The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
碩士 === 國立中央大學 === 資訊工程研究所 === 88 === No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quic...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72194320302018715735 |
id |
ndltd-TW-088NCU00392052 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NCU003920522016-07-08T04:22:42Z http://ndltd.ncl.edu.tw/handle/72194320302018715735 The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication 利用分享會議金鑰之構成要素演算法完成點對點之安全無線通訊 Yang Shu Ching 楊書青 碩士 國立中央大學 資訊工程研究所 88 No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quickly and conveniently. The essential of most security methods is encryption. Encryption can be used to provide message privacy and integrity. However, if encryption is strong enough and becomes readily available in communications equipment, once manipulated by rascals or criminals, public safety could be seriously risked. With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information including news reports, stock fluctuation, mobile bank, E-Commerce and browse Internet any time, anywhere. For current device with lower power and finite computing capability, it is not suitable to encrypt transmission message using public-key encryption algorithm. In the thesis, we propose a new protocol for digital mobile communications. This protocol permits users to hold a secure conference and ensures public safety. Considering the limited computing capability of mobile phone device, we improve traditional symmetric key encryption algorithm to achieve end-to-end security and non-repudiation for each individual communication connection. Different from public-key encryption algorithm, non-repudiation of our proposed symmetric key encryption algorithm is arbitrated once the communication is disputed or doubted to endanger public safely. To achieve end-to-end security and non-repudiation service, we will distribute ‘Session Key Components’ to several believable organizations, called KETO (Key Escrow Trust Organization). As long as one particular communication transmission is doubted to endanger or dispute with public safety, the CS (Count System) will consult with KETOs to recover session key after the government agreement. Our new security protocol of the thesis not only enhances the second-generation wireless communication, but also provides end-to-end confidentiality and non-repudiation service. Although ‘Sharing Session Key Component’ algorithm is used in the wireless communication, the required bandwidth is much lower than the GSM capacity, and signaling message transaction delay time increases only one RDT (Radio Delay Time), in addition to original ADT (Authentication Delay Time) of GSM. Eric Wu 吳曉光 2000 學位論文 ; thesis 50 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程研究所 === 88 === No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quickly and conveniently. The essential of most security methods is encryption. Encryption can be used to provide message privacy and integrity. However, if encryption is strong enough and becomes readily available in communications equipment, once manipulated by rascals or criminals, public safety could be seriously risked.
With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information including news reports, stock fluctuation, mobile bank, E-Commerce and browse Internet any time, anywhere. For current device with lower power and finite computing capability, it is not suitable to encrypt transmission message using public-key encryption algorithm.
In the thesis, we propose a new protocol for digital mobile communications. This protocol permits users to hold a secure conference and ensures public safety. Considering the limited computing capability of mobile phone device, we improve traditional symmetric key encryption algorithm to achieve end-to-end security and non-repudiation for each individual communication connection. Different from public-key encryption algorithm, non-repudiation of our proposed symmetric key encryption algorithm is arbitrated once the communication is disputed or doubted to endanger public safely.
To achieve end-to-end security and non-repudiation service, we will distribute ‘Session Key Components’ to several believable organizations, called KETO (Key Escrow Trust Organization). As long as one particular communication transmission is doubted to endanger or dispute with public safety, the CS (Count System) will consult with KETOs to recover session key after the government agreement.
Our new security protocol of the thesis not only enhances the second-generation wireless communication, but also provides end-to-end confidentiality and non-repudiation service. Although ‘Sharing Session Key Component’ algorithm is used in the wireless communication, the required bandwidth is much lower than the GSM capacity, and signaling message transaction delay time increases only one RDT (Radio Delay Time), in addition to original ADT (Authentication Delay Time) of GSM.
|
author2 |
Eric Wu |
author_facet |
Eric Wu Yang Shu Ching 楊書青 |
author |
Yang Shu Ching 楊書青 |
spellingShingle |
Yang Shu Ching 楊書青 The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication |
author_sort |
Yang Shu Ching |
title |
The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication |
title_short |
The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication |
title_full |
The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication |
title_fullStr |
The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication |
title_full_unstemmed |
The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication |
title_sort |
sharing session key component(sskc) algorithm for end-to-end secure wireless communication |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/72194320302018715735 |
work_keys_str_mv |
AT yangshuching thesharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication AT yángshūqīng thesharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication AT yangshuching lìyòngfēnxiǎnghuìyìjīnyàozhīgòuchéngyàosùyǎnsuànfǎwánchéngdiǎnduìdiǎnzhīānquánwúxiàntōngxùn AT yángshūqīng lìyòngfēnxiǎnghuìyìjīnyàozhīgòuchéngyàosùyǎnsuànfǎwánchéngdiǎnduìdiǎnzhīānquánwúxiàntōngxùn AT yangshuching sharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication AT yángshūqīng sharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication |
_version_ |
1718339982752481280 |