文化大學機構典藏 CCUR:Item 987654321/28154
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46867/50733 (92%)
造访人次 : 11882496      在线人数 : 1097
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/28154


    题名: 以多項式為基礎的智慧卡認證協議之改良
    Improvement of Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards
    作者: 凃承澔
    贡献者: 資訊管理學系
    关键词: 智慧卡
    Chaotic Maps
    Diffie-Hellman金鑰交換演算法
    安全雜湊函數
    認證
    日期: 2014
    上传时间: 2014-09-18 14:48:14 (UTC+8)
    摘要: 隨著Smart Card運用越來越頻繁,Smart Card資訊安全上的問題也漸漸出現,如果使用Smart Card所制定的認證協議不夠完善,可能會遭到不明人士的假冒、攔截、竄改或重複發送資料等攻擊。由於Smart Card面臨各種威脅,對於Smart Card的資訊安全也必須重視。
    Chaotic密碼學最早出現於1989,而Matthews也在後續提出Chaotic Maps系統。在2007年,Xiao等人提出使用Chaotic Maps之金鑰協議,其中過程結構與Diffie-Hellman金鑰交換演算法相似。Guo與Chang在2013年提出使用智慧卡與Chaotic Maps多項式認證協議,在成本上尚有改良空間,而安全上可能會讓使用者被追蹤與雙方金鑰不一致。
    本研究改良使用Chaotic Maps多項式的認證協議,修改認證過程,避免使用者被攻擊者追蹤,達成金鑰協議,也減少在計算成本上的費用。
    With more and more frequent use of smart card, security issues on smart card gradually appear. If authentication protocol using smart card is not perfect, it may suffer different at-tacks such as impersonation, interception, modification, and replay. As the smart card authen-tication is facing various threats, applications on smart cards also must pay attention to infor-mation security.
    Chaotic cryptography first appeared in 1989, and Matthews also proposed Chaotic Maps system later. In 2007, Xiao et al. proposed key agreement protocol using Chaotic Maps similar to Diffie-Hellman key exchange algorithm. Guo and Chang, in 2013, proposed an authen-tication protocol using smart cards with Chaotic Maps polynomial. However, improvement is required in terms of computation cost and security. In the protocol, a user may be tracked and the exchanged keys in both sides may be inconsistent under attack.
    Based on Guo and Chang’s work, this study proposes an improved authentication proto-col using Chaotic Maps polynomial and smart cards. By modifying their authentication pro-cess, the improved protocol not only achieves key agreement, avoids being attacked by track-ing users, but also reduces the computation costs in the authentication process.
    显示于类别:[資訊管理學系暨資訊管理研究所 ] 博碩士論文

    文件中的档案:

    档案 描述 大小格式浏览次数
    fb140918144731.pdf942KbAdobe PDF558检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈