研究生: |
林連源 Lian-Yuan Lin |
---|---|
論文名稱: |
模糊式加解密之研究 A Study of Fuzzy-based Encryption and Decryption |
指導教授: |
莊謙本
Chuang, Chien-Pen 王宏鈴 Wang, Hong-Ling |
學位類別: |
碩士 Master |
系所名稱: |
電機工程學系 Department of Electrical Engineering |
論文出版年: | 2007 |
畢業學年度: | 95 |
語文別: | 中文 |
論文頁數: | 77 |
中文關鍵詞: | 密碼系統 、模糊加解密 |
英文關鍵詞: | cryptosystem, fuzzy-based encryption/decryption |
論文種類: | 學術論文 |
相關次數: | 點閱:167 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
現今有許多密碼系統,這些密碼系統廣泛的被使用在各個領域,如銀行的提款機、金融業的財金系統、電子交易貨幣中,各個密碼系統都有其特定的特色、優點與缺點,本論文提出的方法是將Fuzzy演算法移植至資訊安全的領域中,使用了Fuzzy集合概念、Fuzzy關係概念、Fuzzy矩陣概念發展了一套密碼系統,並與一些近代的密碼系統作些分析比較,由實驗分析的結果知道其複雜度明顯的增加,相對地也較具安全性,並且密碼系統也有不錯的效能。
Many methods of cryptography are available nowadays. They are used in several situations such as financial processing system, electronic commerce and electronic data interchange. Each has its own specific purpose and implementation algorithm. But no one is without any disadvantage even the best policy is carried on. The thesis proposed a method based on Fuzzy Theory to improve the information security by increasing the complexity of decryption for fuzzy-based encryption source data. The simulation results of security quality are better than former cryptographies as in this paper. Thus, the fuzzy-based encryption algorithm can be used in cryptosystem if needed.
[1] Feng Bao, Introducing decryption authority into PKI, Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference, pp. 288 – 296, Dec 2000
[2] G. Ateniese,“Efficient protocols for verifiable encryption of digital signatures”, Proceedings of the 6th ACM Conference on Computer and Communications Security, 1999.
[3] Ho Won Kim, Sunggu Lee, “Design and implementation of a private and public key crypto processor and its application to a security system” Consumer Electronics, IEEE Trans. Vol. 50 ,Issue 1, pp.214 – 224, Feb 2004.
[4] Kofahi, N.A., Turki Al-Somani, Khalid Al-Zamil, “Performance evaluation of three encryption/decryption algorithms”, Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium, Vol. 2, pp.790 - 793, Dec 2003.
[5] Jun Yang, Lan Gao, Youtao Zhang, “Improving memory encryption performance in secure processors” Computers, IEEE Trans. Vol. 54, Issue 5,pp. 630 - 640, May 2005.
[6] Kenvi Wang, Chien-Pen Chuang, Lian-Yuan Lin, “Integrated Security Analysis of IP VPN Based Information System,” 2006 International Conference on Information Security conference,pp. 57 – 61, Taiwan, May 2006.
[7] Kenvi Wang, Chien-Pen Chuang, Lian-Yuan Lin, “A Simulated Traffic Engineering Model of IP/MPLS Network Enhancing Multi-Service Performance,”convergence of telecommunications, networking and broadcasting , UK, June 2006
[8] 蔡政安,“高速網路動態化訊務管理策略之研究”,台灣師範大學,碩士,Jun 2001
[9] 賴溪松、張真誠、韓亮,近代密碼學及其應用,松岡電腦圖書資料有限公司,1999
[10] William Stallings,密碼學與網路安全 : 原理與實務(Cryptography and Network Security:Principles and Practice),曾志光、巫坤品,碁峯資訊股份有限公司,2004
[11] 劉尊全、劉興鋼,破譯RSA-Cracking RSA,全華科技圖書股份有限公司,2003
[12] Douglas R. Stinson,密碼學原理與實踐,馮登國,電子工業出版社,2003
[13] 張真誠,電腦密碼學與資訊安全(Computer cryptography and information security),松岡電腦圖書資料有限公司,1998
[14] 余泰興,資通安全概論,科資中心,2002
[15] 劉尊全,數位時代密碼技術的現狀與未來,松岡電腦圖書資料有限公司,2001
[16] 霍安琪,密碼學,九章出版社出版,2003
[17] 王旭正、柯宏叡、ICCL資訊密碼暨建構實驗室,密碼學與網路安全:理論、實務與應用,博碩文化有限公司,2004
[18] 鄧安文,密碼學:加密演算法,全華科技圖書股份有限公司,2004
[19] 孫宗瀛、楊英魁,Fuzzy控制:理論實作與應用,全華科技圖書股份有限公司,2005
[20] 王金標,模糊理論及其應用,文笙書局,1993
[21] 王文俊,認識Fuzzy,全華科技圖書股份有限公司,2005
[22] 陳正凱、陳錦輝,C++函式庫精華錄,金禾,2001
[23] 韓丹,擁抱Visual C++ : 新世代視窗程式設計,儒林圖書有限公司,2003