透過您的圖書館登入
IP:3.134.87.95
  • 學位論文

行動通訊網路鑑別技術之研究

A Study of Authentication Protocol for Mobile Networks

指導教授 : 黃仁俊

摘要


在現今的行動通訊中,個人的隱私與安全是使用者最關心的議題。密碼系統是保障機密與敏感性資料的一種重要技術,然而,主流的行動通訊設備製造商採用的處理器計算能力有限,以致於無法採用先進的安全技術。本論文將設計開發一些鑑別技術實現方法與有效率的鑑別技術。目前有許許多多的行動通訊安全協定是架構在RSA方法上,所以,我們首先設計一個架構於德州儀器公司的TMS320C55x系列數位訊號處理器的RSA實現方法,使得先進的安全協定可以運用於行動通訊設備上。然而,在許多的RSA應用中,常常選用較小的公開金鑰來縮短加密時間,解密部分依舊要耗費許多時間。為解決此一問題,我們提出一個利用強質數特性的RSA解密方法,此方法可以有效的提昇RSA的解密效率。最後,我們設計一個適用於行動通訊網路的鑑別機制。此機制植基於對稱式密碼系統、詢問-回覆與雜湊鍊節等密碼技術,而且提供了相互鑑別的特性。除此之外,本方法將產生使用者與服務供應商之間的通訊會談金鑰,以保護通訊內容,而且金鑰分配中心可利用金鑰轉換函數來避免使用者秘密金鑰的維護工作。

並列摘要


In mobile communications nowadays, personal privacy and security are of top concern to mobile phone subscribers. In protecting the confidential and sensitive data in mobile networks, cryptosystem can be considered as an important technique. Yet, mainstream mobile manufacturers can hardly adopt advanced security protocol to mobile devices, due to the limited computational ability of the processor they employ. Against the backdrop that many good authentication protocols of mobile network are based on RSA operations, the author of this dissertation shall design and propose some implementation methods and authentication protocols. First, the author designs an efficient and practical method to implement RSA algorithm originated from Texas Instruments TMS320C55x family, in order to make it possible to add an advanced security protocol to mobile networks. The TMS320C55x family is widely adopted in many wireless and mobile devices. While most of these RSA applications use a small public key to speed up the encryption operation, the decryption operation inevitably takes more computational time performing an operation of modular exponentiation. To solve this problem, the author proposes a RSA decryption method based on the strong prime criterion. The proposed method can greatly enhance the performance of the RSA decryption. The author proposes some implementation methods of public key cryptosystem to enhance the performance; however, the public key cryptosystem is still slower than the symmetric key cryptosystem. Finally, the author proposes a new efficient authentication protocol for mobile networks. The proposed protocol is based on the symmetric cryptosystem, challenge-response, and hash chaining, in which the user, the service provider, and the key distribution center authenticate mutually. In addition, the user and the service provider will generate a secret session key for their communication in this protocol. With the key derivation function, the key distribution center of mobile networks does not need to maintain the secret key database of users. The proposed protocol can be properly applied to the mobile networks.

參考文獻


[2]Asha Mehrotra and Leonard S. Golding, “Mobility and Security Management in the GSM System and Some Proposed Future Improvements,” Proc. IEEE, Vol. 86, No. 7, 1998, pp.1480-1497.
[3]A. Cilardo, A. Mazzeo, L. Romano, and G. P. Saggese, “Exploring the design-space for FPGA-based implementation of RSA,” Microprocessors and Microsystems, Vol. 28, 2004, pp. 183-191.
[4]A. Hayashi, “A new fast modular multiplication method and its application to modular exponentiation-based cryptography,” Electronics and Communications in Japan, Vol. 83, No. 12, 2000, pp. 88-93.
[5]B. Schneier, Applied Cryptography: protocols, algorithms, and source code in C, 2nd ed. John Wiley & Sons, Inc. 1996.
[6]Chi-Chun Lo and Yu-Jen Chen, “Stream ciphers for GSM networks,” Computer Communications, 24, 2001, pp.1090-1096.

延伸閱讀