現行加密系統,大部份利用電腦亂數做為通訊鑰匙,運用特定擷取亂數技術進行餘數運算,與明文資料進行攪亂後得出不可讀之密文內容,而這類使用電腦來模擬亂數序列的方法,稱之為「虛擬亂數」(Pseudo random number),此類演算法也稱為「虛擬亂數產生器」(Pseudo-random number generator, PRNG)。 一般而言,一個好的加密法的安全性植基於虛擬亂數產生器產生之亂數序列隨機性之強度。線性同餘亂數產生器為目前最廣為應用之亂數產生機制,原因在於其演算簡單且快速,然而,攻擊者卻能從其產生之亂數序列推算出其規則性而得以破解。而本所前期學長鄧名言,於2009電子商務與數位生活研討會提出變化型LCG虛擬亂數產生機制,嘗試犧牲部份運算時間,增加變化型LCG虛擬亂數產生器亂數種子為有心者破解的困難度,針對線性同餘法產生器之弱點加以改良及變化,強化透過LCG虛擬亂數產生器產生亂數序列之不可預測性,提升加密機制整體之安全性。本研究即針對其產生機制加以改良,並就資料傳輸的安全性及資料處理時的時效性兩者間加以考量,嘗試找出運算參數最佳本益比範圍,以兼顧安全與效率,進而提供為國軍加解密系統參考。
The study is used 'linear congruential generator, LCG' algorithm that used popularly at present standing on producing pseudo random numbers, and improve and change to the weakness of the linear congruential generator, propose an enhanced LCG mechanism of producing pseudo random numbers, in order to strengthen on the unpredictability that the sequence of pseudo random numbers generator through LCG algorithm to promote whole security of encrypt mechanism. In general, a good plant security encryption method based on virtual random number generator random number sequence generated by the strength of randomness. Linear congruent random number generator is the most widely used mechanism for the random number generator, because of its calculation is simple and fast, however, arise from an attacker was able to calculate the random number sequence to its rule of the crack. The seniors of this pre-Deng famously, in 2009, e-commerce and digital life changing workshop based LCG random number generation mechanism of virtual try to sacrifice some computing time to increase the changes of the virtual type LCG random number generator random number seeds for the very dedicated to the crack the difficulty level, for the linear congruential generator of the weaknesses of law to be Improved and changes to strengthen through the LCG random number generator produces a virtual random number sequence of unpredictability to enhance the safety of the whole encryption mechanism. This study is to improve its mechanisms, and to the security of data transmission and data processing were the time between two time-to consider in the attempt to find the best earnings ratio range of operation parameters in order to balance security and efficiency, thus providing for the military encryption system reference.