透過您的圖書館登入
IP:18.226.28.197
  • 學位論文

基於柴比雪夫多項式的三方驗證金鑰協定

Three-party Authentication Key Agreement Protocol Based on Chebyshev’s Polynomials

指導教授 : 黃慧鳳

摘要


行動商務已愈來愈普及,例如手機已是一個攜帶方便且具備安全性及計算能力的儲存載具,更是作為電子商務中付款機制不可或缺的設備, 因此藉由行動裝置所提供的應用加值服務種類也相對提高,而手機作為第三方行動支付的工具,若是手機或密碼被盜用可能會造成個人的財物損失重大。因此,透過手機(或IC智慧卡)作為身分辨識的付款驗證協定的技術,以確保個人存取資料之安全是很重要的。而傳統之驗證和保護機制都需要運用高次的指數運算或橢圓曲線系統的乘法運算,如RSA或ECC等公開金鑰密碼系統,較不適合於行動設備之環境。基於Chebyshev chaotic polynomial map與生物特徵,本研究提出一個比較有效率且易於實作的安全三方驗證協定(three-party authentication key agreement protocol) 技術應用於行動支付,且信賴系統中心不需要額外的裝置來記錄使用者密碼,所提之研究可防禦密碼之猜測攻擊與其他各項不同之安全威脅,適合應用於硬體資源效能有限之環境,除了保護資料在傳輸的過程中免於遭受它人的存取或修改以外,進一步提升資訊服務的品質。本研究更適合於無線通訊設備或行動裝置之使用者,將可促進電子商務之行動支付驗證系統的相關研究發展,除了資料的機密性外並能確保個人之隱私安全,期望透過所發展之植基於無線裝置上的資訊安全技術, 提供未來高品質且更快速、更安全以及更優質生活環境。

並列摘要


Mobile commerce has become more and more popular. For example, mobile phones are a portable storage device that is easy to carry and has security computing ability. It is also an indispensable device for payment mechanisms in e-commerce. Therefore, the types of application services provided by mobile devices are gradually increasing, as a third-party mobile payment tool. If the mobile phone or password is stolen, the mobile phone may cause significant personal damage. Therefore, it is important to ensure the security of personal access to data through the use of mobile phones (or IC smart cards) as a payment technology for identity recognition. Traditional verification and protection mechanisms require high-order exponential operations or multiplication operations of elliptic curve systems, such as public key cryptosystems such as RSA or ECC, which are less suitable for mobile devices, Based on the Chebyshev chaotic polynomial map and biometrics, this study proposes a more efficient and easy-to-implement three-party authentication key agreement protocol for mobile payments, and does not require additional equipment in the trusted system center to record the user password. The proposed research can defend against password guessing attacks and other security threats. It is suitable for environments with limited hardware resources and improve the quality of information services. This study is more suitable for users of wireless communication or mobile devices. It will promote the research and development of mobile payment verification systems for e-commerce. In addition to the confidentiality of data, it can ensure the privacy of individuals. Based on information security technology on wireless devices, it provides future high quality and faster, safer and better living environments.

參考文獻


[1]. Tseng, H., Jan, R., Yang, W., “A chaotic maps-based key agreement protocol that preserves user anonymity”, IEEE International Conference on Communications, ICC’09, Dresden, Germany, pp. 1–6, 2009.
[2]. Lee, C.C., Chen, C.L., Wu, C.Y., Huang, S.Y., “An extended chaotic maps-based key agreement protocol ith user anonymity’, Nonlinear Dyn, 69, 79–87, 2012.
[3]. He, D., Chen, Y., Chen, J., “Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol”, Nonlinear Dyn, 69, 1149–1157, 2012.
[4]. 2. Xiang, T., Wong, K., Liao, X., “On the security of a novel key agreement protocol based on chaotic maps”, Chaos Solitons Fractals, 40(2), 672–675, 2009.
[5]. Tan, Z, “A chaotic maps-based authenticated key agreement protocol with strong anonymity”, Nonlinear Dyn, 72, 311– 320, 2013.

延伸閱讀