The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator

碩士 === 國防管理學院 === 國防資訊研究所 === 88 === For the popular usage of Internets today, Electronic Commerce (EC) is the major trend of enterprise marketing. It makes the network shopping and e-business acceptable now. CA (Certificate Authority) is the most important function in the network marketi...

Full description

Bibliographic Details
Main Authors: Chao-Ping Huang, 黃昭平
Other Authors: Huey-Der Chu
Format: Others
Language:zh-TW
Published: 2000
Online Access:http://ndltd.ncl.edu.tw/handle/06595669746730443443
id ndltd-TW-088NDMC1654015
record_format oai_dc
spelling ndltd-TW-088NDMC16540152016-07-08T04:22:55Z http://ndltd.ncl.edu.tw/handle/06595669746730443443 The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator 三次式公開金匙密碼系統及基因密碼產生器之設計與研究 Chao-Ping Huang 黃昭平 碩士 國防管理學院 國防資訊研究所 88 For the popular usage of Internets today, Electronic Commerce (EC) is the major trend of enterprise marketing. It makes the network shopping and e-business acceptable now. CA (Certificate Authority) is the most important function in the network marketing. The CA may sopports all trust functions in network environment. There are some problems in the operations of the CA: 1. How can the CA speed up enciphering/ deciphering secret messages in the increasing network transactions? 2. How to design a key recovery cryptosystem that the CA can execute the function of key recovery in certain necessary condition without storing user’s private key? 3. How to automatically generate new cryptosystem algorithms by computer? In this thesis, a Cubic Polynomial Cryptosystem (CPC) is proposed. The derivation of cipherments can be used by only polynomial computation. A theoretic derivation of CPC has been developed, the computations include only multiplication and addition, the computational complexity has been reduced from O(2n) to O(n), the efficiency is higher than RSA,ElGamal and ECC. The security of the proposed scheme is believed to be the hard of factorization problem; When transaction dissension occurred, CA or Trusted Key Recovery Center (TKRC) doesn’t store any user’s private key and could execute key recovery by government department’s digital signature or by secret sharing technology. The advantages are including omiting the space of the key storage and management problem. The applications of the proposed scheme include digital signature, certificate authentication, electronic vote or electronic biting. Due to the invention of public cryptography in 1976, most cryptosystem algorithms are developed by mathematical theory with human works. To overcome above the third problem, a Genetic Cryptosystem Generator (GCG) is proposed to use genetic algorithm (GA) to generate new cryptosystem algorithms. The proposed scheme is based on the concept of Darwinian’s theory that it develops to mimic natural evolution to find a better solution by using the biologic operations such as selection, crossover and mutation. In this thesis, GA is applied in cryptography, to try to find a reasonable solution that can meet the user’s requirement and find a more secure and more efficient cryptosystem algotithms automatically. We hope this research will provide a new direction for cryptosystem. With the proposed CPC and GCG, new ideas of polynomial computation and Genetic Algorithm are suggested to researches in the near future. Huey-Der Chu Ker-Chang Chang Young-Chang Hou 朱慧德 張克章 侯永昌 2000 學位論文 ; thesis 126 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 88 === For the popular usage of Internets today, Electronic Commerce (EC) is the major trend of enterprise marketing. It makes the network shopping and e-business acceptable now. CA (Certificate Authority) is the most important function in the network marketing. The CA may sopports all trust functions in network environment. There are some problems in the operations of the CA: 1. How can the CA speed up enciphering/ deciphering secret messages in the increasing network transactions? 2. How to design a key recovery cryptosystem that the CA can execute the function of key recovery in certain necessary condition without storing user’s private key? 3. How to automatically generate new cryptosystem algorithms by computer? In this thesis, a Cubic Polynomial Cryptosystem (CPC) is proposed. The derivation of cipherments can be used by only polynomial computation. A theoretic derivation of CPC has been developed, the computations include only multiplication and addition, the computational complexity has been reduced from O(2n) to O(n), the efficiency is higher than RSA,ElGamal and ECC. The security of the proposed scheme is believed to be the hard of factorization problem; When transaction dissension occurred, CA or Trusted Key Recovery Center (TKRC) doesn’t store any user’s private key and could execute key recovery by government department’s digital signature or by secret sharing technology. The advantages are including omiting the space of the key storage and management problem. The applications of the proposed scheme include digital signature, certificate authentication, electronic vote or electronic biting. Due to the invention of public cryptography in 1976, most cryptosystem algorithms are developed by mathematical theory with human works. To overcome above the third problem, a Genetic Cryptosystem Generator (GCG) is proposed to use genetic algorithm (GA) to generate new cryptosystem algorithms. The proposed scheme is based on the concept of Darwinian’s theory that it develops to mimic natural evolution to find a better solution by using the biologic operations such as selection, crossover and mutation. In this thesis, GA is applied in cryptography, to try to find a reasonable solution that can meet the user’s requirement and find a more secure and more efficient cryptosystem algotithms automatically. We hope this research will provide a new direction for cryptosystem. With the proposed CPC and GCG, new ideas of polynomial computation and Genetic Algorithm are suggested to researches in the near future.
author2 Huey-Der Chu
author_facet Huey-Der Chu
Chao-Ping Huang
黃昭平
author Chao-Ping Huang
黃昭平
spellingShingle Chao-Ping Huang
黃昭平
The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
author_sort Chao-Ping Huang
title The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
title_short The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
title_full The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
title_fullStr The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
title_full_unstemmed The Design and Research of Cubic Polynomial Public Key Cryptosystem and Genetic Cryptosystem Generator
title_sort design and research of cubic polynomial public key cryptosystem and genetic cryptosystem generator
publishDate 2000
url http://ndltd.ncl.edu.tw/handle/06595669746730443443
work_keys_str_mv AT chaopinghuang thedesignandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator
AT huángzhāopíng thedesignandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator
AT chaopinghuang sāncìshìgōngkāijīnshimìmǎxìtǒngjíjīyīnmìmǎchǎnshēngqìzhīshèjìyǔyánjiū
AT huángzhāopíng sāncìshìgōngkāijīnshimìmǎxìtǒngjíjīyīnmìmǎchǎnshēngqìzhīshèjìyǔyánjiū
AT chaopinghuang designandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator
AT huángzhāopíng designandresearchofcubicpolynomialpublickeycryptosystemandgeneticcryptosystemgenerator
_version_ 1718340459570397184