透過您的圖書館登入
IP:18.218.218.230
  • 學位論文

基於浮動密碼典加密法之應用模擬

Application Simulation Based on Floating Codebook Encryption

指導教授 : 黃淳權
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


加密是將一段資訊透過特別的方式隱匿起來,使其在缺乏特殊訊息下而無法解讀。這種保護資訊的方法已存在好幾世紀,隨著資訊傳輸科技的普及,尤其是網際網路,使得舊有的加密技術不再確保文件的機密性,故促使專家學者們不斷提出各種創新的加密理念。 本篇論文中將介紹浮動密碼典加密法之架構,此加密法在加密過程中具有編碼與加密兩種範疇,當一段文字要加密時,會進行編碼再予以加密,編碼時所根據的是該加密人獨有的固定密碼字典與轉換函數所產生的浮動密碼字典,而予以計算出來。文字或影像碼經編碼後轉換成三元有序對,再經由特定的加密演算法進行加密。其中編碼與加密可因應加密環境而單一使用一本浮動密碼字典或混合使用多本浮動密碼字典。 浮動密碼典加密法之密碼字典結構為立體多殼層球架構,具有殼層與平面的觀念,使密碼字典具有16779264!種不同的變化。密碼字典可分成四種:原始密碼字典、公司端密碼字典、使用者固定密碼字典與使用者浮動密碼字典。密碼字典的編排設計與密碼字典之間的轉換方式,是本篇論文所要探討的。

並列摘要


Encryption is a treatment for hiding a piece of information via a specific method in order to make the information unreadable without the piece of information of the specific method. Methods for protecting information had been existed for centuries. But, with the popularization of information transmission technology development, especially the Internet, the old information protecting methods are insufficient for the purpose, and hence scholars and experts are embedding themselves in developing and proposing new methods for this purpose. In this thesis, a method based on floating codebook is introduced. And, the focus of this thesis is the editing and application simulation in verifying this method. Any code sequence can be edited into three-variable-ordered pairs, and the pairs can be encrypted by explaining and assigning them individually directly or indirectly into positions of a discrete finite space. And then, a mapping floating codebook can encrypt or move these positions, now points, to new positions secretly, and hence without the said floating codebook, the ordered collection of the new positions or the cipher text is unreadable. All three-variable-ordered pairs are transformed by the original codebook into the positions of a discrete finite space. And a unique codebook of the business further maps the positions of the discrete finite space into new positions. And then, the new positions are further mapped into newer positions by the transformations of the fixed codebook of the user. Once more, the newly mapped positions are finally mapped by the transformations of the floating codebook of the user into the cipher codes. A plain text is an ordered multiplicity subset of the three-variable-ordered pairs, and therefore, only a few of the three-variable-ordered pairs are required to be transformed hierarchically into the cipher text by the transformations of the floating codebook, which is randomly a function of the time being used and the identity of the user. The floating codebook is a transforming collection between the all three-variable-ordered pairs and the corresponding ciphered codes which is fused with all the said transformations, origin, business and floating codebooks. It is to keep each business has its unique codebook, and the unique codebook creates many different codebooks, each, called the fixed codebook, uniquely for a user. The unique fixed codebook can uniquely be transformed into the floating codebook of the random time variable. Randomly selecting a time, a random floating codebook is hence selected. The thesis shall present a piece of application simulation for verifying the theory beyond editing exploration.

並列關鍵字

floating codebook encryption codebook transformation

參考文獻


[12] 朱振國,「無失真編碼之加解密器之研製」,大同大學電機工程研究所碩士論文,民國九十六年。
[17] 周利欽,「Kerberos系統密碼認證之改進」,元智大學電機與資訊工程研究所,民國八十九年。
[25] 劉伯彥,「隨機動態加解密法」,亞洲大學資訊科學與應用學系碩士論文,民國九十五年。
[26] Chuen Chuan Huang, Chuen-Der Huang, Shin Ya Huang, Floating Password in Mutual Date Link, 2007 Cross-Strait Conference on Next Generation Internet Services and Applications, Asia University, pp.105-110, 2007.
[27] Chuen Chuan Huang, Chuen-Der Huang, Shin Ya Huang, Mutual Data Link as a Floating Password, e-CASE2007 international joint conference on e-Commerce, e-Administration, e-Society, and e-Education, Hong Kong, 2007

延伸閱讀