An identity-based cryptosystems for military group-oriented information management

碩士 === 國防大學管理學院 === 資訊管理學系 === 98 === To protect classified files in military is always an important issue, and also an only way to keep a country’s safety. As the popularity of network technology, the military makes use of it at the same time. But when they take advantages of its convenience and ef...

Full description

Bibliographic Details
Main Authors: Chih-Min, Wang, 王志民
Other Authors: 蘇品長
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/87866718046409995285
Description
Summary:碩士 === 國防大學管理學院 === 資訊管理學系 === 98 === To protect classified files in military is always an important issue, and also an only way to keep a country’s safety. As the popularity of network technology, the military makes use of it at the same time. But when they take advantages of its convenience and effectiveness, they also have to confront the information security issues at the same time. Problems Like eavesdropping, fraud, falsify and deny transactions deliberately that one has made. All above are the key problems of the information security. So far, the transmission between military units only use simple symmetrical encode method. But this way has its drawbacks, first, we can’t tell who encrypts the cipher message, when we don’t know who encrypts it, to decrypt the cipher message is a difficult task, because only the original encoder know the cipher message’s key. And if the undertaker leaves his job, the ciphered message will become a forever secret. This will lead the organization to loss its knowledge properties. So to develop a cryptosystem with good confidentiality and effectiveness is the target of this study. The study bases on the elliptic curve discrete logarithm problem (ECDLP), through this difficult problem to protect the system’s security, identification and secret sharing method develop a group-oriented cryptosystem. In the system, the cipher has avalanche effect to increase the integrity and confidentiality.