The Management of Interactive Identification scheme in Information War

碩士 === 國防管理學院 === 國防資訊研究所 === 89 === The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the base...

Full description

Bibliographic Details
Main Authors: Jen Su-chuang, 任素壯
Other Authors: Jonathan Jen-Rong Chen
Format: Others
Language:zh-TW
Published: 2001
Online Access:http://ndltd.ncl.edu.tw/handle/12004915970757206582
Description
Summary:碩士 === 國防管理學院 === 國防資訊研究所 === 89 === The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the basement of security is authentication. How to comply the security, authentication, completion, no denies, and un-predication become the must-be has items. In order to stop possible intrusion to the military information system, we suggest a new strategy to resolve the bottleneck on the traditional information system has encountered which are: 1.Mutual identification mechanism and identification with friend. In the past, it is for one-on-one only. If the ID increased, it will reduce the performance of identification and become a whole mess of the system. 2.The need on computation of Digital Signature takes too long to fit the combination campaign. 3.The military routine task can’t be resolved on the problem of pre-signature, post-signature and the substitution signature. If it sets up on the GPS, the cost will increase in a very high rate and hinder the development of military reengineering. 4.The communication needs to conform interactively. Although it can delay the enemy’s intrusion, it also delays ours. This dissertation discusses the problems that the tradition Information War has encountered. It consists of five sections. In the first section, we discuss the Girault system that proposes two-attack method, and we prove which system has flaw on the security system. In the second section, we combine the Schnorr interactive authentication and the traditional signature to provide the police-military tour of inspection resolution. In the third section, we made some modifications of the Schnorr system and propose another strategy for interactive authentication. In the forth section, we introduce Robin detection to reduce the loading of security key numbers by using the Interactive Identification mechanism and reinforce Shamir and Blakley security key management mechanism. In the last section, we propose an effective authentication to stop the enemy intrusion.