透過您的圖書館登入
IP:3.135.183.89
  • 學位論文

身份辨識驗證技術之設計與應用

The Design and Applications of User Authentication Protocols

指導教授 : 黃慧鳳

摘要


在現今資訊與網際網路科技發達的時代,資料的保密性及完整性已是十分重要的技術。由於資訊的傳輸不是經由無線通訊就是開放的網路環境,皆必須確認是合法使用者才能取得相關的服務,因此許多身份辨識之安全及隱私問題等相關研究紛紛提出。譬如:智慧卡(Smart Cards)(信用卡、提款卡、悠遊卡等)及無線射頻辨識(RFID)系統之身份辨識應用等等,兩者皆具備少量儲存空間及簡易計算之特性。由於成本低、尺寸小以及所帶來的方便性已是日常生活中不可或缺的一部份。 由於大部份先前學者所提出的方法皆假設智慧卡是具有防篡改之先決條件,否則存放於智慧卡內的資料一旦被提取出來,極易遭受攻擊。然而,透過洩露訊息或特殊計算耗功率的分析表示,存放在智慧卡中的重要資訊是可以被破壞擷取的。因此,本研究將提出一個基於亂數的相互認證方法應用於智慧卡上,在我們的研究中,即使智慧卡內的資訊被擷取,亦不會造成安全上的缺失,同時還滿足了安全性、低運算成本及相互認證的特性。 另一方面,為了保護使用RFID用戶資料的安全和隱私,以及避免訊息被追踪,在2010年,葉等學者提出了一個基於二次剩餘之RFID認證的改進方式。不過,葉等學者提出的方法並無法達到安全的需求。因此在本研究中我們提出一個簡單且快速的驗證機制,不但可滿足各方面之安全需求,並且適用於大型資料庫的RFID系統。 整體而言,本研究在探討一更有效率且低計算量的驗證協定技術,適用於智慧卡或RFID系統。相信透過的我們的研究,將更有益於電子交易的應用。

並列摘要


It is an important to ensure data confidentiality and integrity in current of network environment. Due to the information transmitting either via radio frequency communication or by opening network environment, message privacy and authentication need to be examined through some of certificated mechanisms. With the applications such as smart cards (credit cards, ATM cards, and easy cards etc.) and Radio Frequency Identification (RFID) system, both of them have the common characteristic of simple computation power and memory capabilities. Because of their low production costs, small size and the portability, that anticipated to be widely used in our daily life. Most of the previously proposed schemes based on smart cards which have the tamper resistance assumption for the smart card. However, many researches have shown that the secrets stored in a smart card can be breached by analyzing the leaked information or monitoring the power consumption. This study will propose a new mutual authentication scheme based on nonce and smart cards, the assumption of tamper resistance for smart cards is not essential in the proposed method. Our study can prevent forgery attacks and remedy previously proposed schemes’ weakness. Moreover, our scheme not only achieves the mutual authentication but also can satisfy the security and low-computation costs. On the other hand, to provide security and user’s privacy, and to protect user from tracing, in 2010, Yeh et al. proposed an improvement of the RFID authentication scheme based on quadratic residues, but theirs scheme cannot satisfy the security. However, most of previously proposed schemes are not suitable for a large-scale RFID system. Therefore, this study proposes a new efficient RFID mutual authentication scheme which can provide the privacy of tags. The distinct response messages can prevent an attacker to trace the tag and suffer from various attacks. Moreover, the proposed scheme can be used in a large-scale RFID system. Overall, this research is to investigate more efficient and low-computation cost techniques for smart cards or RFID systems. We believe the result of proposed schemes will be more attractive to many electronic transactions.

參考文獻


[1]C. K. Chan and L. M. Cheng, “Cryptanalysis of timestamp-based password authentication scheme”, Computers and Security, Vol. 21, No. 1, pp. 74–76, 2002.
[2]Y. Chen, J. S. Chou and H. M. Sun, “A novel mutual-authentication scheme based on quadratic residues for RFID systems", Computer Networks, Vol. 52, No. 12, pp. 2373–2380, 2008.
[3]C. L. Chen and Y. Y. Deng, “Conformation of EPC class 1 generation 2 standards RFID system with mutual-authentication and privacy protection”, Engineering Applications of Artificial Intelligence, Vol. 22, No. 8, pp. 1284–1291, 2009.
[4]Y. Y. Chen, M. L. Tsai, J.K. Jan, “The design of RFID access control protocol using the strategy of indefinite-index and challenge-response”, Computer Communications, Vol. 34, No. 3, pp. 250–256, 2011.
[5]H. Y. Chien, “SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity”, IEEE Transactions on Dependable and Secure Computing, No. 4, pp. 337–340, 2007.

延伸閱讀