透過您的圖書館登入
IP:52.15.59.163
  • 學位論文

高效率的金鑰密碼管理系統之設計與應用

The Design and Applications of Efficient Cryptographic Key Management Systems

指導教授 : 黃慧鳳
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


隨著資訊科技的發展,行動裝置及無線網路多方的應用在我們日常生活中愈來愈普及。例如:利用手機可舉行會議的對談,或是到醫療機構利用健保卡登入個人資料,取得醫療服務,等等都是資訊的應用。因此,人人都可利用網路及無線的媒介取得資訊,所以在資訊傳遞的過程中,資訊的安全更加重要。 因此,我們提出兩個可應用在無線網路中的安全金鑰管理系統機制,其一為『低運算量的手機行動會議鑰匙系統』以及『符合HIPAA隱私權及資訊安全的金鑰管理密碼系統』。我們的方法具有效率且安全,而僅僅使用簡單的互斥運算及雜湊函數。由於,我們所提出的方法具有下列特性:(1)低運算量及(2)低儲存空間,因此,很適合用於具低運算能力之無線裝置上。整體而言,本論文將探討一些更有效率之技術而應用於無線裝置上,相信我們的研究,將更有益於在無線的服務。

關鍵字

資訊安全 會議錀匙 健保卡

並列摘要


Developments of information and technology, the network, applying to our daily life in many ways of wireless network. As if use the apparatus of action: such as the mobile phone, it can hold on the moblie conference, or reach the medical organization utilize and enable health card to obtain the personal medical information, it is all the application of the information. However, each one may obtain the information from network or wireless. Therefore, information security plays an important role for wireless communication networks. This study, we propose two methods for applications in wireless communication. One is “A Low-computation Conference Key System for Mobile Communications”, another is “A New Design of Cryptographic Key Management for HIPAA Privacy and Security Regulations.” Our methods are quite simple and efficient, because they do not need lots of modular exponentiation. Our schemes are calculated only through the exclusive-or ( ) operation and hash function. Therefore, the proposed methods have the following properties: (1) low-computation, and (2) low- memory cost. Hence, our study is very suitable for the limited computing capabilities of wireless devices. Overall, this thesis to investigate more efficient techniques is wireless devices. We want the result of proposed schemes will be more attractive to many wireless services.

並列關鍵字

Information security conference key HIPAA

參考文獻


[3] C.C. Chang, T.C. Wu, and C.P. Chen, “The Design of Conference Key Distribution System”, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology , pp. 459-466, 1992.
[4] M.S. Hwang and W.P. Yang, “Conference Key Distribution Schemes for Secure Digital Mobile Communications”, IEEE Transactions on Journal on Selected Areas in Communications, vol. 13, pp.416-420, 1995.
[5] M.S. Hwang, “Dynamic Participation in a Secure Conference Scheme for Mobile Communications”, IEEE Transactions on Vehicular Technology, vol. 48, pp. 1469-1474, 1999.
[6] K.F. Hwang and C.C. Chang, “A Self-encryption Mechanism for Authentication of Roaming and Teleconference Services”, IEEE Transactions on Wireless Communications, vol. 2, no. 2, pp. 400-407, 2003.
[8] M. Minami, T. Ikeda, and M. Takeuchi, “Dynamical Model of Mobile Robot Including Slipping of Carrying Objects“, International Journal of Innovative Computing, Information and Control, vol. 3, no. 2, pp. 353-369, 2007.

延伸閱讀