A Study on Security Mechanisms for Electronic Data Transmission
博士 === 國立交通大學 === 資訊管理所 === 88 === In this thesis, we focus on the security of electronic data transmission over an open network. Three areas, the Electronic Data Interchange (EDI), the World Wide Web (WWW), and the Global System for Mobile communication (GSM) networks, have been studied....
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/31402874353187064552 |
id |
ndltd-TW-088NCTU0396001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NCTU03960012015-10-13T10:59:52Z http://ndltd.ncl.edu.tw/handle/31402874353187064552 A Study on Security Mechanisms for Electronic Data Transmission 電子資料傳輸安全機制之研究 Yu-Jen Chen 陳昱仁 博士 國立交通大學 資訊管理所 88 In this thesis, we focus on the security of electronic data transmission over an open network. Three areas, the Electronic Data Interchange (EDI), the World Wide Web (WWW), and the Global System for Mobile communication (GSM) networks, have been studied. In the first area, we investigate the current status of EDI technologies as they exist today, and then present a survey of authentication protocols, digital signature, hash function, and key management. A security architecture for EDI is proposed. In the second area, we first investigate all possible attacks on the web. Then, on the basis of these attacks, we suggest a security monitoring mechanism. This security monitoring mechanism is an active control mechanism, which is different from the traditional passive mechanisms, like Sniffer. This active security monitoring mechanism will allow the system administrator to actively protect his web site. In the third area, we focus on the security of the GSM networks. A secure communication architecture for the GSM network is proposed. In the proposed architecture, we use public-key cryptography for user authentication and stream cipher for message encryption and decryption. An authentication protocol and a key generation method are presented in conjunction with the proposed architecture. Stream cipher is recommended for message encryption and decryption. First, a key generator is presented. Then, on the basis of the key generator, stream ciphers are designed with respect to different levels of securities of GSM networks. Cryptanalysis and operational analysis show that the authentication protocol and stream ciphers are secure and efficient. Simulation results indicate that the key generation method can always produce key strings of evenly distributed 0''s and 1''s and with infinite period. Consequently, they provide a comprehensive set of secure communication mechanisms for GSM networks. Based on the results obtained from the three research areas aforementioned, we have significantly enhanced the security of electronic data transmission over an open network. Chi-Chun Lo 羅濟群 2000 學位論文 ; thesis 104 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立交通大學 === 資訊管理所 === 88 === In this thesis, we focus on the security of electronic data transmission over an open network. Three areas, the Electronic Data Interchange (EDI), the World Wide Web (WWW), and the Global System for Mobile communication (GSM) networks, have been studied.
In the first area, we investigate the current status of EDI technologies as they exist today, and then present a survey of authentication protocols, digital signature, hash function, and key management. A security architecture for EDI is proposed.
In the second area, we first investigate all possible attacks on the web. Then, on the basis of these attacks, we suggest a security monitoring mechanism. This security monitoring mechanism is an active control mechanism, which is different from the traditional passive mechanisms, like Sniffer. This active security monitoring mechanism will allow the system administrator to actively protect his web site.
In the third area, we focus on the security of the GSM networks. A secure communication architecture for the GSM network is proposed. In the proposed architecture, we use public-key cryptography for user authentication and stream cipher for message encryption and decryption. An authentication protocol and a key generation method are presented in conjunction with the proposed architecture. Stream cipher is recommended for message encryption and decryption. First, a key generator is presented. Then, on the basis of the key generator, stream ciphers are designed with respect to different levels of securities of GSM networks. Cryptanalysis and operational analysis show that the authentication protocol and stream ciphers are secure and efficient. Simulation results indicate that the key generation method can always produce key strings of evenly distributed 0''s and 1''s and with infinite period. Consequently, they provide a comprehensive set of secure communication mechanisms for GSM networks.
Based on the results obtained from the three research areas aforementioned, we have significantly enhanced the security of electronic data transmission over an open network.
|
author2 |
Chi-Chun Lo |
author_facet |
Chi-Chun Lo Yu-Jen Chen 陳昱仁 |
author |
Yu-Jen Chen 陳昱仁 |
spellingShingle |
Yu-Jen Chen 陳昱仁 A Study on Security Mechanisms for Electronic Data Transmission |
author_sort |
Yu-Jen Chen |
title |
A Study on Security Mechanisms for Electronic Data Transmission |
title_short |
A Study on Security Mechanisms for Electronic Data Transmission |
title_full |
A Study on Security Mechanisms for Electronic Data Transmission |
title_fullStr |
A Study on Security Mechanisms for Electronic Data Transmission |
title_full_unstemmed |
A Study on Security Mechanisms for Electronic Data Transmission |
title_sort |
study on security mechanisms for electronic data transmission |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/31402874353187064552 |
work_keys_str_mv |
AT yujenchen astudyonsecuritymechanismsforelectronicdatatransmission AT chényùrén astudyonsecuritymechanismsforelectronicdatatransmission AT yujenchen diànzizīliàochuánshūānquánjīzhìzhīyánjiū AT chényùrén diànzizīliàochuánshūānquánjīzhìzhīyánjiū AT yujenchen studyonsecuritymechanismsforelectronicdatatransmission AT chényùrén studyonsecuritymechanismsforelectronicdatatransmission |
_version_ |
1716835420059205632 |