| 研究生: |
陳坤元 Chen, Kun-Yuan |
|---|---|
| 論文名稱: |
公開金鑰基礎建設之電子憑證上的研究及實作 The Study and Implementations of Certificates in PKI |
| 指導教授: |
賴溪松
Laih, Chi Sung |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2005 |
| 畢業學年度: | 93 |
| 語文別: | 英文 |
| 論文頁數: | 72 |
| 中文關鍵詞: | 公開金鑰基礎建設(PKI) 、可視型公開金鑰 、群組憑證 、密碼模式 |
| 外文關鍵詞: | Public Key Infrastructure(PKI), Visual Public Key, Group Certificate, Cryptographics Pattens |
| 相關次數: | 點閱:184 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
現今PKI的發展,已大量應用私密性、認證性、整合性及不可否認性於網路通訊中;其公開金鑰系統管理,使用者A首先產生自己的公開金鑰及私密金鑰對,A在利用私密金鑰所進行的訊息簽章後,使用者B可使用A的公開金鑰進行其簽章訊息的驗證;同理,使用者B在利用的公開金鑰進行加密後,A便可利用私密金鑰進行密文的解密工作。目前的公開金鑰系統中,此類系統的安全性大多是基於有線群及因數分解的離算對數問題上,例如:D.H, ELGAMAL, RSA及ECC系統。而在金鑰對系統的金鑰產生上,使用者A需要從憑證管理中心(CA)取得屬於A自己的憑證,而利用此憑證,我們便可以利用其公開金鑰進行相關的應用;另一方面,在標準上,我們利用標準格式來儲存憑證的內容,如X.509標準等。在1984年時,Shamir[26]提出一種以ID為基礎的公開金鑰密碼學的概念,一個使用者可以利用其ID與其公開金鑰的結合來進行相關的應用,也就是說,由使用者的相關私密金鑰是由信任的第三者所提供;但以目前來說,ID基礎之公開金鑰系統的運用上其實以比原公開金鑰系統來的少了[21]。
公開金鑰基礎鍵社(PKI)由於其應用的領域已包括了許多研究的主題,於本論文中,我們考慮三種在PKI的課題及相關的應用。
第一,我們提出一種新型態的公開金鑰格式稱做可視型公開金鑰系統。為了產生此種金鑰對,我們利用一種稱為”部分RSA金鑰產生”(Portion RSA)的方法來進行公開金鑰的產生。在利用部分RSA金鑰產生法來進行公開金鑰的產生時,我們將一個影像插入公開金鑰的產生中以當作其啟始參數,進而在論文提出了實驗及實做的結果以表示相關的說明。
第二,為了有效在多人使用的環境下使用其憑證,論文中提出一群組憑證(Group Certificate)的概念,在論文中,我們利用GQ演算法,進行相關公開金鑰的產生,而可應用在多個使用者的環境裡,其中,每個使用者皆可以擁有自己的私密金鑰;進行簽章驗章時,只需進行共同擁有的憑證驗證即可。
最後,為了兼顧學術及應用,我們提出一設計密碼系統的分類方法,稱為密碼模式(Cryptographic Patterns),如將此模式運用於設計密碼系統上,可以更為快速的進行系統設計,及更易達成一般性的效果,也就是說,利用模式的設計,可以使得設計出的系統更容易維護。
Nowadays public key cryptography has been applied to daily life to achieve privacy, authenticity,integrity, and nonrepudiation in network communication. In the use of a public key system, user A first generates his/her public/private key pairs, and then user B can encrypt a message M to A or verify a signature S signed by A on M by using A’s public key. Some public key cryptosystems
whose security are based on discrete logarithons in finite groups or integer factorization are nowbeing
implemented worldwide, e.g. DH, Elgamal, RSA, and ECC. In the public/private key generation of these systems, A needs to apply for a certificate from a certificate authority (CA) to certify that the public key indeed belongs to A. There are some standards to define the format of the certificate, e.g.,X.509. In 1984, Shamir [2] proposed the concept of ID-based public key cryptography to eliminate CA and the certificate. An ID-based public key system allows the user to use his/her identity (ID)
as the public key. However, since the user’s corresponding private key is provided from the trusted
third party, it is considered that the security of ID-based system is less than the original public key
system [42].
Public Key Infrastructure(PKI) is not only a comprehensive system but also a comprehensive topic including lots of related issues. In this dissertation, we consider three critical issues on PKI application and propose some valuable solutions and implementations.
First, we proposed a new type of certificate format call visual public key system.To generate a key pair, we intruding the portion key generation scheme. With applying the portion key generation algorithm, we embedded the image into a public key with some initial key generation parameter. It also presents some experimental result to show the relation between the original image and modified
visual public key.
Second, we describes the application the the PKI when using the ceritificate. For apply easily,we take some topics for using the key conveniencing such as AES speed up and VSS generating scheme. The AES algorithm, which is intruded by NIST, has been the standard encryption lgorithm
recently. We present a scheme to speed up this algorithm about 3-5% performation.
Finally, for apply the the PKI when using the ceritificate easily, we take some topics for using the key conveniencing such as AES speed up and VSS generating scheme. The AES algorithm, which is intruded by NIST, has been the standard encryption algorithm recently. We present a scheme to speed up this algorithm about 3-5% performation. And to apply completely, we also introduce the various application and build the related component become a framework called icarus( Integreated
cryptographic application and utitilities suite) framework. And presents its application, there are
CA, RA, Secure Server, and Authentication Server.
[1] 3GPP TS 33.102 V5.1.0 Dec. 2002.
[2] Adi Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology:
Proceedings of CRYPTO ’84, LNCS 0196, pages 47-53, Springer-Verlag, 1985.
[3] ANSI X9.31. American national standard for financial services-Digital signatures
[4] E. Gamma, R. Helm, R. Johnson and J. Vlissides, Design Patterns: Elements of Reusable Object-
Oriented Software,Addison-Wesley, 1995
[5] A.N. Netravali and B.G. Haskell, Digital Pictures. Representation, Compression, and Standards
(2nd Ed). Plenum Press, New York, NY, 1995.
[6] A. De Santis, "On Visual Cryptography Schemes," Information Theory Workshop, 1998, pp.154 -155.
[7] A. Shamir, "How to Share a Secret," Commun. of the ACM, Vol. 22,1979, pp. 612-613.
[8] A.K. Lenstra, "Generating RSA Moduli with a Predetermined Portion," Advances in Cryptology
- ASIACRYPT’98, LNCS 1514, pages 10-16, Springer-Verlag, 1996.
[9] A.K. Lenstra, "Unbelievable Security. Matching AES Security Using Public Key Systems,"
Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pages 66-86, Springer-Verlag, 2001.
[10] A.K. Lenstra, E.R. verheul, "Selecting cryptographic key size," to appear in the journal of
cryptology; available from www.cryptosavvy.com.
[11] B. Kaliski and J. Staddon, IETF RFC 2437: PKCS #1: RSA Cryptography Specifications
Version 2.0, Oct., 1998.
[12] C. Blundo, P. D’ Arco, A. De Santis and D.R. Stinson, "Contrast Optimal Threshold Visual
Cryptography Scheme," to appear in the SIAM Journal on Discrete Mathematics.
[13] C. Blundo, A. De Santis and D.R. Stinson, "On the Contrast in Visual Cryptography Schemes,"
Journal of Cryptology, Vol. 12, 1999, pp. 261-289.
[14] C.N. Yang, The Application of Coding Techniques to Cryptography, Ph. D Dissertation, Department
of Electrical Engineering National Cheng Kung University, Tainan, Taiwan, R.O.C.,
Dec. 1997, Chapter 6.
[15] C.N. Yang and C.S. Laih, "New (K, K) Visual Secret Sharing Schemes Using Hierarchical
Structure Technique,"Workshop on Cryptology and Information Security, ICS’98, pp. 148-154.
[16] C.N. Yang, Y.B. Yeh and C.S. Laih, "A Dynamic Password Visual Authentication Scheme
through Internet," International Telecommunications Symposium (ITS ’98), Vol. III, Taipei,
Taiwan, 1998, pp. 163-167.
[17] C.N. Yang and C.S. Laih, "New Colored Visual Secret Sharing Schemes," Designs, Codes and
Cryptography, Vol. 20, No. 3, July 2000, pp. 325-336.
[18] C. Adams and S. Farrell, "Internet X.509 Public Key Infrastructure Certificate Management
Protocols", Mar. 1999.
[19] C.S. Park, "On certificate-based security protocols for wireless mobile communica-tion systems"
IEEE Network, Vol. 11, Issue: 5, pp. 50-55, Sep/Oct. 1997.
[20] C.S. Laih, "Threshold Scheme," in Proc. of the first conference on Information Security, Chiayi,
Dec., 1990, pp.107-145.
[21] C.H. Lee, M.S. Hwang and W.P. Yang, "Enhanced privacy and authentication for the global
system for mobile communications" Wireless Network, pp. 231-243, 1999.
[22] Carlisle Adams and Steve Lloyd, Understanding Public-Key Infrastructure: Concepts, Standard
Deployment Considerations, 1999.
[23] D. Coppersmith, "Finding a small root of a bivariate integer equation; Faction with high bits
known," Advances in Cryptology EUROCRYPT ’96, LNCS 1070, pages 178-189, Springer-
Verlag, 1996.
[24] D.R. Stinson, "An Introduction to Visual Cryptography," presented at Public Key Solutions
'97, Toronto, April 28-30, 1997. Available as http://bibd.unl.edu/ stinson/ VKS-PKS.ps.
[25] D.R. Stinson, "Visual Cryptography and Threshold Schemes," IEEE Potentials, Vol. 18, Feb.-
Mar. 1999, pp. 13-16.
[26] D.S. Taubman, M.W. Marcellin, JPEG2000 - Image Compression Fundamentals, Standards
and Practice, Kluwer Academic Publishers, 2002.
[27] E.R. Verheul and H.C.A. Van Tilborg, "Constructions and Properties of k out of n Visual Secret
Sharing Schemes," Designs, Codes and Cryptography, Vol. 11, No. 2, May, 1997, pp. 179-196.
[28] Federal Information Processing Standards Publication 46, "Data Encryption Standard," U.S.
Department of Commerce, National Bureau of Standards.
[29] H. Imai, "Current Trends of Cryptology in Japan," The second International Workshop for
Asian Public key Infrastructure, pages 89, 2002.
[30] G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson,"Visual Cryptography for General
Access Structures," Information and Computation, Vol. 129, No. 2, 1996, pp. 86-106.
[31] G. Ateniese, C. Blundo, A. De Santis and D.R. Stinson, "Constructions and Bounds for Visual
Cryptography," in Proceedings of the 23rd International Colloquium on Automata, Languages
and Programming. Lecture Notes in Computer Science, No. 1099, Springer-Verlag, 1996, pp.
416-428.
[32] G.R. Blakley, "Safeguarding Cryptographic Keys," AFIPS conference proceedings, Vol. 48,
1979, pp. 313-317.
[33] G. Horn, K.M. Martin and C.J. Mitchell, "Authentication protocols for mobile network environment
value-added services" IEEE Transactions on Vehicular Technology, Vol. 51 Issue: 2,
pp. 383-392, Mar. 2002.
[34] G. Itkis, L. Reyzin, "Forward-secure signatures with optimal signing and verifying" CRYPTO
2001, LNCS Vol. 2139, August. 2001.
[35] I. J. Cox, J. Killian, T. Leighton, and T. Shannoon, "Secure spread spectrum watermarking for
multimedia," IEEE Transactions on Image Processing. Vol.6, No.12, pages 1673-1687, 1997.
[36] ITU.T X.509, Authentication framework, May 1997.
[37] K. Kobara and H. Imai, "Limiting the Visible Space Visual Secret Sharing Schemes and Their
Application to Human Identification," Advances in Cryptology - ASIACRYPT ’96, Lecture
Notes in Computer Science, No. 1163, Springer-Verlag, 1996, pp. 185-195.
[38] L.C. Guillou, J.J. Quisquater, "A paradoxical identity-based signature scheme resulting from
zero-knowledge" Advances in Cryptology CRYPTO’88 LNCS Vol. 403, pp. 216-231, Aug. 1988.
[39] L. Harn, H.Y. Lin, "Modification to enhance the security of the GSM protocol" Proc. of the
5th National Conference on Information Security, ROC. pp. 74-76, May. 1995.
[40] M. Bellare, S. Miner, "A forward secure digital signature scheme" CRYPTO’99 LNCS Vol.
1666, pp. 431-448, Aug. 1999.
[41] M.J. Beller, L.F. Chang and Y. Yacobi, "Privacy and authentication on a portable communications
system" Global Telecommunications Conference, 1991. GLOBECOM ’91, Vol. 3, pp.
1922-1927, Dec. 1991.
[42] M. Girault, "Self-certified public keys," Advances in Cryptology - EUROCRYPT ’91, LNCS
0547, pages 490-497, Springer-Verlag, 1991.
[43] M. Atreya, "Introduction to the PKCS Standards",
http://www.rsasecurity.com/products/bsafe/overview/IntroToPKCSstandards.pdf
[44] M. Naor and A. Shamir, "Visual Cryptography", Advances in Cryptology -EUROCRYPT’94,
Lecture Notes in Computer Science No. 950, pp.1-12, Springer-Verlag, 1995.
[45] M. Naor and A. Shamir, "Visual Cryptography II: Improving the Contrast via the Cover
Base," in Proc. of Security protocols: international workshop 1996, Lecture Notes in
Computer Science No. 1189, Springer-Verlag, 1997, pp. 69-74. Available as
ftp://theory.lcs.mit.edu/pub/tcryptol/96-07.ps.
[46] M. Naor and B. Pinkas, "Visual Authentication and Identification," Advances in Cryptology-
CRYPT'97, Lecture Notes in Computer Science No. 1294, Springer-Verlag, 1997, pp. 322-336.
Available as http://philby.ucsd.edu/ cryptolib/1997.html
[47] N. Koblitz., "Elliptic Curve Cryptosystems," Math. Computat., vol. 48. pages 203-209, 1987.
[48] P. Zimmerman, PGP Source Code and Internals, MIT Press, 1995.
[49] National institute of standards and technology. //csrc.nist.gov/encryption/aes.
[50] R. Anderson, Invited lecture, Fourth Annual Conference on Computer and Com-munications
Security, ACM, 1997.
[51] R. Housley,W. Ford,W. Polk,and D. Solo, Internet X.509 Public Key Infrastructure Certificate
and CRL Profile, Jan. 1999.
[52] Rahnema, "Overview of the GSM system and protocol architectures" IEEE Communication
Magazine, Apr. 1993.
[53] R. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signature and public
key cryptosystems" Communication of the ACM, Vol. 21, No.2, pp. 120-126, Feb. 1978.
[54] R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures
[55] S.G. AKL, P.D. Taylor, "Cryptography solution to a problem of access control in a hierarchy"
ACM Transaction on Computer Systems, Vol. 1, No. 3, pp. 239-248 Aug. 1983.
[56] S. Santesson, R. Housley, T. Freeman, Internet X.509 public key infrastructure logotypes in X.
509 certificates, Jun 2002.
[57] S. Droste, "New Results on Visual Cryptography," Advances in Cryptography -
EUROCRYPT’96, Lecture Notes in Computer Science No. 1109, Springer-Verlag, 1996, pp.
401-415.
[58] S. Boeyen, IETF RFC 2559: Internet X.509 Public Key Infrastructure Operational Protocols -
LDAPv2, Apr., 1999.
[59] S.A. Vanstone and R.J. Zuccherato, "Short RSA Keys and Their Generation," Journal of Cryptology,
pages 101-114, 1995.
[60] T. ElGamal, "A Publick-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,"
IEEE Transactions on Information Security, Vol. IT-31, No. 4, pp. 469-472, 1985.
[61] T. Hofmeister, M. Krause and H.U. Simon, "Contrast-Optimal k out of n Secret Sharing
Schemes in Visual Cryptography," in COCOON ’97, Lecture Notes in Computer Science No.
1276, Springer-Verlag, 1997.
[62] T. Katoh and H. Imai, "Some Visual Secret Sharing Schemes and their Size," Proceedings of
International Conferences on Cryptology and information Security, 1996, pp.41-47.
[63] W. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," MIT Media Lab, cambridge,
MA. Tech. Rep., 1994.
[64] V.S. Miller, "Use of Elliptic curves in Cryptography, " Advances in Cryptology-CRYPTO’85
Proceedings, Springer-Verlag, 1986, pp.417-426.
[65] V. Rijmen and B. Preneel, "Efficient Colour Visual Encryption or ’Shared Colors
of Benetton’," presented at EUROCRYPT’96 Rump Session. Available as
http://www.iacr.org/conferences/ec96/ rump/preneel.ps.
[66] W. Diffie, and M. Hellman., "New Directions in Cryptography," IEEE Transactions on Information
Theory, vol. IT-22, no.6, 1976, pp.664-654.
[67] Y.Desmedt, "Society and Group Oriented Cryptography: A New Concept," In Advances in
Cryptology, Proc. Of Crypto ’87, pp. 120-127, Springer Verlag, Ber-lin, 1998.
[68] Y.B.Yeh, On the Applications and Implementation of Network Security Based onVisual Secret
Sharing, Thesis for Master of Science, Department of Electrical Engineering National Cheng
Kung University, Tainan, Taiwan, R. O. C., June 1998, Chapter 3.
[69] Z.J. Tzeng, W.G. Tzeng, "Authentication protocols for the third generation mobile systems,"
Personal Wireless Communications 16, pp. 35-50, 2001.