The Implementation and the Discussion on "A Key Escrow Encryption System on the Individual and the Machine Bounds"

碩士 === 國立中興大學 === 應用數學系 === 86 === As the development of cryptosystems, We summary three main cryptosystems. The first one is "cryptosystem of symmetric key", the second one is "crypto -system of asymmetric key"( cyr...

Full description

Bibliographic Details
Main Authors: Hsieh, Jiann Horng, 謝建宏
Other Authors: Jan Jin Kan
Format: Others
Language:zh-TW
Published: 1998
Online Access:http://ndltd.ncl.edu.tw/handle/17086756802071139201
Description
Summary:碩士 === 國立中興大學 === 應用數學系 === 86 === As the development of cryptosystems, We summary three main cryptosystems. The first one is "cryptosystem of symmetric key", the second one is "crypto -system of asymmetric key"( cyrptosystem of public key), and the third one is "cryptosystem of key escrow"(cyrptosystem of key recovery). It is to ensure the privacy and the security of messages by encrypting the message of communications. However, Criminals encipher those message in comm -unications to do some crimes. To prevent the crises, key escrow system was born. Besides, it is also appreciated and expected by many countries,especial -ly for industrial and commercial societies. The necessity of "Key Escrow Encryption System" is obvious and the applications of key escrow encryption system should be boomed. We implement the Key Escrow Encryption System on the individual and the machine bounds", analyze and evaluate the costs(response time) of each actions in the system, and prove that the implemented system is practical and useful. Finally, we conclude the developments and applications of our system in the future.