簡易檢索 / 詳目顯示

研究生: 陳坤元
Chen, Kun-Yuan
論文名稱: 公開金鑰基礎建設之電子憑證上的研究及實作
The Study and Implementations of Certificates in PKI
指導教授: 賴溪松
Laih, Chi Sung
學位類別: 博士
Doctor
系所名稱: 電機資訊學院 - 電機工程學系
Department of Electrical Engineering
論文出版年: 2005
畢業學年度: 93
語文別: 英文
論文頁數: 72
中文關鍵詞: 公開金鑰基礎建設(PKI)可視型公開金鑰群組憑證密碼模式
外文關鍵詞: Public Key Infrastructure(PKI), Visual Public Key, Group Certificate, Cryptographics Pattens
相關次數: 點閱:184下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  •   現今PKI的發展,已大量應用私密性、認證性、整合性及不可否認性於網路通訊中;其公開金鑰系統管理,使用者A首先產生自己的公開金鑰及私密金鑰對,A在利用私密金鑰所進行的訊息簽章後,使用者B可使用A的公開金鑰進行其簽章訊息的驗證;同理,使用者B在利用的公開金鑰進行加密後,A便可利用私密金鑰進行密文的解密工作。目前的公開金鑰系統中,此類系統的安全性大多是基於有線群及因數分解的離算對數問題上,例如:D.H, ELGAMAL, RSA及ECC系統。而在金鑰對系統的金鑰產生上,使用者A需要從憑證管理中心(CA)取得屬於A自己的憑證,而利用此憑證,我們便可以利用其公開金鑰進行相關的應用;另一方面,在標準上,我們利用標準格式來儲存憑證的內容,如X.509標準等。在1984年時,Shamir[26]提出一種以ID為基礎的公開金鑰密碼學的概念,一個使用者可以利用其ID與其公開金鑰的結合來進行相關的應用,也就是說,由使用者的相關私密金鑰是由信任的第三者所提供;但以目前來說,ID基礎之公開金鑰系統的運用上其實以比原公開金鑰系統來的少了[21]。
      公開金鑰基礎鍵社(PKI)由於其應用的領域已包括了許多研究的主題,於本論文中,我們考慮三種在PKI的課題及相關的應用。
      第一,我們提出一種新型態的公開金鑰格式稱做可視型公開金鑰系統。為了產生此種金鑰對,我們利用一種稱為”部分RSA金鑰產生”(Portion RSA)的方法來進行公開金鑰的產生。在利用部分RSA金鑰產生法來進行公開金鑰的產生時,我們將一個影像插入公開金鑰的產生中以當作其啟始參數,進而在論文提出了實驗及實做的結果以表示相關的說明。
      第二,為了有效在多人使用的環境下使用其憑證,論文中提出一群組憑證(Group Certificate)的概念,在論文中,我們利用GQ演算法,進行相關公開金鑰的產生,而可應用在多個使用者的環境裡,其中,每個使用者皆可以擁有自己的私密金鑰;進行簽章驗章時,只需進行共同擁有的憑證驗證即可。
      最後,為了兼顧學術及應用,我們提出一設計密碼系統的分類方法,稱為密碼模式(Cryptographic Patterns),如將此模式運用於設計密碼系統上,可以更為快速的進行系統設計,及更易達成一般性的效果,也就是說,利用模式的設計,可以使得設計出的系統更容易維護。

     Nowadays public key cryptography has been applied to daily life to achieve privacy, authenticity,integrity, and nonrepudiation in network communication. In the use of a public key system, user A first generates his/her public/private key pairs, and then user B can encrypt a message M to A or verify a signature S signed by A on M by using A’s public key. Some public key cryptosystems
    whose security are based on discrete logarithons in finite groups or integer factorization are nowbeing
    implemented worldwide, e.g. DH, Elgamal, RSA, and ECC. In the public/private key generation of these systems, A needs to apply for a certificate from a certificate authority (CA) to certify that the public key indeed belongs to A. There are some standards to define the format of the certificate, e.g.,X.509. In 1984, Shamir [2] proposed the concept of ID-based public key cryptography to eliminate CA and the certificate. An ID-based public key system allows the user to use his/her identity (ID)
    as the public key. However, since the user’s corresponding private key is provided from the trusted
    third party, it is considered that the security of ID-based system is less than the original public key
    system [42].

     Public Key Infrastructure(PKI) is not only a comprehensive system but also a comprehensive topic including lots of related issues. In this dissertation, we consider three critical issues on PKI application and propose some valuable solutions and implementations.

     First, we proposed a new type of certificate format call visual public key system.To generate a key pair, we intruding the portion key generation scheme. With applying the portion key generation algorithm, we embedded the image into a public key with some initial key generation parameter. It also presents some experimental result to show the relation between the original image and modified
    visual public key.

     Second, we describes the application the the PKI when using the ceritificate. For apply easily,we take some topics for using the key conveniencing such as AES speed up and VSS generating scheme. The AES algorithm, which is intruded by NIST, has been the standard encryption lgorithm
    recently. We present a scheme to speed up this algorithm about 3-5% performation.

     Finally, for apply the the PKI when using the ceritificate easily, we take some topics for using the key conveniencing such as AES speed up and VSS generating scheme. The AES algorithm, which is intruded by NIST, has been the standard encryption algorithm recently. We present a scheme to speed up this algorithm about 3-5% performation. And to apply completely, we also introduce the various application and build the related component become a framework called icarus( Integreated
    cryptographic application and utitilities suite) framework. And presents its application, there are
    CA, RA, Secure Server, and Authentication Server.

    Abstract                                iii List of Figures                             xi List of Tables                             xiii 1 Introduction                               1  1.1. A recent survey of public key infrastructure            1  1.2. The activities, history, status of PKI and standardization     5  1.2.1 Standard                             5  1.2.2 PKIX                                5  1.3. Synopsis of the dissertation                    8 2 Related Cryptographic Components                     9  2.1. RSA                                9  2.2. The implementation of AES                     12  2.3. Design Patterns                          14 3 Visual RSA                                19  3.1. Review of generating RSA moduli with a predetermined portion    19  3.2. The Visible RSA public key system                 20  3.3. Generating visible RSA public keys                 22  3.4. Combining visible public keys with certificates          24  3.5. Experiment results and discussions                 25 4 Group Certificate                             31  4.1. The Concept of Group Certificate                  31   4.1.1 Our Proposed Scheme                       32   4.1.2 Group Certificate Scheme                     32   4.1.3 Key Generation Procedure                     33   4.1.4 Security Analysis:                        34  4.2. Efficiency Analysis                         35  4.3. Application                             36   4.3.1 Application in Mobile Communication System            36   4.3.2 An Application Scenario                     36  4.4. Future work                             37 5 PKI application and Implementation                     39  5.1. AES Software implementation                     39  5.1.1 Performance analysis                        40   5.1.2 Modification of ShiftRow table                  40  5.2. Design a Cryptographic Software System                43   5.2.1 The atom of cryptographic system                 44   5.2.2 The adaptive algorithm                      45   5.2.3 Huge capacity information                     45   5.2.4 Object solution space                       46   5.2.5 Method access level                        46   5.2.6 Malicious attack                         46  5.3. Design patterns of cryptography                   46   5.3.1 Consequences of Consturcted Patterns               47   5.3.2 Protocol Patterns                         49   5.3.3 Operation Patterns                        50 6 Icarus-Integraged Cryptographic Application and Reusable Utilities Suite  51  6.1. Introduction                             51  6.2. The introduction of library and utility suite            52  6.3. The design of framework                       54   6.3.1 Consturcted Patterns                       54   6.3.2 Protocols Patterns                        55   6.3.3 Operations Patterns                        57  6.4. Application                             58   6.4.1 Ca and Ra                             58   6.4.2 Secure Server                           62   6.4.3 Authentication Server                       62 7 Conclusion                                 65 References                                 67

    [1] 3GPP TS 33.102 V5.1.0 Dec. 2002.
    [2] Adi Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology:
      Proceedings of CRYPTO ’84, LNCS 0196, pages 47-53, Springer-Verlag, 1985.
    [3] ANSI X9.31. American national standard for financial services-Digital signatures
    [4] E. Gamma, R. Helm, R. Johnson and J. Vlissides, Design Patterns: Elements of Reusable Object-
      Oriented Software,Addison-Wesley, 1995
    [5] A.N. Netravali and B.G. Haskell, Digital Pictures. Representation, Compression, and Standards
      (2nd Ed). Plenum Press, New York, NY, 1995.
    [6] A. De Santis, "On Visual Cryptography Schemes," Information Theory Workshop, 1998, pp.154 -155.
    [7] A. Shamir, "How to Share a Secret," Commun. of the ACM, Vol. 22,1979, pp. 612-613.
    [8] A.K. Lenstra, "Generating RSA Moduli with a Predetermined Portion," Advances in Cryptology
      - ASIACRYPT’98, LNCS 1514, pages 10-16, Springer-Verlag, 1996.
    [9] A.K. Lenstra, "Unbelievable Security. Matching AES Security Using Public Key Systems,"
      Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pages 66-86, Springer-Verlag, 2001.
    [10] A.K. Lenstra, E.R. verheul, "Selecting cryptographic key size," to appear in the journal of
       cryptology; available from www.cryptosavvy.com.
    [11] B. Kaliski and J. Staddon, IETF RFC 2437: PKCS #1: RSA Cryptography Specifications
       Version 2.0, Oct., 1998.
    [12] C. Blundo, P. D’ Arco, A. De Santis and D.R. Stinson, "Contrast Optimal Threshold Visual
       Cryptography Scheme," to appear in the SIAM Journal on Discrete Mathematics.
    [13] C. Blundo, A. De Santis and D.R. Stinson, "On the Contrast in Visual Cryptography Schemes,"
       Journal of Cryptology, Vol. 12, 1999, pp. 261-289.
    [14] C.N. Yang, The Application of Coding Techniques to Cryptography, Ph. D Dissertation, Department
       of Electrical Engineering National Cheng Kung University, Tainan, Taiwan, R.O.C.,
       Dec. 1997, Chapter 6.
    [15] C.N. Yang and C.S. Laih, "New (K, K) Visual Secret Sharing Schemes Using Hierarchical
       Structure Technique,"Workshop on Cryptology and Information Security, ICS’98, pp. 148-154.
    [16] C.N. Yang, Y.B. Yeh and C.S. Laih, "A Dynamic Password Visual Authentication Scheme
       through Internet," International Telecommunications Symposium (ITS ’98), Vol. III, Taipei,
       Taiwan, 1998, pp. 163-167.
    [17] C.N. Yang and C.S. Laih, "New Colored Visual Secret Sharing Schemes," Designs, Codes and
       Cryptography, Vol. 20, No. 3, July 2000, pp. 325-336.
    [18] C. Adams and S. Farrell, "Internet X.509 Public Key Infrastructure Certificate Management
       Protocols", Mar. 1999.
    [19] C.S. Park, "On certificate-based security protocols for wireless mobile communica-tion systems"
       IEEE Network, Vol. 11, Issue: 5, pp. 50-55, Sep/Oct. 1997.
    [20] C.S. Laih, "Threshold Scheme," in Proc. of the first conference on Information Security, Chiayi,
       Dec., 1990, pp.107-145.
    [21] C.H. Lee, M.S. Hwang and W.P. Yang, "Enhanced privacy and authentication for the global
       system for mobile communications" Wireless Network, pp. 231-243, 1999.
    [22] Carlisle Adams and Steve Lloyd, Understanding Public-Key Infrastructure: Concepts, Standard
       Deployment Considerations, 1999.
    [23] D. Coppersmith, "Finding a small root of a bivariate integer equation; Faction with high bits
       known," Advances in Cryptology EUROCRYPT ’96, LNCS 1070, pages 178-189, Springer-
       Verlag, 1996.
    [24] D.R. Stinson, "An Introduction to Visual Cryptography," presented at Public Key Solutions
       '97, Toronto, April 28-30, 1997. Available as http://bibd.unl.edu/ stinson/ VKS-PKS.ps.
    [25] D.R. Stinson, "Visual Cryptography and Threshold Schemes," IEEE Potentials, Vol. 18, Feb.-
       Mar. 1999, pp. 13-16.
    [26] D.S. Taubman, M.W. Marcellin, JPEG2000 - Image Compression Fundamentals, Standards
       and Practice, Kluwer Academic Publishers, 2002.
    [27] E.R. Verheul and H.C.A. Van Tilborg, "Constructions and Properties of k out of n Visual Secret
       Sharing Schemes," Designs, Codes and Cryptography, Vol. 11, No. 2, May, 1997, pp. 179-196.
    [28] Federal Information Processing Standards Publication 46, "Data Encryption Standard," U.S.
       Department of Commerce, National Bureau of Standards.
    [29] H. Imai, "Current Trends of Cryptology in Japan," The second International Workshop for
       Asian Public key Infrastructure, pages 89, 2002.
    [30] G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson,"Visual Cryptography for General
       Access Structures," Information and Computation, Vol. 129, No. 2, 1996, pp. 86-106.
    [31] G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, "Constructions and Bounds for Visual
       Cryptography," in Proceedings of the 23rd International Colloquium on Automata, Languages
       and Programming. Lecture Notes in Computer Science, No. 1099, Springer-Verlag, 1996, pp.
       416-428.
    [32] G.R. Blakley, "Safeguarding Cryptographic Keys," AFIPS conference proceedings, Vol. 48,
       1979, pp. 313-317.
    [33] G. Horn, K.M. Martin and C.J. Mitchell, "Authentication protocols for mobile network environment
       value-added services" IEEE Transactions on Vehicular Technology, Vol. 51 Issue: 2,
       pp. 383-392, Mar. 2002.
    [34] G. Itkis, L. Reyzin, "Forward-secure signatures with optimal signing and verifying" CRYPTO
       2001, LNCS Vol. 2139, August. 2001.
    [35] I. J. Cox, J. Killian, T. Leighton, and T. Shannoon, "Secure spread spectrum watermarking for
       multimedia," IEEE Transactions on Image Processing. Vol.6, No.12, pages 1673-1687, 1997.
    [36] ITU.T X.509, Authentication framework, May 1997.
    [37] K. Kobara and H. Imai, "Limiting the Visible Space Visual Secret Sharing Schemes and Their
       Application to Human Identification," Advances in Cryptology - ASIACRYPT ’96, Lecture
       Notes in Computer Science, No. 1163, Springer-Verlag, 1996, pp. 185-195.
    [38] L.C. Guillou, J.J. Quisquater, "A paradoxical identity-based signature scheme resulting from
       zero-knowledge" Advances in Cryptology CRYPTO’88 LNCS Vol. 403, pp. 216-231, Aug. 1988.
    [39] L. Harn, H.Y. Lin, "Modification to enhance the security of the GSM protocol" Proc. of the
       5th National Conference on Information Security, ROC. pp. 74-76, May. 1995.
    [40] M. Bellare, S. Miner, "A forward secure digital signature scheme" CRYPTO’99 LNCS Vol.
       1666, pp. 431-448, Aug. 1999.
    [41] M.J. Beller, L.F. Chang and Y. Yacobi, "Privacy and authentication on a portable communications
       system" Global Telecommunications Conference, 1991. GLOBECOM ’91, Vol. 3, pp.
       1922-1927, Dec. 1991.
    [42] M. Girault, "Self-certified public keys," Advances in Cryptology - EUROCRYPT ’91, LNCS
       0547, pages 490-497, Springer-Verlag, 1991.
    [43] M. Atreya, "Introduction to the PKCS Standards",
       http://www.rsasecurity.com/products/bsafe/overview/IntroToPKCSstandards.pdf
    [44] M. Naor and A. Shamir, "Visual Cryptography", Advances in Cryptology -EUROCRYPT’94,
       Lecture Notes in Computer Science No. 950, pp.1-12, Springer-Verlag, 1995.
    [45] M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast via the Cover
       Base," in Proc. of Security protocols: international workshop 1996, Lecture Notes in
       Computer Science No. 1189, Springer-Verlag, 1997, pp. 69-74. Available as
       ftp://theory.lcs.mit.edu/pub/tcryptol/96-07.ps.
    [46] M. Naor and B. Pinkas, "Visual Authentication and Identification," Advances in Cryptology-
       CRYPT'97, Lecture Notes in Computer Science No. 1294, Springer-Verlag, 1997, pp. 322-336.
       Available as http://philby.ucsd.edu/ cryptolib/1997.html
    [47] N. Koblitz., "Elliptic Curve Cryptosystems," Math. Computat., vol. 48. pages 203-209, 1987.
    [48] P. Zimmerman, PGP Source Code and Internals, MIT Press, 1995.
    [49] National institute of standards and technology. //csrc.nist.gov/encryption/aes.
    [50] R. Anderson, Invited lecture, Fourth Annual Conference on Computer and Com-munications
       Security, ACM, 1997.
    [51] R. Housley,W. Ford,W. Polk,and D. Solo, Internet X.509 Public Key Infrastructure Certificate
       and CRL Profile, Jan. 1999.
    [52] Rahnema, "Overview of the GSM system and protocol architectures" IEEE Communication
       Magazine, Apr. 1993.
    [53] R. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signature and public
       key cryptosystems" Communication of the ACM, Vol. 21, No.2, pp. 120-126, Feb. 1978.
    [54] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures
    [55] S.G. AKL, P.D. Taylor, "Cryptography solution to a problem of access control in a hierarchy"
       ACM Transaction on Computer Systems, Vol. 1, No. 3, pp. 239-248 Aug. 1983.
    [56] S. Santesson, R. Housley, T. Freeman, Internet X.509 public key infrastructure logotypes in X.
       509 certificates, Jun 2002.
    [57] S. Droste, "New Results on Visual Cryptography," Advances in Cryptography -
       EUROCRYPT’96, Lecture Notes in Computer Science No. 1109, Springer-Verlag, 1996, pp.
       401-415.
    [58] S. Boeyen, IETF RFC 2559: Internet X.509 Public Key Infrastructure Operational Protocols -
       LDAPv2, Apr., 1999.
    [59] S.A. Vanstone and R.J. Zuccherato, "Short RSA Keys and Their Generation," Journal of Cryptology,
       pages 101-114, 1995.
    [60] T. ElGamal, "A Publick-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,"
       IEEE Transactions on Information Security, Vol. IT-31, No. 4, pp. 469-472, 1985.
    [61] T. Hofmeister, M. Krause and H.U. Simon, "Contrast-Optimal k out of n Secret Sharing
       Schemes in Visual Cryptography," in COCOON ’97, Lecture Notes in Computer Science No.
       1276, Springer-Verlag, 1997.
    [62] T. Katoh and H. Imai, "Some Visual Secret Sharing Schemes and their Size," Proceedings of
       International Conferences on Cryptology and information Security, 1996, pp.41-47.
    [63] W. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," MIT Media Lab, cambridge,
       MA. Tech. Rep., 1994.
    [64] V.S. Miller, "Use of Elliptic curves in Cryptography, " Advances in Cryptology-CRYPTO’85
       Proceedings, Springer-Verlag, 1986, pp.417-426.
    [65] V. Rijmen and B. Preneel, "Efficient Colour Visual Encryption or ’Shared Colors
       of Benetton’," presented at EUROCRYPT’96 Rump Session. Available as
       http://www.iacr.org/conferences/ec96/ rump/preneel.ps.
    [66] W. Diffie, and M. Hellman., "New Directions in Cryptography," IEEE Transactions on Information
       Theory, vol. IT-22, no.6, 1976, pp.664-654.
    [67] Y.Desmedt, "Society and Group Oriented Cryptography: A New Concept," In Advances in
       Cryptology, Proc. Of Crypto ’87, pp. 120-127, Springer Verlag, Ber-lin, 1998.
    [68] Y.B.Yeh, On the Applications and Implementation of Network Security Based onVisual Secret
       Sharing, Thesis for Master of Science, Department of Electrical Engineering National Cheng
       Kung University, Tainan, Taiwan, R. O. C., June 1998, Chapter 3.
    [69] Z.J. Tzeng, W.G. Tzeng, "Authentication protocols for the third generation mobile systems,"
       Personal Wireless Communications 16, pp. 35-50, 2001.

    下載圖示
    2004-10-14公開
    QR CODE