透過您的圖書館登入
IP:3.128.199.210
  • 學位論文

3G行動通訊使用者認證協定之研究

A Study on Authentication Protocol for 3G Mobile Communication Systems

指導教授 : 涂世雄
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


摘要 近幾年來,由於行動通訊技術發展迅速,帶給我們生活上許多便利與好處,例如:可以利用手機上網、進行電子交易、下載電子地圖、收發電子信件、視訊會議等等。在存取這一些服務時會有大量的重要訊息在無線通道中傳遞,如此會造成有心人士對這一些資料進行擷取或竊聽的動作,因此,我們必須考量到重要訊息在無線通道中傳輸的安全問題。在本論文中,我們提出新的三個基於公開金匙密碼系統的認證機制。所提出的三個認證機制是用來解決第三代行動通訊的安全問題,在安全性方面也比傳統式密碼系統來的安全。在第一個認證架構中,是使用者擁有網路運作者的公開金匙,網路運作者也擁有使用者的公開金匙。在第二個認證架構中,是利用交換使用者與網路運作者雙方證書的方法,去達成互相交換彼此的公開金匙。在第三個認證架構中,是藉由證書服務者發證書給使用者與網路運作者,藉由這一些證書來獲得雙方的公開金匙。在此,我們針對第三代行動通訊系統所提出的認證機制,是被分析能夠達到安全性的需求與威脅的準則與目標。此外,也能夠達到較低的運算複雜度和設計簡單但足以符合安全性認證協定。

並列摘要


Abstract In this thesis, we propose three new authentication mechanisms based on Asymmetric-key cryptosystems. The three authentication protocols are designed based on the security requirements of the third generation mobile communication systems, which is proposed by UMTS. The advantages of the Asymmetric-key cryptosystems are to solve a very important key management problem for key distribution. Besides, it can provide non-repudiation for the part of the transmitted data. Therefore, we adopt the Asymmetric-key cryptosystems to design our authentication schemes. The characteristic of the first schemes is that the User and the Network Operator have the public keys from each other, respectively. The characteristic of the second schemes is that we exploit the exchange of certificate to achieve the goal of exchange of the public key between the User and the Network Operator. The characteristic of the third schemes is that the Network Operator can obtain the public key from the User’s certificate sent by Certificate Server. Similarly, the User can obtain the public key from the Network Operator that is sent be Certificate Server. The proposed authentication protocols for 3G mobile communication systems are analyzed to be correct to achieve the critical goals of the requirements of security and threats, and these protocols are efficient and effective because they are computationally low complexity and are simple but secure enough.

並列關鍵字

Authentication Protocol 2G 3G Cryptography

參考文獻


[19] T. Kwon and J. Song, “Authenticated key exchange protocols resistant to password guessing attacks,” IEEE Proceedings of Communications , Vol.1455, pp.304-308, Oct 1998.
[2] V. Bharghavan and C. V. Ramamoorthy, “Security Issues in Mobile Communications,” Second International Symposium on Autonomous Decentralized Systems Proceedings. ISADS 95, pp.19-24, 1995.
[3] J. Liu and Y. Wang, “A User Authentication Protocol for Digital Mobile Communication Network,” Wireless: Personal, Indoor and Mobile Radio Communications Merging onto the Information Superhighway, PIMRC'95. Sixth IEEE International Symposium , Vol.2 , pp.608-612, 1995.
[4] W. Stallings, Cryptography and network security principles and practice, 2nd ed, Prentice Hall, Inc, 1999.
[6] ETSI TS 21.133.”Security Threats and Requirements, http://www.etsi.org/

被引用紀錄


chou, C. S. (2003). 建構於階層式存取控制之Mobile IP認證協定 [master's thesis, Chung Yuan Christian University]. Airiti Library. https://doi.org/10.6840/cycu200300468
Dong, N. R. (2003). 改良UMTS認證機制之研究 [master's thesis, Chung Yuan Christian University]. Airiti Library. https://doi.org/10.6840/cycu200300116
鍾慶輝(2010)。行動通訊環境中植基於Humancrypt的使用者身份認證協定〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-1511201215465422

延伸閱讀