A Study on Public Key Stream Cipher

碩士 === 國立臺灣科技大學 === 電子工程系 === 88 === Most stream cipher systems are based on symmetric cryptosystem. Very few Public-Key-Stream-Cipher systems, which are based on public-key algorithms have been proposed. We try to merge public key cryptosystem and stream cipher system together. And, in this thesis,...

Full description

Bibliographic Details
Main Authors: YANG, CHIEN-WEN, 楊建文
Other Authors: Chiu, Jung-Hui
Format: Others
Language:zh-TW
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/35814910942831451209
Description
Summary:碩士 === 國立臺灣科技大學 === 電子工程系 === 88 === Most stream cipher systems are based on symmetric cryptosystem. Very few Public-Key-Stream-Cipher systems, which are based on public-key algorithms have been proposed. We try to merge public key cryptosystem and stream cipher system together. And, in this thesis, we propose two types of Public-Key-Stream-Cipher systems: (1)Exponential computational encryption/decryption Public-Key- Stream-Cipher systems In this system, the encryption key stream is formed by the exponential computation of the public key of decrypter; the decryption key stream is formed by the exponential computation of the corresponding private key. (2)Easy computational encryption/decryption Public-Key-Stream- Cipher systems In this system, through key exchange process, encrypter can get session key by his private key and the public key of decrypter; also, decrypter can get the same session key by his private key and the public key of encrypter. Both sides use the same session key going through the same key stream generator and hash function, and then get the same encryption/decryption key stream at an appropriate length to encrypt/decrypt message.