The Research of Information Security Model in Information Warfare

碩士 === 國防管理學院 === 國防資訊研究所 === 90 === In recent years, Internet techniques are developed fast toward an object of wireless Internet. As automatic document process is widely implied, the armed forces are now relying on computers more then ever. It is possible for them to finish their works...

Full description

Bibliographic Details
Main Authors: Chio-Chen Hong, 邱正宏
Other Authors: Jonathan Jen-Rong Chen
Format: Others
Language:zh-TW
Published: 2002
Online Access:http://ndltd.ncl.edu.tw/handle/32233180138726684863
id ndltd-TW-090NDMC1654009
record_format oai_dc
spelling ndltd-TW-090NDMC16540092015-10-13T10:17:27Z http://ndltd.ncl.edu.tw/handle/32233180138726684863 The Research of Information Security Model in Information Warfare 資訊戰中資訊加密模式之研究 Chio-Chen Hong 邱正宏 碩士 國防管理學院 國防資訊研究所 90 In recent years, Internet techniques are developed fast toward an object of wireless Internet. As automatic document process is widely implied, the armed forces are now relying on computers more then ever. It is possible for them to finish their works by computers as well as Internet in the future such as document transmission, group signature and components applications…etc. All of these are expecting to transmit through a public channel such as Internet and surely under an insecure environment especially for C4ISR systems. It is not the best way to transmit classified documents by Internet, however it has the advantages of fast and inter-area abilities, sending intelligence information to every unit in battlefield immediately. In considering of the risk of insecurity, most of them give up Internet transmission. But if we involve a necessary cryptosystem in the transmission carefully, most of the Internet transmissions will turn out to be quite secured. Therefore, many encryption theories appeared. Contemporary encryption techniques are mostly applied from RSA and DES (Data Encryption Standard), but they are challenged with the disadvantages as follow: 1. RSA encryption technique is based on a strong prime as its private key and usually needs exponentiation calculations, this will require at lest a large computer to finish the job. Furthermore, as human being memory, it is impossible for us to memorize a number up to 20 or even 30 digits. 2. DES is a symmetric cryptosystem; both sender and receiver have to own the same key, so the key copies are as many as the amount of users. It forms a heavy load for key management unit. This research is focused on working out the traditional encryption issues that I have mentioned above. The details are present in the 3rd chapter and it is divided into three sections: in the first section, we introduce how to create a unique identification for every crew in military staff by smart card. In the second section, the main research is on a message broadcast encryption model to solve the problem that a traditional public key or symmetric cryptosystems may face while sending messages to multi-users. Finally, in the third section, provides a public key camouflage cryptosystem to prevent hackers from invading Certification Authority. We hope that our armed forces will figure out a suitable technique to encrypt messages in wartime under information warfare environment so as to create advantages for command, control, communication, information, intelligence, surveillance and reconnaissance to win a victory. Jonathan Jen-Rong Chen 陳正鎔 2002 學位論文 ; thesis 94 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防管理學院 === 國防資訊研究所 === 90 === In recent years, Internet techniques are developed fast toward an object of wireless Internet. As automatic document process is widely implied, the armed forces are now relying on computers more then ever. It is possible for them to finish their works by computers as well as Internet in the future such as document transmission, group signature and components applications…etc. All of these are expecting to transmit through a public channel such as Internet and surely under an insecure environment especially for C4ISR systems. It is not the best way to transmit classified documents by Internet, however it has the advantages of fast and inter-area abilities, sending intelligence information to every unit in battlefield immediately. In considering of the risk of insecurity, most of them give up Internet transmission. But if we involve a necessary cryptosystem in the transmission carefully, most of the Internet transmissions will turn out to be quite secured. Therefore, many encryption theories appeared. Contemporary encryption techniques are mostly applied from RSA and DES (Data Encryption Standard), but they are challenged with the disadvantages as follow: 1. RSA encryption technique is based on a strong prime as its private key and usually needs exponentiation calculations, this will require at lest a large computer to finish the job. Furthermore, as human being memory, it is impossible for us to memorize a number up to 20 or even 30 digits. 2. DES is a symmetric cryptosystem; both sender and receiver have to own the same key, so the key copies are as many as the amount of users. It forms a heavy load for key management unit. This research is focused on working out the traditional encryption issues that I have mentioned above. The details are present in the 3rd chapter and it is divided into three sections: in the first section, we introduce how to create a unique identification for every crew in military staff by smart card. In the second section, the main research is on a message broadcast encryption model to solve the problem that a traditional public key or symmetric cryptosystems may face while sending messages to multi-users. Finally, in the third section, provides a public key camouflage cryptosystem to prevent hackers from invading Certification Authority. We hope that our armed forces will figure out a suitable technique to encrypt messages in wartime under information warfare environment so as to create advantages for command, control, communication, information, intelligence, surveillance and reconnaissance to win a victory.
author2 Jonathan Jen-Rong Chen
author_facet Jonathan Jen-Rong Chen
Chio-Chen Hong
邱正宏
author Chio-Chen Hong
邱正宏
spellingShingle Chio-Chen Hong
邱正宏
The Research of Information Security Model in Information Warfare
author_sort Chio-Chen Hong
title The Research of Information Security Model in Information Warfare
title_short The Research of Information Security Model in Information Warfare
title_full The Research of Information Security Model in Information Warfare
title_fullStr The Research of Information Security Model in Information Warfare
title_full_unstemmed The Research of Information Security Model in Information Warfare
title_sort research of information security model in information warfare
publishDate 2002
url http://ndltd.ncl.edu.tw/handle/32233180138726684863
work_keys_str_mv AT chiochenhong theresearchofinformationsecuritymodelininformationwarfare
AT qiūzhènghóng theresearchofinformationsecuritymodelininformationwarfare
AT chiochenhong zīxùnzhànzhōngzīxùnjiāmìmóshìzhīyánjiū
AT qiūzhènghóng zīxùnzhànzhōngzīxùnjiāmìmóshìzhīyánjiū
AT chiochenhong researchofinformationsecuritymodelininformationwarfare
AT qiūzhènghóng researchofinformationsecuritymodelininformationwarfare
_version_ 1716827731844399104