On Authentication Protocols for Communication Networks

碩士 === 國立中正大學 === 資訊工程所 === 93 === In recent years, Internet has played a more and more important role in our daily life. Now, we can do lots of activities, which used to be done with great efforts in some particular places far away, right at home with ease. However, a lot of security and privacy is...

Full description

Bibliographic Details
Main Authors: Chia-Lin Kao, 高嘉璘
Other Authors: none
Format: Others
Language:en_US
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/58307576193767028614
Description
Summary:碩士 === 國立中正大學 === 資訊工程所 === 93 === In recent years, Internet has played a more and more important role in our daily life. Now, we can do lots of activities, which used to be done with great efforts in some particular places far away, right at home with ease. However, a lot of security and privacy issues arise every minute when we are enjoying the convenience the Internet has brought us. Generally speaking, the service on the Internet has to satisfy four security requirements, they are confidentiality, authentication, integrity, and non-repudiation. Thus, we proposed some protocols satisfy those requirements. In this thesis we proposed a mutual authentication, however, the receiver cannot prove the source of the message to the third party. When the receiver wants to prove that the received message is indeed sent from the sender to the third party, the sender can refuse the message is sent from himself/herself. This protocol not only has the authentication property, but also has deniable property. Due to the above properties, the deniable authentication protocol is suitable for electronic anonymous voting systems. Besides, we have examined an attack on an password authentication scheme and showed that the attack cannot work. Finally, we proposed an anonymity authentication protocol for GSM and improved the drawbacks in the existing authentication protocol and the efficiency is better than that of other related works.