Application of NFC and QR code using encryption system in wireless channel
碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 102 === Usually, the confidential documents will be encrypted before being transmitted, and the receiver first of all needs his account password to receive the file, and then decrypts the data according to the way provided by the other party. Yet, transmitting messag...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/4m79qv |
id |
ndltd-TW-102NTTI5392021 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NTTI53920212019-09-24T03:34:12Z http://ndltd.ncl.edu.tw/handle/4m79qv Application of NFC and QR code using encryption system in wireless channel NFC與QR code之加解密系統應用在無線通道 Chien-Hung Chen 陳建宏 碩士 國立臺中科技大學 資訊工程系碩士班 102 Usually, the confidential documents will be encrypted before being transmitted, and the receiver first of all needs his account password to receive the file, and then decrypts the data according to the way provided by the other party. Yet, transmitting messages via the wireless network in the air could easily be intercepted, and many of the stolen data involve the security and privacy of the files. The use of algebraic signatures can effectively check whether the information is changed, but it does not always guarantee the confidentiality of the content. This thesis, through the use of algebraic signatures, can sustain the remote data possession checking (RDPC), and also decrypt the files by using AES encryption to enable the users to exchange files and enhance the defense and security between files and systems. The second channel to certificate is to connect 3G via smart phones or Wi-Fi. That is, it obtains certification via a certification server, uploads archives to obtain an encrypted file, and then the recipient can use 3G or Wi-Fi of their smart phones as the way to certificate. If there is only wired network available, users can also get the certification through NFC, which is nowadays generally offered by more and more smart phones. NFC is also a small shaped RFID, which can mimic RFID Tag or be converted to the Rader mode, obtain certification through the certification server, upload files and simultaneously proceed the examination of algebraic signature, and proceed decryption by making sure that the content is not modified. This thesis adopts Chaos as the way of encryption and the wireless network as a second channel to proceed AES encryption and RDPC algebraic signature. It in this way can reduce the need for users to remember too many account passwords and enhance the security of information and files. Young-Long Chen Hsin-I Huang 陳永隆 黃馨逸 2014 學位論文 ; thesis 50 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺中科技大學 === 資訊工程系碩士班 === 102 === Usually, the confidential documents will be encrypted before being transmitted, and the receiver first of all needs his account password to receive the file, and then decrypts the data according to the way provided by the other party. Yet, transmitting messages via the wireless network in the air could easily be intercepted, and many of the stolen data involve the security and privacy of the files. The use of algebraic signatures can effectively check whether the information is changed, but it does not always guarantee the confidentiality of the content. This thesis, through the use of algebraic signatures, can sustain the remote data possession checking (RDPC), and also decrypt the files by using AES encryption to enable the users to exchange files and enhance the defense and security between files and systems. The second channel to certificate is to connect 3G via smart phones or Wi-Fi. That is, it obtains certification via a certification server, uploads archives to obtain an encrypted file, and then the recipient can use 3G or Wi-Fi of their smart phones as the way to certificate. If there is only wired network available, users can also get the certification through NFC, which is nowadays generally offered by more and more smart phones. NFC is also a small shaped RFID, which can mimic RFID Tag or be converted to the Rader mode, obtain certification through the certification server, upload files and simultaneously proceed the examination of algebraic signature, and proceed decryption by making sure that the content is not modified. This thesis adopts Chaos as the way of encryption and the wireless network as a second channel to proceed AES encryption and RDPC algebraic signature. It in this way can reduce the need for users to remember too many account passwords and enhance the security of information and files.
|
author2 |
Young-Long Chen |
author_facet |
Young-Long Chen Chien-Hung Chen 陳建宏 |
author |
Chien-Hung Chen 陳建宏 |
spellingShingle |
Chien-Hung Chen 陳建宏 Application of NFC and QR code using encryption system in wireless channel |
author_sort |
Chien-Hung Chen |
title |
Application of NFC and QR code using encryption system in wireless channel |
title_short |
Application of NFC and QR code using encryption system in wireless channel |
title_full |
Application of NFC and QR code using encryption system in wireless channel |
title_fullStr |
Application of NFC and QR code using encryption system in wireless channel |
title_full_unstemmed |
Application of NFC and QR code using encryption system in wireless channel |
title_sort |
application of nfc and qr code using encryption system in wireless channel |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/4m79qv |
work_keys_str_mv |
AT chienhungchen applicationofnfcandqrcodeusingencryptionsysteminwirelesschannel AT chénjiànhóng applicationofnfcandqrcodeusingencryptionsysteminwirelesschannel AT chienhungchen nfcyǔqrcodezhījiājiěmìxìtǒngyīngyòngzàiwúxiàntōngdào AT chénjiànhóng nfcyǔqrcodezhījiājiěmìxìtǒngyīngyòngzàiwúxiàntōngdào |
_version_ |
1719256356398039040 |