| 研究生: |
蘇弘毓 Su, Hung-Yu |
|---|---|
| 論文名稱: |
藉由使用者敲鍵特徵之身份認證與祕密金鑰生成機制之研究 A Study of User Authentication and Cryptographic key Generation Based on Keystroke Dynamics |
| 指導教授: |
孫宏民
Sun, Hung-Min |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2003 |
| 畢業學年度: | 91 |
| 語文別: | 中文 |
| 論文頁數: | 61 |
| 中文關鍵詞: | 類神經網路 、金鑰生成 、敲鍵特徵 |
| 外文關鍵詞: | keystroke dynamics, eural network, key generation |
| 相關次數: | 點閱:56 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
生物特徵是利用每個生物個體中,能夠代表該個體,且利用其它個體不相同的特性,來達到辨識的功能,如:指紋、虹膜、聲紋…等等;而電腦系統中,來分辨使用者的不同,就只有靠帳號以及密碼的配對與否來決定,而道高一尺,魔高一丈,隨者著時間的過去,有心人士也發展出了各式各樣來猜測,破解帳號密碼的方法,來取得本來應該存放於系統之中,安全無虞的資料,或個人隱私。
在此,我們為了強化傳統使用的密碼系統,我們將之並用使用者的敲鍵特徵,在許多的研究中,證明了使用者的敲鍵是一個可重覆發生的生物特徵,再加上並用使用者敲鍵特徵於密碼系統並不會有大幅變更,可以用最小的成本來得到最大的效益,另外,除了使用者的辨識外,我們尚利用敲鍵特徵的可重覆性來記錄使用者的私人密鑰,只要使用者輸入他的帳號密碼,系統便可還原出不存在於系統之中的密鑰,以供其它用途,如:使用公開金鑰的加解密、私人簽章…等等。
The biometrics is to make use of in each living creature individual, can represent that individual, and make use of the not same characteristic in other individual. Reach the function that recognize. Such as fingerprint, iris, sound… etc. And in the computer systems, distinguish the user’s different, only have depend on whether ID and passwords form couples or not to decide. With time passed, intruders also develop lots of way or guessing passwords, to get data or personal privacy originally store in system.
Enhancing the password systems. It also with the user's keystroke dynamics at many researches Proved the user's keystroke is a repeatable occurrence. And adding user's keystroke dynamics in password system can use the minimum cost to get the biggest benefit. Besides, in addition to user recognizing, we make use of keystroke dynamics and its property of repeatable to record private key of the user. Only the user input his ID and password, system can restore the key that is not stored in the systems. Then provided for other uses, such as using the public key systems, signature ... etc.
A. Shamir, “How to Share a Secret”, Comm. ACM Vol.22 pp612-613, 1979.
Aiyer, S. V. B et al. “A Theoretical Investingation into the Performance of the Hopfield Model”. IEEE Trans. Neural Networks 1(2), 204-215, 1990.
G. R. Blackley, “safeguarding Cryptographic Keys” Proc. NCC, Vol. 48, pp 313-317,1979.
Bleha S, Slivinsky C and Hussin B. “Computer-Access Security Systems Using Keystroke Dynamics ”. IEEE Transaction on Pattern Analysis and Machine Intelligence, 12(12), 1217-1222. 1990.
Bleichenbacher D, Nguyen P “Noisy polynomial interpolation and noisy Chinese Remaining” Preneel B (ed) Advances in cryptology – EUROCRYPT 2000, Spring, Berlin Heidelberg New York, pp 53-69 2000.
Davida GI, Frankel Y, Matt BJ “On Enabling Secure Applications through Off-Line Biometric Identification”. Proceedings of the 1998 IEEE Symposium on Security and privacy. Oakland, Calif., 3-6 May, pp 148-157, 1998.
Daw-Tung Lin “Computer-access authentication with neural network based keystroke identity verification” Neural Networks,1997., International Conference on , Volume: 1 , 9-12 Jun 1997 ,P174 -178 vol.1 1997
D.E. Rumelhart, G.E. Hinton, and R.J. Williams. Learning representations by back- propagating errors. Nature, 323:533 536, 1986.
Ellison C, Hall C, Milbert R, Schneier B “Protecting Secret Keys with Personal Entropy”. Future Gen Comput Syst 16:311-318 2000.
Feldmeier D, Karn P. “Unix Password Security – Ten Years Later” Advances in Cryptology – CRYPTO 1989.
H. T. Nauyan and E. A. Walker, “A First Course in Fuzzy Logic”, 1999
Haider, S. Abbas, A. Zaidi and A.K. ” A multi-technique approach for user identification through keystroke dynamics” Systems, Man, and Cybernetics, 2000 IEEE International Conference on , Volume: 2 , Page(s): 1336 -1341 vol.2. 2000
Haykin S.“Neural Networks a computer foundation 2nd edition”, Prentice hall, p 8
Joyce R and Gupta G. “Identity Authentication Base on Keystroke Latencies” Communication of the ACM, 33(2), 168-176. 1990.
Juels A, Wattenberg M. “A Fuzzy commitment Scheme” Proceedings of the 6th ACM Conference on Computer and Communication Security, Singapore, 1-4 Nov. pp 28-36 1999.
Klein D. “Foiling the cracker: a Survey of, and Improvements to, Password Security.” Proceedings of the Second USENIX Security Workshop, 1990
Leggett J and Williams G. “Verifying Identity via Keyboard Characteristics”. Int. J. Man-Machine Studies, 28(1) 67-76. 1988
Minsky, M. L. and Papert, S. S. “Perceptrons”, MIT Press,Cambridge, MA 1969.
Monrose F. , Michael K. Reiter , Susanne Wetzel, “Password hardening based on keystroke dynamics”, Proceedings of the 6th ACM conference on Computer and communications security, p.73-82, 1999.
Monrose F, Rubin MK, Li Q., Wetzel S “Cryptographic Key Generation from Voice” Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, Calif., 13-16 May, 202-213, 2001.
Monrose F, Reiter MK, Li Q, Wetzel S, “Using Voice to Generate Cryptographic Keys”. Proceedings of the 2001 Speaker Recognition Workshop, Crete, Greece, 18-22 June, 237-242, 2001.
Morris R, Thompson K “Password Security: A Case History.” Comm. ACM 22:594-597. 1979.
Soutar C, Tomko CJ “Secure Private Key Generation Using a Fingerprint”. Proceedings of the Cardtech/Securetech Conference pp 245-252 1996
Spafford E “Observations on Reusable Password Choices” Proceeding of the 3rd USENIX Security Symposium. 1992.
Umphress D. and Williams G.. “Identity Verification through Keyboard Characteristics” Int. J. Man-Machine Studies, 23(3), 263-273, 1985.
Willem G de Ru and jan H.P. Eloff, “Enhanced password Authentication through Fuzzy Logic” IEEE Expert, 1997.
Wu T “A Real-world Analysis of Kerberos Password Security.” Proceedings of the 1999 Network and Distributed System Security Symposium, San Diego, Calif., 3-5 Feb.
葉怡成 “類神經網路模式應用與實作” 儒林圖書有限公司, 台灣, p 1-1~2-17, 4-1~4-51
蘇雅惠 “敲鍵特徵個人識辦法”. 國立交通大學資訊管理研究所碩士論文. 1991
賴溪松,韓亮,張真誠 近代密碼學及其應用 松岡電腦圖書資料股份有限公司 台灣 pp231-245