文化大學機構典藏 CCUR:Item 987654321/31988
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 46962/50828 (92%)
Visitors : 12409621      Online Users : 1283
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/31988


    Title: 改良式行動動態式身分識別認證機制
    An Improved Mobile Dynamic ID-Based Authentication Scheme
    Authors: 吳士良
    Contributors: 資訊管理學系碩士在職專班
    Keywords: 行動裝置
    匿名
    動態式身分識別
    金鑰交換
    認證機制
    離線猜密碼
    mobile device
    anonymity
    dynamic ID-based
    key exchange agreement
    authentication scheme
    offline password guessing
    Date: 2016
    Issue Date: 2016-02-17 14:35:18 (UTC+8)
    Abstract: 本研究針對學者Lin和Li, Liao, Kumari, Liang, Wu, and Khan等以行動裝置和動態式身分識別為基礎發表之金鑰交換認證機制進行探討,透過訊息內容竄改、資訊流分析和詳細的演算步驟,發現並揭露其認證機制之安全缺失,最後利用類似運算成本提出一個新的改良方案,以解決其漏洞並達成安全之需求。
    改良後的新機制使用Diffie-Hellman金鑰交換演算法、安全雜湊函數、訊息認證碼等密碼學技術,修改前人之認證過程並巧妙的利用新的加密金鑰設計,使得本認證機制可以實現相互驗證、防止通訊內容被竄改、提供使用者匿名保護、對抗離線猜弱密碼攻擊、提供通訊內容保密及前推私密性之安全保護等安全性之加強。
    In this research, we investigated the proposed two mobile dynamic ID authentication and key agreement schemes by Lin and by Li, Liao, Kumari, Liang, Wu, and Khan. We found and pointed out that these two schemes contain various security flaws and weaknesses. We demonstrated these security issues by using message content tampering, traffic analysis, and detailed algorithm steps. Therefore, we propose an improved mobile dynamic ID-based authentication scheme to solve these vulnerabilities with similar operation cost. The scheme also satisfies the feasible security requirements and features.
    Our proposed scheme uses cryptography technique such as Diffie-Hellman key exchange, secure hash function, and message authentication code to improve Lin's scheme. We use an ingenious design of encryption key and procedure to accomplish mutual authentication, resist modification of message and offline password guessing attacks, and provide anonymity and forward secrecy.
    Appears in Collections:[Department of Information Management & Graduate Institute of Information Management] Thesis

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML265View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback