The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication

碩士 === 國立中央大學 === 資訊工程研究所 === 88 === No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quic...

Full description

Bibliographic Details
Main Authors: Yang Shu Ching, 楊書青
Other Authors: Eric Wu
Format: Others
Language:en_US
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/72194320302018715735
id ndltd-TW-088NCU00392052
record_format oai_dc
spelling ndltd-TW-088NCU003920522016-07-08T04:22:42Z http://ndltd.ncl.edu.tw/handle/72194320302018715735 The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication 利用分享會議金鑰之構成要素演算法完成點對點之安全無線通訊 Yang Shu Ching 楊書青 碩士 國立中央大學 資訊工程研究所 88 No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quickly and conveniently. The essential of most security methods is encryption. Encryption can be used to provide message privacy and integrity. However, if encryption is strong enough and becomes readily available in communications equipment, once manipulated by rascals or criminals, public safety could be seriously risked. With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information including news reports, stock fluctuation, mobile bank, E-Commerce and browse Internet any time, anywhere. For current device with lower power and finite computing capability, it is not suitable to encrypt transmission message using public-key encryption algorithm. In the thesis, we propose a new protocol for digital mobile communications. This protocol permits users to hold a secure conference and ensures public safety. Considering the limited computing capability of mobile phone device, we improve traditional symmetric key encryption algorithm to achieve end-to-end security and non-repudiation for each individual communication connection. Different from public-key encryption algorithm, non-repudiation of our proposed symmetric key encryption algorithm is arbitrated once the communication is disputed or doubted to endanger public safely. To achieve end-to-end security and non-repudiation service, we will distribute ‘Session Key Components’ to several believable organizations, called KETO (Key Escrow Trust Organization). As long as one particular communication transmission is doubted to endanger or dispute with public safety, the CS (Count System) will consult with KETOs to recover session key after the government agreement. Our new security protocol of the thesis not only enhances the second-generation wireless communication, but also provides end-to-end confidentiality and non-repudiation service. Although ‘Sharing Session Key Component’ algorithm is used in the wireless communication, the required bandwidth is much lower than the GSM capacity, and signaling message transaction delay time increases only one RDT (Radio Delay Time), in addition to original ADT (Authentication Delay Time) of GSM. Eric Wu 吳曉光 2000 學位論文 ; thesis 50 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊工程研究所 === 88 === No matter wired or wireless network, confidentiality and privacy become more and more momentous. Wired communications, expensive to establish restrict end user to one particular service locale. On the contrary, wireless communications allow people connecting quickly and conveniently. The essential of most security methods is encryption. Encryption can be used to provide message privacy and integrity. However, if encryption is strong enough and becomes readily available in communications equipment, once manipulated by rascals or criminals, public safety could be seriously risked. With the growth of the wireless market, value-added services and applications are increasing rapidly. WAP (Wireless Application Protocol) provides a platform to access real-time information including news reports, stock fluctuation, mobile bank, E-Commerce and browse Internet any time, anywhere. For current device with lower power and finite computing capability, it is not suitable to encrypt transmission message using public-key encryption algorithm. In the thesis, we propose a new protocol for digital mobile communications. This protocol permits users to hold a secure conference and ensures public safety. Considering the limited computing capability of mobile phone device, we improve traditional symmetric key encryption algorithm to achieve end-to-end security and non-repudiation for each individual communication connection. Different from public-key encryption algorithm, non-repudiation of our proposed symmetric key encryption algorithm is arbitrated once the communication is disputed or doubted to endanger public safely. To achieve end-to-end security and non-repudiation service, we will distribute ‘Session Key Components’ to several believable organizations, called KETO (Key Escrow Trust Organization). As long as one particular communication transmission is doubted to endanger or dispute with public safety, the CS (Count System) will consult with KETOs to recover session key after the government agreement. Our new security protocol of the thesis not only enhances the second-generation wireless communication, but also provides end-to-end confidentiality and non-repudiation service. Although ‘Sharing Session Key Component’ algorithm is used in the wireless communication, the required bandwidth is much lower than the GSM capacity, and signaling message transaction delay time increases only one RDT (Radio Delay Time), in addition to original ADT (Authentication Delay Time) of GSM.
author2 Eric Wu
author_facet Eric Wu
Yang Shu Ching
楊書青
author Yang Shu Ching
楊書青
spellingShingle Yang Shu Ching
楊書青
The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
author_sort Yang Shu Ching
title The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
title_short The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
title_full The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
title_fullStr The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
title_full_unstemmed The Sharing Session Key Component(SSKC) Algorithm for End-to-End Secure Wireless Communication
title_sort sharing session key component(sskc) algorithm for end-to-end secure wireless communication
publishDate 2000
url http://ndltd.ncl.edu.tw/handle/72194320302018715735
work_keys_str_mv AT yangshuching thesharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication
AT yángshūqīng thesharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication
AT yangshuching lìyòngfēnxiǎnghuìyìjīnyàozhīgòuchéngyàosùyǎnsuànfǎwánchéngdiǎnduìdiǎnzhīānquánwúxiàntōngxùn
AT yángshūqīng lìyòngfēnxiǎnghuìyìjīnyàozhīgòuchéngyàosùyǎnsuànfǎwánchéngdiǎnduìdiǎnzhīānquánwúxiàntōngxùn
AT yangshuching sharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication
AT yángshūqīng sharingsessionkeycomponentsskcalgorithmforendtoendsecurewirelesscommunication
_version_ 1718339982752481280