簡易檢索 / 詳目顯示

研究生: 陳松能
Chen, Sung-neng
論文名稱: 憑證管理及其應用
Certificate Management and Its Application
指導教授: 黃宗立
Hwang, Tzonelih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2004
畢業學年度: 92
語文別: 中文
論文頁數: 50
中文關鍵詞: 指紋金鑰
外文關鍵詞: certificate, ad hoc
相關次數: 點閱:83下載:9
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   隨著時代的進步,網際網路也逐漸的普及,網路上的交易更是日益繁盛,電子商務也蓬勃的發展,但隨著這些網路行為的發展,網路安全的問題慢慢受到一般大眾的重視,由於網際網路上的便利性,愈來愈多的人以網路上的交談取代了面對面的溝通,然而在公開的網際網路上,就會讓有心人有機可乘,一個惡意的攻擊者,可能擷取或篡改你的訊息內容,更可能直接偽冒你的身份,這些都是網路上的行為所會遭遇到的問題,於是便發展出了CA-PKI的架構,讓網路上的使用者有個可以信任的公開架構,在這個公開架構的憑藉下互相信任,每個合法的使用者皆須由第三公正單位,也就是CA,發給合法的使用者身份憑證,藉由大家都相信的第三公正單位,使得每個使用者都能有所憑藉而互相信任。
      電子憑證是由CA簽章發行的文件,可代表一個人的身份,電子憑證又可分為身份憑證及屬性憑證,身份憑證用來證明一個人的身份,及其擁有之公開金鑰,屬性憑證則用來作為存取控制的授權憑證,證明使用者擁有存取的權利,在PKI架構下,透過這些電子憑證,來驗證一個使用者的身份和權力,本文分成三個部份來討論,第二章描述在ad hoc network中憑證的使用,第三章則探討憑證間的關聯,第四章再介紹憑證在其他環境中之應用。

    none

    摘要..................................................................I 致謝..................................................................II 目錄..................................................................III 圖表目錄..............................................................VI 第一章 導論..........................................................1 1.1 前言.............................................................1 1.2 近代密碼學簡介...................................................3 1.3 憑證管理中心介紹.................................................8 1.4 研究動機與目的...................................................13 第二章 在Ad hoc環境中憑證的管理......................................14 2.1 Ad hoc network簡介...............................................14 2.2 自行組織金鑰架構.................................................16 2.3 自行組織金鑰架構的缺點...........................................18 2.4 在ad hoc network中使用threshold cryptography.....................19 2.5 在ad hoc network中使用PKI憑證....................................20 2.6 分析與比較.......................................................22 第三章 身份憑證與屬性憑證............................................24 3.1 屬性憑證介紹.....................................................24 3.2 屬性憑證與身份憑證的關連.........................................25 3.3 在Ad hoc network環境中的存取權限.................................27 3.4 Ad hoc networks中所產生的存取問題................................28 3.5 選擇性註銷憑證...................................................31 3.6 選擇性註銷的弱點.................................................32 3.7 屬性憑證與身份憑證的連結.........................................33 第四章 憑證的應用....................................................34 4.1 指紋的介紹.......................................................34 4.2 指紋特徵憑證及指紋機公開金鑰憑證.................................35 4.3 電子公文簡介.....................................................37 4.4 指紋特徵憑證與電子公文的結合.....................................39 4.4.1 使用者登入公文系統階段.....................................40 4.4.2 使用者撰寫公文.............................................41 4.4.3 使用者接收公文.............................................42 4.4.4 使用者加密公文.............................................42 4.4.5 使用者解密公文.............................................43 第五章 總結..........................................................46 5.1 結論.............................................................46 5.2 未來展望.........................................................47 參考文獻..............................................................48

    [1] William Stallings , “Network And Internetwork Security Principles And Practice” , Prentice Hall International Edition , pp.1-14 , 1995
    [2] M.E. Hellman and W. Diffie , “New Directions in Cryptography”, IEEE Transaction on Information Theory, Vol. IT-22, No.6, pp.644-654, Nov. 1976
    [3] Adleman L. , Rivest R. L. and Shamir A. ”A method for Obtaining Digital Signature and Public-key Cryptosystem”, Communication of ACM, vol 21, pp.120-126, 1978.
    [4] ElGamal T. , ”A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. on Info. Theory, vol.31, pp.469-472, 1985.
    [5] NBS FIPS PUB 46, ”Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977
    [6] J. Massey and X. Lai, ”A Proposal for a New Block Encryption Standard”, in Proceeding of EUROCRYPT’90, Springer-Verlag, Berlin, pp.389-404, 1991.
    [7] NIST FIPS PUB 180-1, ”Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, Apr.1995.
    [8] R. Rivest , ”The MD5 Message Digest Algorithm”, RFC 1321, Apr.1992.
    [9] ITU-T Recommendation X.509 (1997 E): Information Technology – Open Systems Interconnection – The Directory: Authentication Framework, June. 1997
    [10] C.E. Perkins, “Ad Hoc Networking Addison Wesley Professional”, Dec. 2000.
    [11] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. IEEE Workshop Mobile Computing Systems and Applications, Dec. 1994.
    [12] J.D. Turnow and J. Jubin, “The DARPA Packet Radio Project”, Proc. IEEE, 1987.
    [13] Jean-Pierre Hubaux , Levente Buttyan and Srdjan Capken , “Self-Organized
    Public-key Management for Mobile Ad Hoc Networks”, IEEE Transactions on mobile computing
    [14] Himanshu Khurana and Virgil D. Gligor, “Enforcing Dependencies between PKI Certificates in ad-hoc Networks”, IEEE International Conference on Telecommunications, Bucharest, Romania, June, 2001.
    [15] B. Schneier , “A Primer on Authentication and Digital Signatures”, Computer Security Journal ,v.10 ,n.2 , pp.38-40, 1994.
    [16] C.J. Mitchell, F. Piper and P. Wild, “Digital Signatures”, Contemporary Cryptology: The science of Information Integrity, IEEE Press, pp.325-378, 1991.
    [17] David B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Dec. 1994.
    [18] Joon S. Park and Ravi Sandhu. “Binding Identities and Attributes Using Digitally Signed Certificates”, 16th Annual Computer Security Applications Conference (ACSAC) , New Orleans , Louisiana , December 11-15 , 2000
    [19] 王瑞堂,黃宗立 “安全電子公文之設計”,國立成功大學資訊工程研究所碩士論文,2000
    [20] D. Shands , R. Yee and J. Jacobs. “Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies”, Proceedings of the Network and Distributed Systems Security Symposium, San Diego, pp.187, Feb. 2000.
    [21] T. Gibson. “An Architecture for Flexible”, High Assurance , Multi-Security Domain Networks. To appear in Proceedings of the Network and Distributed Systems Security Symposium, San Diego, Feb. 2001.
    [22] L. Zhou and Z. J. Hass. “Securing Ad Hoc Networks” IEEE Networks, 1999
    [23] M. Guerrero Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols”, Proc. ACM Workshop Wireless Security, Sept. 2002.
    [24] J. Douceur, “The Sybil Attack”, Proc. First Int’l Workshop Peer-to-Peer Systems(IPTPS), 2002.

    下載圖示 校內:2005-09-03公開
    校外:2005-09-03公開
    QR CODE