也必須重視。
    Chaotic密碼學最早出現於1989,而Matthews也在後續提出Chaotic Maps系統。在2007年,Xiao等人提出使用Chaotic Maps之金鑰協議,其中過程結構與Diffie-Hellman金鑰交換演算法相似。Guo與Chang在2013年提出使用智慧卡與Chaotic Maps多項式認證協議,在成本上尚有改良空間,而安全上可能會讓使用者被追蹤與雙方金鑰不一致。
    本研究改良使用Chaotic Maps多項式的認證協議,修改認證過程,避免使用者被攻擊者追蹤,達成金鑰協議,也減少在計算成本上的費用。
    With more and more frequent use of smart card, security issues on smart card gradually appear. If authentication protocol using smart card is not perfect, it may suffer different at-tacks such as impersonation, interception, modification, and replay. As the smart card authen-tication is facing various threats, applications on smart cards also must pay attention to infor-mation security.
    Chaotic cryptography first appeared in 1989, and Matthews also proposed Chaotic Maps system later. In 2007, Xiao et al. proposed key agreement protocol using Chaotic Maps similar to Diffie-Hellman key exchange algorithm. Guo and Chang, in 2013, proposed an authen-tication protocol using smart cards with Chaotic Maps polynomial. However, improvement is required in terms of computation cost and security. In the protocol, a user may be tracked and the exchanged keys in both sides may be inconsistent under attack.
    Based on Guo and Chang’s work, this study proposes an improved authentication proto-col using Chaotic Maps polynomial and smart cards. By modifying their authentication pro-cess, the improved protocol not only achieves key agreement, avoids being attacked by track-ing users, but also reduces the computation costs in the authentication process.
    顯示於類別:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    fb140918144731.pdf942KbAdobe PDF558檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋