透過您的圖書館登入
IP:3.21.76.0
  • 學位論文

第三代行動通訊金鑰更新認證協定之研究

A Study on the Authentication with Key Refreshment for 3G Telecommunication

指導教授 : 涂世雄
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在這篇論文中我們討論在認證的機制中加入〝金鑰更新〞的概念。為了達到UMTS所規範第三代行動通訊系統的安全需求,我們分別針對對稱加密系統與非對稱加密系統提出了新的認證機制。這兩種加密系統都有各自的優點:在對稱加密系統中,整個過程我們只需要一把秘密金匙;而非對稱加密系統則提供了金匙分配的解決方法。但這兩種方法應用在行動通信認證協定時,共同的缺點就是金鑰是永遠不變的,只要入侵者有心就可盜取或推算出金鑰。因此,我們的想法是在加密認證的過程中不斷更新鑰匙,這樣就可以防止駭客的竊取而提供給使用者更安全的通訊環境。我們提出的認證機制的特點就在於認證的過程中同時執行金鑰的更新。在本文中,我們針對第三代行動通訊系統所提出的認證機制,經分析確實能夠達到安全性的需求,符合威脅的準則與目標,同時也是方便而安全的。

關鍵字

認證協定 金鑰更新

並列摘要


The thesis presents the application of Key-Refreshment to the authentication mechanisms. We propose two different authentication mechanisms based on Symmetric-Key and Asymmetric-Key in order to meet the security requirements of the third generation mobile communication system, which is proposed by UMTS. The characteristic of the schemes is that when we go through the authentication process, it also performs Key-Refreshment mechanism. The users will use different key to encrypt their private messages every time when they access to the network for authentication request. It will prevent users’ private information from eavesdropping and grabbing by intruders, so it will provide more secure communication channel for users. The proposed authentication protocols will be analyzed that it achieves the critical goals of the requirements of security and threat, meanwhile, these protocols are efficient and secure enough.

並列關鍵字

Authentication Key Refreshment

參考文獻


[19] T. Kwon and J. Song, “Authenticated Key Exchange Protocols Resistant to Password Guessing Attacks,” IEEE Proceedings of Communications , Vol. 1455, pp. 304-308, Oct. 1998.
[2] V. Bharghavan and C. V. Ramamoorthy, “Security Issues in Mobile Communications,” Second International Symposium on Autonomous Decentralized Systems Proceedings. ISADS 95, pp. 19-24, 1995.
[3] J. Liu and Y. Wang, “A User Authentication Protocol for Digital Mobile Communication Network,” Wireless: Personal, Indoor and Mobile Radio Communications Merging onto the Information Superhighway, PIMRC'95. Sixth IEEE International Symposium , Vol. 2 , pp. 608-612, 1995.
[6] ETSI TS 21.133.”Security Threats and Requirements,” http://www.etsi.org/
[7] C. S. Park, “On Certificate-Based Security Protocols for Wireless Mobile Communication Systems,” IEEE Network, Vol. 115, pp. 28-32, Oct. 1997.

被引用紀錄


Tsai, C. F. (2005). 行動隨意網路使用者認證協定之研究 [master's thesis, Chung Yuan Christian University]. Airiti Library. https://doi.org/10.6840/cycu200500107
Dong, N. R. (2003). 改良UMTS認證機制之研究 [master's thesis, Chung Yuan Christian University]. Airiti Library. https://doi.org/10.6840/cycu200300116
鍾慶輝(2010)。行動通訊環境中植基於Humancrypt的使用者身份認證協定〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-1511201215465422

延伸閱讀