The Management of Interactive Identification scheme in Information War
碩士 === 國防管理學院 === 國防資訊研究所 === 89 === The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the base...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2001
|
Online Access: | http://ndltd.ncl.edu.tw/handle/12004915970757206582 |
id |
ndltd-TW-089NDMC1654004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-089NDMC16540042016-06-13T04:16:12Z http://ndltd.ncl.edu.tw/handle/12004915970757206582 The Management of Interactive Identification scheme in Information War 資訊戰互動式辨証機制管理之研究 Jen Su-chuang 任素壯 碩士 國防管理學院 國防資訊研究所 89 The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the basement of security is authentication. How to comply the security, authentication, completion, no denies, and un-predication become the must-be has items. In order to stop possible intrusion to the military information system, we suggest a new strategy to resolve the bottleneck on the traditional information system has encountered which are: 1.Mutual identification mechanism and identification with friend. In the past, it is for one-on-one only. If the ID increased, it will reduce the performance of identification and become a whole mess of the system. 2.The need on computation of Digital Signature takes too long to fit the combination campaign. 3.The military routine task can’t be resolved on the problem of pre-signature, post-signature and the substitution signature. If it sets up on the GPS, the cost will increase in a very high rate and hinder the development of military reengineering. 4.The communication needs to conform interactively. Although it can delay the enemy’s intrusion, it also delays ours. This dissertation discusses the problems that the tradition Information War has encountered. It consists of five sections. In the first section, we discuss the Girault system that proposes two-attack method, and we prove which system has flaw on the security system. In the second section, we combine the Schnorr interactive authentication and the traditional signature to provide the police-military tour of inspection resolution. In the third section, we made some modifications of the Schnorr system and propose another strategy for interactive authentication. In the forth section, we introduce Robin detection to reduce the loading of security key numbers by using the Interactive Identification mechanism and reinforce Shamir and Blakley security key management mechanism. In the last section, we propose an effective authentication to stop the enemy intrusion. Jonathan Jen-Rong Chen 陳正鎔 2001 學位論文 ; thesis 0 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防管理學院 === 國防資訊研究所 === 89 === The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the basement of security is authentication. How to comply the security, authentication, completion, no denies, and un-predication become the must-be has items.
In order to stop possible intrusion to the military information system, we suggest a new strategy to resolve the bottleneck on the traditional information system has encountered which are: 1.Mutual identification mechanism and identification with friend. In the past, it is for one-on-one only. If the ID increased, it will reduce the performance of identification and become a whole mess of the system. 2.The need on computation of Digital Signature takes too long to fit the combination campaign. 3.The military routine task can’t be resolved on the problem of pre-signature, post-signature and the substitution signature. If it sets up on the GPS, the cost will increase in a very high rate and hinder the development of military reengineering. 4.The communication needs to conform interactively. Although it can delay the enemy’s intrusion, it also delays ours.
This dissertation discusses the problems that the tradition Information War has encountered. It consists of five sections. In the first section, we discuss the Girault system that proposes two-attack method, and we prove which system has flaw on the security system. In the second section, we combine the Schnorr interactive authentication and the traditional signature to provide the police-military tour of inspection resolution. In the third section, we made some modifications of the Schnorr system and propose another strategy for interactive authentication. In the forth section, we introduce Robin detection to reduce the loading of security key numbers by using the Interactive Identification mechanism and reinforce Shamir and Blakley security key management mechanism. In the last section, we propose an effective authentication to stop the enemy intrusion.
|
author2 |
Jonathan Jen-Rong Chen |
author_facet |
Jonathan Jen-Rong Chen Jen Su-chuang 任素壯 |
author |
Jen Su-chuang 任素壯 |
spellingShingle |
Jen Su-chuang 任素壯 The Management of Interactive Identification scheme in Information War |
author_sort |
Jen Su-chuang |
title |
The Management of Interactive Identification scheme in Information War |
title_short |
The Management of Interactive Identification scheme in Information War |
title_full |
The Management of Interactive Identification scheme in Information War |
title_fullStr |
The Management of Interactive Identification scheme in Information War |
title_full_unstemmed |
The Management of Interactive Identification scheme in Information War |
title_sort |
management of interactive identification scheme in information war |
publishDate |
2001 |
url |
http://ndltd.ncl.edu.tw/handle/12004915970757206582 |
work_keys_str_mv |
AT jensuchuang themanagementofinteractiveidentificationschemeininformationwar AT rènsùzhuàng themanagementofinteractiveidentificationschemeininformationwar AT jensuchuang zīxùnzhànhùdòngshìbiànzhèngjīzhìguǎnlǐzhīyánjiū AT rènsùzhuàng zīxùnzhànhùdòngshìbiànzhèngjīzhìguǎnlǐzhīyánjiū AT jensuchuang managementofinteractiveidentificationschemeininformationwar AT rènsùzhuàng managementofinteractiveidentificationschemeininformationwar |
_version_ |
1718302087189626880 |