Secure Communication Schemes in Network Environments
博士 === 國立中正大學 === 資訊工程研究所 === 99 === With the development of network technologies, network communications have become a part for many people’s daily lives. Either wired or wireless networks have become the most popular medium for data transmission and communications. People enjoy the use of many a...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/80024557838734009934 |
id |
ndltd-TW-099CCU00392002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099CCU003920022015-10-13T18:59:26Z http://ndltd.ncl.edu.tw/handle/80024557838734009934 Secure Communication Schemes in Network Environments 網路環境中通訊安全技術之研究 Lee, Chia-Yin 李佳穎 博士 國立中正大學 資訊工程研究所 99 With the development of network technologies, network communications have become a part for many people’s daily lives. Either wired or wireless networks have become the most popular medium for data transmission and communications. People enjoy the use of many applications in network environments, such as Internet commerce, electronic mail (E-mail), and voice over IP (VoIP). Since there is no face-to-face interaction between people who are using networks, providing secure communications in which they can authenticate each other with confidence and in which others can be prevented from eavesdropping on or tampering with transmitted data is a very challenging task. It is well known that user authentication and data confidentiality are the two most important issues for secure communications. To achieve the objectives of authentication and confidentiality, the scope of my thesis is focused on the following research topics: (1) developing secure and efficient authenticated key agreement schemes; (2) developing solutions to protect the privacy of remote users; (3) developing user-friendly log-in mechanisms for different service providers; (4) developing a scheme to provide anonymous roaming in the global mobility network (GLOMONET); and (5) developing secure E-mail protocols for mobile devices. In this thesis, we analyze common security requirements for various applications and investigate related works in the current literature. We propose several mutual authentication protocols with session key establishment. These protocols can verify the legitimacy of the communicating parties and protect the confidentiality of transmitted data. In addition, we propose a secure E-mail protocol with perfect forward secrecy for mobile devices. Most of our proposed authentication schemes use low cost functions, such as one-way hash functions and exclusive-OR operators, to decrease the client’s computational cost. Also, instead of using time-synchronized mechanisms, our proposed schemes use random nonces to simply their implementation. Therefore, our schemes can be implemented easily in various network environments, reducing the overhead associated with the construction of the systems. Chang, Chin-Chen 張真誠 2010 學位論文 ; thesis 120 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
博士 === 國立中正大學 === 資訊工程研究所 === 99 === With the development of network technologies, network communications have become a part for many people’s daily lives. Either wired or wireless networks have become the most popular medium for data transmission and communications. People enjoy the use of many applications in network environments, such as Internet commerce, electronic mail (E-mail), and voice over IP (VoIP). Since there is no face-to-face interaction between people who are using networks, providing secure communications in which they can authenticate each other with confidence and in which others can be prevented from eavesdropping on or tampering with transmitted data is a very challenging task.
It is well known that user authentication and data confidentiality are the two most important issues for secure communications. To achieve the objectives of authentication and confidentiality, the scope of my thesis is focused on the following research topics: (1) developing secure and efficient authenticated key agreement schemes; (2) developing solutions to protect the privacy of remote users; (3) developing user-friendly log-in mechanisms for different service providers; (4) developing a scheme to provide anonymous roaming in the global mobility network (GLOMONET); and (5) developing secure E-mail protocols for mobile devices.
In this thesis, we analyze common security requirements for various applications and investigate related works in the current literature. We propose several mutual authentication protocols with session key establishment. These protocols can verify the legitimacy of the communicating parties and protect the confidentiality of transmitted data. In addition, we propose a secure E-mail protocol with perfect forward secrecy for mobile devices. Most of our proposed authentication schemes use low cost functions, such as one-way hash functions and exclusive-OR operators, to decrease the client’s computational cost. Also, instead of using time-synchronized mechanisms, our proposed schemes use random nonces to simply their implementation. Therefore, our schemes can be implemented easily in various network environments, reducing the overhead associated with the construction of the systems.
|
author2 |
Chang, Chin-Chen |
author_facet |
Chang, Chin-Chen Lee, Chia-Yin 李佳穎 |
author |
Lee, Chia-Yin 李佳穎 |
spellingShingle |
Lee, Chia-Yin 李佳穎 Secure Communication Schemes in Network Environments |
author_sort |
Lee, Chia-Yin |
title |
Secure Communication Schemes in Network Environments |
title_short |
Secure Communication Schemes in Network Environments |
title_full |
Secure Communication Schemes in Network Environments |
title_fullStr |
Secure Communication Schemes in Network Environments |
title_full_unstemmed |
Secure Communication Schemes in Network Environments |
title_sort |
secure communication schemes in network environments |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/80024557838734009934 |
work_keys_str_mv |
AT leechiayin securecommunicationschemesinnetworkenvironments AT lǐjiāyǐng securecommunicationschemesinnetworkenvironments AT leechiayin wǎnglùhuánjìngzhōngtōngxùnānquánjìshùzhīyánjiū AT lǐjiāyǐng wǎnglùhuánjìngzhōngtōngxùnānquánjìshùzhīyánjiū |
_version_ |
1718039967958040576 |