透過您的圖書館登入
IP:18.117.142.248
  • 學位論文

智慧卡密碼驗證機制通訊協定之應用與研究

A smart card based authentication protocol applications research

指導教授 : 石維寬

摘要


隨著網際網路技術的發展,如何保障使用者在雲端網路商業活動中的安全已成為一項重要的課題,遠端使用者驗證機制提供遠端服務伺服器驗證使用者的合法性,智慧卡則提供驗證密秘金鑰、雜湊函數、橢圓密碼曲線私密金鑰與其他較大長度密鑰的儲存功能。 為確保使用者在雲端網路活動中可以得以安全的保護,本篇論文提出以ID-Based為基礎的智慧卡與遠端伺服器交互驗證的方法,以確保遠端使用者與伺服器的使用安全,並利用此方法衍生至動態ID-Based 的安全驗證機制。 在確認ID-Based為基礎的智慧卡與遠端伺服器交互驗證方法的安全性之後,本篇論文提出以ID-Based與智慧卡的遠端伺服器交互驗證機制的應用方向,包括SIP使用的驗證機制HTTP的改善,與使用動態ID-Based與智慧卡的遠端伺服器交互驗證機制的商業應用。例如: 行動付費電視的動態ID使用者驗證機制。 本篇論文不但提出以ID-Based為基礎的智慧卡與遠端伺服器交互驗證方法,也分析雜湊函數、橢圓密碼曲線等加解密方法的計算成本,以提供更有效率的交互驗證機制方法可以應用於各種商業活動中。

並列摘要


With current developed network technologies, how to assure the security of these activities in an insecure communication channel has become one of the most important issues. Among the most common procedures dealing with security issues, remote user authentication is an effective way which provides a service for remote server verifying the legitimacy of a user. Several studies have provides secured authentication methods, for instance, DH-based (Diffie-Hellman) authentication and ECC-based (Elliptic Curves Cryptography) authentication methods, but some of them need users to memorize long-term private keys, passwords and some other cipher codes for authenticating procedures. It is absurd and inefficient for users. In this study, a Smart Card-based method is employed to make it possible to go further along with those unsolved problems. Smart card-based password authentication has been proved to be a more convenient, effective, and secure way, in that it provides a mechanism with storage space for a secrete code, hash function, ECC (Elliptic Curves Cryptography) private code and other cipher code or long-term code. To provide a secured activity of a user through an insecure cloudy network, this dissertation proposes an ID-Based mutual authentication using smart cards to assure the security of a remote user and server. In addition, an advanced dynamic ID-Based mutual authentication using smart cards to provide an anonymous mechanism to protect user’s private information is provided in this dissertation. Furthermore, we propose an ID-based SIP (Session Initiation Protocol) authentication to evade the attack risks of HTTP (Hypertext Transfer Protocol) digest authentication protocol documented in RFC2617 for identity authentication, and a dynamic ID-Based authentication for MPTV (Mobile Pay-TV) to protect a user from the risks of animus attack over an insecure cloudy network. The proposed protocol of ID-Based authentication using smart cards is not only proved to be a more sophisticated way in respect of current security issues, but also can be applied in many other business activities, such as ATM, and etc.

參考文獻


[44] Lee, C. C., On security of an Efficient Nonce-based Authentication Scheme for Session Initiation Protocol, International Journal of Network Security, 9 (2009) 201-203.
[81] Tsai, J.-L., Efficient Nonce-based Authentication Scheme for Session Initiation Protocol, International Journal of Network Security, 9(1) (2009) 12-16.
[5] Boneh, D., Gentry, C., Lynn, B. and Shacham, H., Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, in: Advances in Cryptology — EUROCRYPT 2003, Springer Berlin Heidelberg, Lecture Notes in Computer Science, 2003, pp. 641-641.
[6] Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J. and Brandic, I., Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems, 25 (2009) 599-616.
[7] Chen, L. and Kudla, C. Identity based authenticated key agreement protocol from pairings. in CSFW 2003. 2003: IEEE Computer Society Press.

延伸閱讀