The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
碩士 === 國防管理學院 === 國防資訊研究所 === 88 === For the popular usage of Internets today, Electronic Commerce (EC) is the major trend of enterprise marketing. It makes the network shopping and e-business acceptable now. CA (Certificate Authority) is the most important function in the network marketi...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2000
|
Online Access: | http://ndltd.ncl.edu.tw/handle/06595669746730443443 |
id |
ndltd-TW-088NDMC1654015 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-088NDMC16540152016-07-08T04:22:55Z http://ndltd.ncl.edu.tw/handle/06595669746730443443 The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator 三次式公開金匙密碼系統及基因密碼產生器之設計與研究 Chao-Ping Huang 黃昭平 碩士 國防管理學院 國防資訊研究所 88 For the popular usage of Internets today, Electronic Commerce (EC) is the major trend of enterprise marketing. It makes the network shopping and e-business acceptable now. CA (Certificate Authority) is the most important function in the network marketing. The CA may sopports all trust functions in network environment. There are some problems in the operations of the CA: 1. How can the CA speed up enciphering/ deciphering secret messages in the increasing network transactions? 2. How to design a key recovery cryptosystem that the CA can execute the function of key recovery in certain necessary condition without storing user’s private key? 3. How to automatically generate new cryptosystem algorithms by computer? In this thesis, a Cubic Polynomial Cryptosystem (CPC) is proposed. The derivation of cipherments can be used by only polynomial computation. A theoretic derivation of CPC has been developed, the computations include only multiplication and addition, the computational complexity has been reduced from O(2n) to O(n), the efficiency is higher than RSA,ElGamal and ECC. The security of the proposed scheme is believed to be the hard of factorization problem; When transaction dissension occurred, CA or Trusted Key Recovery Center (TKRC) doesn’t store any user’s private key and could execute key recovery by government department’s digital signature or by secret sharing technology. The advantages are including omiting the space of the key storage and management problem. The applications of the proposed scheme include digital signature, certificate authentication, electronic vote or electronic biting. Due to the invention of public cryptography in 1976, most cryptosystem algorithms are developed by mathematical theory with human works. To overcome above the third problem, a Genetic Cryptosystem Generator (GCG) is proposed to use genetic algorithm (GA) to generate new cryptosystem algorithms. The proposed scheme is based on the concept of Darwinian’s theory that it develops to mimic natural evolution to find a better solution by using the biologic operations such as selection, crossover and mutation. In this thesis, GA is applied in cryptography, to try to find a reasonable solution that can meet the user’s requirement and find a more secure and more efficient cryptosystem algotithms automatically. We hope this research will provide a new direction for cryptosystem. With the proposed CPC and GCG, new ideas of polynomial computation and Genetic Algorithm are suggested to researches in the near future. Huey-Der Chu Ker-Chang Chang Young-Chang Hou 朱慧德 張克章 侯永昌 2000 學位論文 ; thesis 126 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防管理學院 === 國防資訊研究所 === 88 === For the popular usage of Internets today, Electronic Commerce (EC) is the major trend of enterprise marketing. It makes the network shopping and e-business acceptable now. CA (Certificate Authority) is the most important function in the network marketing. The CA may sopports all trust functions in network environment. There are some problems in the operations of the CA:
1. How can the CA speed up enciphering/ deciphering secret messages in the increasing network transactions?
2. How to design a key recovery cryptosystem that the CA can execute the function of key recovery in certain necessary condition without storing user’s private key?
3. How to automatically generate new cryptosystem algorithms by computer?
In this thesis, a Cubic Polynomial Cryptosystem (CPC) is proposed. The derivation of cipherments can be used by only polynomial computation. A theoretic derivation of CPC has been developed, the computations include only multiplication and addition, the computational complexity has been reduced from O(2n) to O(n), the efficiency is higher than RSA,ElGamal and ECC. The security of the proposed scheme is believed to be the hard of factorization problem; When transaction dissension occurred, CA or Trusted Key Recovery Center (TKRC) doesn’t store any user’s private key and could execute key recovery by government department’s digital signature or by secret sharing technology. The advantages are including omiting the space of the key storage and management problem. The applications of the proposed scheme include digital signature, certificate authentication, electronic vote or electronic biting.
Due to the invention of public cryptography in 1976, most cryptosystem algorithms are developed by mathematical theory with human works. To overcome above the third problem, a Genetic Cryptosystem Generator (GCG) is proposed to use genetic algorithm (GA) to generate new cryptosystem algorithms. The proposed scheme is based on the concept of Darwinian’s theory that it develops to mimic natural evolution to find a better solution by using the biologic operations such as selection, crossover and mutation. In this thesis, GA is applied in cryptography, to try to find a reasonable solution that can meet the user’s requirement and find a more secure and more efficient cryptosystem algotithms automatically. We hope this research will provide a new direction for cryptosystem.
With the proposed CPC and GCG, new ideas of polynomial computation and Genetic Algorithm are suggested to researches in the near future.
|
author2 |
Huey-Der Chu |
author_facet |
Huey-Der Chu Chao-Ping Huang 黃昭平 |
author |
Chao-Ping Huang 黃昭平 |
spellingShingle |
Chao-Ping Huang 黃昭平 The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator |
author_sort |
Chao-Ping Huang |
title |
The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator |
title_short |
The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator |
title_full |
The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator |
title_fullStr |
The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator |
title_full_unstemmed |
The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator |
title_sort |
design and research of cubic polynomial public key cryptosystem and genetic cryptosystem generator |
publishDate |
2000 |
url |
http://ndltd.ncl.edu.tw/handle/06595669746730443443 |
work_keys_str_mv |
AT chaopinghuang thedesignandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator AT huángzhāopíng thedesignandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator AT chaopinghuang sāncìshìgōngkāijīnshimìmǎxìtǒngjíjīyīnmìmǎchǎnshēngqìzhīshèjìyǔyánjiū AT huángzhāopíng sāncìshìgōngkāijīnshimìmǎxìtǒngjíjīyīnmìmǎchǎnshēngqìzhīshèjìyǔyánjiū AT chaopinghuang designandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator AT huángzhāopíng designandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator |
_version_ |
1718340459570397184 |