Cryptographically Strong Pseudorandom Functions and Their Applications

碩士 === 國立中興大學 === 資訊科學系所 === 94 === Modern cryptology is largely based on Computational Complexity Theory. A realistic program corresponds to an algorithm or a Turing machine in the theory. An algorithm running in probabilistic polynomial time is considered to be a feasible method. For instance, for...

Full description

Bibliographic Details
Main Authors: Yu-Sheng Chen, 陳昱升
Other Authors: 洪國寶
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/75520993414843530607
Description
Summary:碩士 === 國立中興大學 === 資訊科學系所 === 94 === Modern cryptology is largely based on Computational Complexity Theory. A realistic program corresponds to an algorithm or a Turing machine in the theory. An algorithm running in probabilistic polynomial time is considered to be a feasible method. For instance, for an encryption/decryption method, the decryption should not be accomplished in polynomial time without knowing the decryption key; for a digital signature, the signature should not be forged in polynomial time. The design of those cryptosystem usually needs primitives with some one-way property. In this study, we investigate an important cryptographic primitive—pseudorandom functions. A pseudorandom function is designed to approximate a random function, that is, through querying a pseudorandom function and obtaining the function values, we cannot distinguish the function from a random function in polynomial time. The result of this study can be divided into two parts. First, we analyze and improve a generic method of the construction of pseudorandom functions. Second, we use pseudorandom functions as components to design a practical protocol in the RFID system which is suitable for identifying merchandise. The proposed protocol is efficient and can resist tag counterfeiting and malicious tracing.