| 研究生: |
陳松能 Chen, Sung-neng |
|---|---|
| 論文名稱: |
憑證管理及其應用 Certificate Management and Its Application |
| 指導教授: |
黃宗立
Hwang, Tzonelih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2004 |
| 畢業學年度: | 92 |
| 語文別: | 中文 |
| 論文頁數: | 50 |
| 中文關鍵詞: | 指紋 、金鑰 |
| 外文關鍵詞: | certificate, ad hoc |
| 相關次數: | 點閱:83 下載:9 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著時代的進步,網際網路也逐漸的普及,網路上的交易更是日益繁盛,電子商務也蓬勃的發展,但隨著這些網路行為的發展,網路安全的問題慢慢受到一般大眾的重視,由於網際網路上的便利性,愈來愈多的人以網路上的交談取代了面對面的溝通,然而在公開的網際網路上,就會讓有心人有機可乘,一個惡意的攻擊者,可能擷取或篡改你的訊息內容,更可能直接偽冒你的身份,這些都是網路上的行為所會遭遇到的問題,於是便發展出了CA-PKI的架構,讓網路上的使用者有個可以信任的公開架構,在這個公開架構的憑藉下互相信任,每個合法的使用者皆須由第三公正單位,也就是CA,發給合法的使用者身份憑證,藉由大家都相信的第三公正單位,使得每個使用者都能有所憑藉而互相信任。
電子憑證是由CA簽章發行的文件,可代表一個人的身份,電子憑證又可分為身份憑證及屬性憑證,身份憑證用來證明一個人的身份,及其擁有之公開金鑰,屬性憑證則用來作為存取控制的授權憑證,證明使用者擁有存取的權利,在PKI架構下,透過這些電子憑證,來驗證一個使用者的身份和權力,本文分成三個部份來討論,第二章描述在ad hoc network中憑證的使用,第三章則探討憑證間的關聯,第四章再介紹憑證在其他環境中之應用。
none
[1] William Stallings , “Network And Internetwork Security Principles And Practice” , Prentice Hall International Edition , pp.1-14 , 1995
[2] M.E. Hellman and W. Diffie , “New Directions in Cryptography”, IEEE Transaction on Information Theory, Vol. IT-22, No.6, pp.644-654, Nov. 1976
[3] Adleman L. , Rivest R. L. and Shamir A. ”A method for Obtaining Digital Signature and Public-key Cryptosystem”, Communication of ACM, vol 21, pp.120-126, 1978.
[4] ElGamal T. , ”A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Trans. on Info. Theory, vol.31, pp.469-472, 1985.
[5] NBS FIPS PUB 46, ”Data Encryption Standard”, National Bureau of Standards, U.S. Department of Commerce, Jan. 1977
[6] J. Massey and X. Lai, ”A Proposal for a New Block Encryption Standard”, in Proceeding of EUROCRYPT’90, Springer-Verlag, Berlin, pp.389-404, 1991.
[7] NIST FIPS PUB 180-1, ”Secure Hash Standard”, National Institute of Standards and Technology, U.S. Department of Commerce, Apr.1995.
[8] R. Rivest , ”The MD5 Message Digest Algorithm”, RFC 1321, Apr.1992.
[9] ITU-T Recommendation X.509 (1997 E): Information Technology – Open Systems Interconnection – The Directory: Authentication Framework, June. 1997
[10] C.E. Perkins, “Ad Hoc Networking Addison Wesley Professional”, Dec. 2000.
[11] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proc. IEEE Workshop Mobile Computing Systems and Applications, Dec. 1994.
[12] J.D. Turnow and J. Jubin, “The DARPA Packet Radio Project”, Proc. IEEE, 1987.
[13] Jean-Pierre Hubaux , Levente Buttyan and Srdjan Capken , “Self-Organized
Public-key Management for Mobile Ad Hoc Networks”, IEEE Transactions on mobile computing
[14] Himanshu Khurana and Virgil D. Gligor, “Enforcing Dependencies between PKI Certificates in ad-hoc Networks”, IEEE International Conference on Telecommunications, Bucharest, Romania, June, 2001.
[15] B. Schneier , “A Primer on Authentication and Digital Signatures”, Computer Security Journal ,v.10 ,n.2 , pp.38-40, 1994.
[16] C.J. Mitchell, F. Piper and P. Wild, “Digital Signatures”, Contemporary Cryptology: The science of Information Integrity, IEEE Press, pp.325-378, 1991.
[17] David B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts”, Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications, Dec. 1994.
[18] Joon S. Park and Ravi Sandhu. “Binding Identities and Attributes Using Digitally Signed Certificates”, 16th Annual Computer Security Applications Conference (ACSAC) , New Orleans , Louisiana , December 11-15 , 2000
[19] 王瑞堂,黃宗立 “安全電子公文之設計”,國立成功大學資訊工程研究所碩士論文,2000
[20] D. Shands , R. Yee and J. Jacobs. “Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies”, Proceedings of the Network and Distributed Systems Security Symposium, San Diego, pp.187, Feb. 2000.
[21] T. Gibson. “An Architecture for Flexible”, High Assurance , Multi-Security Domain Networks. To appear in Proceedings of the Network and Distributed Systems Security Symposium, San Diego, Feb. 2001.
[22] L. Zhou and Z. J. Hass. “Securing Ad Hoc Networks” IEEE Networks, 1999
[23] M. Guerrero Zapata and N. Asokan, “Securing Ad Hoc Routing Protocols”, Proc. ACM Workshop Wireless Security, Sept. 2002.
[24] J. Douceur, “The Sybil Attack”, Proc. First Int’l Workshop Peer-to-Peer Systems(IPTPS), 2002.