透過您的圖書館登入
IP:13.59.231.155
  • 學位論文

結合資料隱藏與信息加密實現不可否認性之安全認證機制

The Design of a Secure and Non-Repudiation Authentication Mechanism with Data Hiding and Message Encryption

指導教授 : 賀嘉生
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


中 文 摘 要 網路的興起不僅提供了資訊傳遞的快速與便利,相對地讓一些有心人士可藉由它來從事非法的行為,如隨意截取網路上傳遞的訊息或偽冒他人傳送錯誤訊息;也由於這些網路安全的問題存在,使得一些網路應用無法直接順利達成,如網路購物電子錢包、無線通訊與醫療資訊等等的傳輸安全。因此,完善的資訊安全技術以確保資料能安全地與可靠地在網路上傳遞,為值得重視的研究主題之一。有鑑於目前資訊安全機制的不完善,本論文主要在發展一個具安全性並適用於各種不同資料型態的不可否認性之認證機制;並以具文字、信號與影像的電子病歷資料為實驗範例。 本論文提出以影像壓縮所產生的可容許誤差為基礎之雙極性多重基底數字系統,做為對資料的隱藏(加密)演算法。其原理是將不同類型的資料數據化後,隱藏於一幅影像內,接收者可藉由該影像來達到資料來源的認證,並可經由收發間的協定,取出所隱藏(加密)的資料與數位簽章。另外,本文亦提出一具不可否認性之認證機制來釐清資料的責任歸屬。其原理是使用簽章對的唯一性,以有效的防止網內第三者假冒傳送端將資料傳給接收端;並使用公正的第三者(認證中心) 儲存管理一個需配合使用者控制的動態認證碼,以讓使用者與認證中心彼此信賴。 本機制經實驗模擬後,有效改善目前現存的機制。以秘密通訊的觀點而言,除執行速度較快以外,由於本機制所產生的秘密金匙具資料相依性,故不須定期更換金匙以增加安全性。另外,本文亦提出以公開金匙的觀念,使用認證中心與動態認證碼之機制達到公正的仲裁功能;換言之,可同時達到彼此之間或與認證中心間之不可否認性。以數位簽章的觀點而言,一個具安全的簽章管理機制亦被提出,以增加認證的完整與安全性。 關鍵字:資訊安全、資料隱藏、認證、與數位簽章。

並列摘要


Abstract With the growing popularities of Internet, information could be transferred fast and conveniently among different institutions. However, this technology might bring some illegal transactions by unauthorized people, including intercepting information and pretending someone to transmit false messages via the Internet. Because of the existence of information security problems on Internet, some Internet applications such as transmitting electronic payment and exchanging medical information activities thus cannot be accomplished safely. As a result, a secure mechanism for data transmitted on the Internet is an important issue to explore. Therefore, an authentication technique with capabilities of confidentiality and non-repudiation for different data types is proposed in this dissertation. Furthermore, an electronic patient record (EPR) including the text, signal and image data types is simulated and evaluated by the proposed method. The proposed approach uses the bi-polar multiple number-base with tolerant error range (TER) from JPEG to hide (encrypt) data securely. Different types of data are enumerated and then hidden in a mark image. The receiver can use this marked image to authenticate the origin of data. And, the data can be extracted correctly by key escrow between the transmitter and the receiver. Moreover, a non-repudiation authentication can be achieved with a unique pair of digital signatures. The certificate authority (CA) is also proposed to store a dynamic authentication code generated by the users. Hence, the trust can be built between users and CA. The experimental results show that the proposed approach has faster processing time. Changing key periodically for better security is not necessary because the hidden (encrypted) data is data dependent. Furthermore, a secured management of digital signatures also is proposed to enhance the capabilities of integrity, confidentiality and authentication. Index terms: Information security, electronic patient records (EPRs), JPEG, authentication and digital signatures.

參考文獻


[6] J. Leach, “Dynamic authentication for smartcards”, Computers & Security, vol. 14, pp. 385-389, 1995.
[7] T. Verschuren, “Smart access: strong authentication on the Web”, Computer Networks and ISDN Systems, vol. 30, pp. 1511-1519, 1998.
[8] R. Wolfgang, C. Podilchuk, and E. Delp, “Perceptual watermarks for digital images and video,” http://www.ece.purdue.edu/~ace.
[9] J. Reid, “Plugging the holes in host-based authentication”, Computers & Security, vol. 15, pp. 661-671, 1996.
[10]“The digital signature standard proposed by NIST,” Comm. of the ACM, vol. 35, no. 7, pp. 36-40, July 1992.

延伸閱讀