The Management of Interactive Identification scheme in Information War

碩士 === 國防管理學院 === 國防資訊研究所 === 89 === The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the base...

Full description

Bibliographic Details
Main Authors: Jen Su-chuang, 任素壯
Other Authors: Jonathan Jen-Rong Chen
Format: Others
Language:zh-TW
Published: 2001
Online Access:http://ndltd.ncl.edu.tw/handle/12004915970757206582
id ndltd-TW-089NDMC1654004
record_format oai_dc
spelling ndltd-TW-089NDMC16540042016-06-13T04:16:12Z http://ndltd.ncl.edu.tw/handle/12004915970757206582 The Management of Interactive Identification scheme in Information War 資訊戰互動式辨証機制管理之研究 Jen Su-chuang 任素壯 碩士 國防管理學院 國防資訊研究所 89 The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the basement of security is authentication. How to comply the security, authentication, completion, no denies, and un-predication become the must-be has items. In order to stop possible intrusion to the military information system, we suggest a new strategy to resolve the bottleneck on the traditional information system has encountered which are: 1.Mutual identification mechanism and identification with friend. In the past, it is for one-on-one only. If the ID increased, it will reduce the performance of identification and become a whole mess of the system. 2.The need on computation of Digital Signature takes too long to fit the combination campaign. 3.The military routine task can’t be resolved on the problem of pre-signature, post-signature and the substitution signature. If it sets up on the GPS, the cost will increase in a very high rate and hinder the development of military reengineering. 4.The communication needs to conform interactively. Although it can delay the enemy’s intrusion, it also delays ours. This dissertation discusses the problems that the tradition Information War has encountered. It consists of five sections. In the first section, we discuss the Girault system that proposes two-attack method, and we prove which system has flaw on the security system. In the second section, we combine the Schnorr interactive authentication and the traditional signature to provide the police-military tour of inspection resolution. In the third section, we made some modifications of the Schnorr system and propose another strategy for interactive authentication. In the forth section, we introduce Robin detection to reduce the loading of security key numbers by using the Interactive Identification mechanism and reinforce Shamir and Blakley security key management mechanism. In the last section, we propose an effective authentication to stop the enemy intrusion. Jonathan Jen-Rong Chen 陳正鎔 2001 學位論文 ; thesis 0 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 89 === The war of information has been seen as the new generation war type in the 21st century. A lot of nations hurry up to build professional information troops and there are no exceptions for China (P.R.C.). The war of information start from the security and the basement of security is authentication. How to comply the security, authentication, completion, no denies, and un-predication become the must-be has items. In order to stop possible intrusion to the military information system, we suggest a new strategy to resolve the bottleneck on the traditional information system has encountered which are: 1.Mutual identification mechanism and identification with friend. In the past, it is for one-on-one only. If the ID increased, it will reduce the performance of identification and become a whole mess of the system. 2.The need on computation of Digital Signature takes too long to fit the combination campaign. 3.The military routine task can’t be resolved on the problem of pre-signature, post-signature and the substitution signature. If it sets up on the GPS, the cost will increase in a very high rate and hinder the development of military reengineering. 4.The communication needs to conform interactively. Although it can delay the enemy’s intrusion, it also delays ours. This dissertation discusses the problems that the tradition Information War has encountered. It consists of five sections. In the first section, we discuss the Girault system that proposes two-attack method, and we prove which system has flaw on the security system. In the second section, we combine the Schnorr interactive authentication and the traditional signature to provide the police-military tour of inspection resolution. In the third section, we made some modifications of the Schnorr system and propose another strategy for interactive authentication. In the forth section, we introduce Robin detection to reduce the loading of security key numbers by using the Interactive Identification mechanism and reinforce Shamir and Blakley security key management mechanism. In the last section, we propose an effective authentication to stop the enemy intrusion.
author2 Jonathan Jen-Rong Chen
author_facet Jonathan Jen-Rong Chen
Jen Su-chuang
任素壯
author Jen Su-chuang
任素壯
spellingShingle Jen Su-chuang
任素壯
The Management of Interactive Identification scheme in Information War
author_sort Jen Su-chuang
title The Management of Interactive Identification scheme in Information War
title_short The Management of Interactive Identification scheme in Information War
title_full The Management of Interactive Identification scheme in Information War
title_fullStr The Management of Interactive Identification scheme in Information War
title_full_unstemmed The Management of Interactive Identification scheme in Information War
title_sort management of interactive identification scheme in information war
publishDate 2001
url http://ndltd.ncl.edu.tw/handle/12004915970757206582
work_keys_str_mv AT jensuchuang themanagementofinteractiveidentificationschemeininformationwar
AT rènsùzhuàng themanagementofinteractiveidentificationschemeininformationwar
AT jensuchuang zīxùnzhànhùdòngshìbiànzhèngjīzhìguǎnlǐzhīyánjiū
AT rènsùzhuàng zīxùnzhànhùdòngshìbiànzhèngjīzhìguǎnlǐzhīyánjiū
AT jensuchuang managementofinteractiveidentificationschemeininformationwar
AT rènsùzhuàng managementofinteractiveidentificationschemeininformationwar
_version_ 1718302087189626880