進階搜尋


下載電子全文  
系統識別號 U0026-1105201515342100
論文名稱(中文) 植基於混沌映射的認證機制
論文名稱(英文) Authentication Mechanisms Based on Chaotic Maps
校院名稱 成功大學
系所名稱(中) 電腦與通信工程研究所
系所名稱(英) Institute of Computer & Communication
學年度 103
學期 2
出版年 104
研究生(中文) 程 凱
研究生(英文) Kai Chain
學號 Q38971221
學位類別 博士
語文別 英文
論文頁數 65頁
口試委員 指導教授-楊家輝
口試委員-楊國隆
口試委員-楊竹星
口試委員-何宗易
口試委員-洪國禎
口試委員-張桂琥
中文關鍵字 認證協定  金鑰交換  混沌映射  零知識協議  智慧卡 
英文關鍵字 Authentication protocol  Key exchange  Chaotic maps  Zero knowledge proofs  Smart card 
學科別分類
中文摘要 「認證協定」與「金鑰交換機制」在現今網際網路的應用上是相當重要的研究議題。藉由認證的程序,以保障許多實體使用者或伺服器身份的正確性及安全性。雖這議題有許多豐盛的研究成果,但是許多的方法只在單一的議題上作研究,也有不少方法是在安全性上出了問題,使得這些方法仍有很多的改進空間。自1987年零知識證明的觀念非常適合網路系統發展時應用於辨認與簽署,提出後被廣泛的應用,但是一般所提出的方法多為未經認證的伺服器,因此,須利用不同的會談金鑰來加密有關的訊息。
「智慧卡」也正盛行於商業與電腦網路通訊應用上,因此,如何利用密碼學之技術與智慧卡結合,發展一套有效且精確地適用於伺服器確認使用者身分的方法,確實有其必要性。
混沌映射的技術,在最近幾年來也是被應用於通信協議及密鑰協商中,成為一種新的加密技術。因此,本論文利用零知識證明與混沌映射的特性,提出一個具有金鑰交換功能的認證協定,及利用混沌映射的特性,提出一個新的智慧卡遠端登入確認技術,並將這項研究與其他相關研究做比較,且得到較高的安全性,並使用BAN-Logic來證明這個協定及架構的安全性,以達到實用性的目的。
英文摘要 Authentication protocols and key exchange schemes are major research techniques of entity identification of users or servers for improvement of accuracy and security in internet applications, which need to be safeguarded by various types of verification processes. However, most researches mainly focus on single issue, which could induce the security problem. Thus there still exist possibilities for further improvements. Since 1987, the concept of zero knowledge proofs has been widely used for signing networks. However, its related common identification methods are only good for an individual user. For current increasingly complex networks, which are connected through many unidentified servers, as a result, we have to encrypt the message by adopting different kinds of session keys.
Smart cards are very popular for commerce and computer network communication applications. Therefore, developing a method that combines smart cards and the technology of cryptography so that the servers can effectively and accurately recognize the identity of each user is a necessity.
The technique of chaotic maps, which can be treated as a new encryption technology, is also widely adopted in communication protocols and key agreements for recent years. In this dissertation, we propose an enhancement authentication protocol, which includes authentication and key exchange capabilities, by taking the advantages of zero knowledge proofs and chaotic maps. In addition, we use chaotic maps to provide an innovative smart card remote authentication scheme. We compare the protocol and the proposed scheme with the other related researches to prove that it can achieve higher security. To make it even more useful, we use BAN-Logic to verify the security of the structure.
論文目次 中文摘要 I
Abstract III
誌謝 V
Contents VII
List of Tables IX
List of Figures XI
Chapter 1 Introduction 1
Chapter 2 Preliminaries 5
2.1 Zero Knowledge Proofs 5
2.2 Improved Zero Knowledge Proofs 7
2.3 Characters of Chaotic Maps 8
2.4 Chaotic Maps Problems 10
2.5 Introduction of BAN-Logic 13
Chapter 3 Authentication Protocol Using Zero Knowledge Proofs and Chaotic Maps 15
3.1 System Initialization Stage 15
3.2 Unilateral Authentication Protocol with Key Exchange Capability 16
3.3 Mutual Authentication Protocol with Key Exchange Capability 19
3.4 Practical Applications 23
3.5 Applying BAN-Logic for Verification 29
3.6 Security and Functionality Analyses 32
3.6.1 Security analysis 32
3.6.2 Security and functionality comparison 35
Chapter 4 Authentication Scheme Using Smart Cards Based on Chaotic Maps 37
4.1 Notations 38
4.2 Description of Each Phase 39
4.3 Applying BAN-Logic for Verification 47
4.4 Security and Computation Cost Analyses 51
4.4.1 Security analysis 51
4.4.2 Computation cost analysis and comparison 54
Chapter 5 Conclusions 57
5.1 Authentication Protocol Using Zero Knowledge Proofs and Chaotic Maps 57
5.2 Authentication Scheme Using Smart Cards Based on Chaotic Maps 58
5.3 Future Research Perspective 58
References 60
參考文獻 [1] J. Camenisch, S. Hohenberger and A. Lysyanskaya, “Compact e-cash,” in Advances in Cryptology – EUROCRYPT’05, 2005, vol. 3494, LNCS, pp. 302-321.
[2] J. Camenisch, A. Lysyanskaya and M. Meyerovich, “Endorsed e-cash,” in Proc. IEEE Symposium on Security and Privacy (S&P 2007), May 2007.
[3] J. Camenisch and A. Lysyanskaya, “A signature scheme with efficient protocols,” Lecture Notes in Computer Science, Springer-Verlag, Berlin, vol. 2576, pp. 268-289, 2003.
[4] K. Chain and W. C. Kuo, “A new digital signature scheme based on chaotic maps,” Nonlinear Dynamics, vol.74, no.4, pp. 1003-1012, 2013.
[5] D. Chaum, “Blind signatures for untraceable payments,” in Advances in Cryptology, 1983, Springer-Verlag US, pp. 199-203.
[6] G. R. Chen, Y. B. Mao and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
[7] H. Y. Chien, J. K. Jan and Y. M. Tseng, “An efficient and practical solution to remote authentication: Smart card,” Computer and Security, vol. 21, no. 4, pp. 372-375, 2002.
[8] Y. H. Chuang and Y. M. Tseng, “Towards generalized ID-based user authentication for mobile multi-server environment,” International Journal of Communication Systems, vol. 25, no. 4, pp. 447–460, 2012.
[9] F. Dachselt and W. Schwarz, “Chaos and cryptography,” IEEE Transactions on Circuits and Systems I-Regular Papers, vol. 48, no. 12, pp. 1498-1509, 2001.
[10] S. J. Deng, Y. T. Li and D. Xiao, “Analysis and improvement of a chaos-based Hash function construction,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 5, pp. 1338-1347, 2010.
[11] C. I. Fan, Y. C. Chan and Z. K. Zhang, “Robust remote authentication scheme with smart cards,” Computers and Security, vol. 24, no. 8, pp. 619-628, 2005.
[12] U. Feige, A. Fiat and A. Shamir, “Zero knowledge proofs of identity,” Journal of Cryptology, vol. 1, no. 2, pp. 77-94, 1988.
[13] A. Fiat and A. Shamir, “How to prove yourself: practical solutions to identification and signature problems,” in Advances in Cryptology---CRYPTO '86, 1987, vol. 263, LNCS, pp. 186-194.
[14] A. Fiat and A. Shamir, “Unforgivable proofs of identity,” in Proc. SECURICOM’87, 1987, pp. 147-153.
[15] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1988.
[16] M. Gohar, H. Jung and S. J. Koh, “Distributed mapping management of identifiers and locators in mobile-oriented Internet environment,” International Journal of Communication Systems, vol. 27, no. 1, pp. 95-115, 2014.
[17] S. Goldwasser, S. Micali and C. Rackoff, “The knowledge complexity of interactive proof-systems,” in Proc. Seventeenth Annual ACM Symposium on Theory of computing (STOC ’85), 1985, pp. 291–304.
[18] J. Groth, “Non-interactive zero-knowledge arguments for voting,” in Proc. ACNS ’05, 2005, vol. 3531, LNCS, pp. 467-482.
[19] C. Guo, C. C. Chang and C. Y. Sun, “Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 2, pp. 99-109, 2013.
[20] C. Guo and C. C. Chang, “Chaotic maps-based password-authenticated key agreement using smart cards,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 6, pp. 1433-1440, 2013.
[21] L. Harn and D. Huang, “A protocol for establishing secure communication channels in a large network,” IEEE Transactions on Knowledge and Data Engineering, vol. 6, no. 1, pp. 188-191, 1994.
[22] D. B. He, Y. T. Chen and J. H. Chen, “Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol,” Nonlinear Dynamics, vol. 69, no. 3, pp. 1149-1157, 2012.
[23] D. J. He, M. D. Ma, Y. Zhang, C. Chen and J. J. Bu, “A strong user authentication scheme with smart cards for wireless communications,” Computer Communications, vol. 34, no. 3, pp. 367-374, 2011.
[24] D. J. He, C. Chen, M. D. Ma, S. M. Chan and J. J. Bu, “A secure and efficient password-authenticated group key exchange protocol for mobile ad hoc networks,” International Journal of Communication Systems, vol. 26, no. 4, pp. 495–504, 2013.
[25] M. S. Hwang and W. P. Yang, “Conference key distribution schemes for secure digital mobile communications,” IEEE Journal on Selected Areas in Communications, vol. 13, no. 2, pp. 416-420, 1995.
[26] T. Hwang and W. C. Ku, “Reparable key distribution protocols for internet environments,” IEEE Transactions on Communications, vol. 43, no. 5, pp. 1947-1949, 1995.
[27] N. Ishida, S. Matsuo and W. Ogata, “Divisible voting scheme,” in Proc. 6th International Conference (ISC 2003), 2003, vol. 2851, LNCS, pp. 137-150.
[28] W. S. Juang, S. T. Chen and H. T. Liaw, “Robust and efficient password-authenticated key agreement using smart cards,” IEEE Transactions on Industrial Electronics, vol. 55, no. 6, pp. 2551-2556, 2008.
[29] L. Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Circuits and Systems Magazine, vol. 1, no. 3, pp. 6-21, 2001.
[30] W. C. Kuo, K. Chain, J. C. Cheng and J. F. Yang, “An enhanced robust and efficient password-authenticated key agreement using smart cards,” International Journal of Security and Its Applications, vol. 6, no. 2, pp. 127-132, April, 2012.
[31] W. C. Kuo and S. M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 204-207, 2004.
[32] C. S. Laih, F. K. Tu and W. C. Tai, “Remarks on the LUC public key system,” Electronics Letters, vol. 30, no. 2, pp. 123-124, 1994.
[33] C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, “An extended chaotic maps-based key agreement protocol with user anonymity,” Nonlinear Dynamics, vol. 69, no. 1-2, pp. 79-87, 2012.
[34] T. Y. Li, X. D. Liu, Z. G. Qin and X. F. Zhang, “Formal Analysis for Security of Otway-Rees Protocol with BAN Logic,” in Proc. 1st International Workshop on Database Technology and Applications, 2009, Wuhan, pp. 590-593.
[35] T. Y. Li, X. D. Liu, Z. G. Qin and X. F. Zhang, “An improved security protocol formal analysis with BAN logic,” in Proc. International Conference on Electronic Commerce and Business Intelligence, 2009, pp. 102-105.
[36] X. X. Li, W. D. Qiu, D. Zheng, K. F. Chen and J. H. Li, “Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards,” IEEE Transactions on Industrial Electronics, vol. 57, no. 2, pp. 793-800, 2010.
[37]J. C. Mason and D. C. Handscomb, “Chebyshev polynomials,” Chapman & Hall/CRC, Boca Raton, Florida, 2003.
[38] R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers,” Communications on The ACM, vol. 21, no. 12, pp. 993-999, 1978.
[39] L. M. Pecora and T. L. Carroll, “Synchronization in chaotic systems,” Physical Review Letters, vol. 64, no. 8, pp. 821-824, 1990.
[40] L. M. Pecora and T. L. Carroll, “Driving systems with chaotic signals,” Physical Review A, vol. 44, no. 4, pp. 2374-2383, 1991.
[41] A. D. Santis, G. D. Crescenzo and G. Persiano, “Secret sharing and perfect zero knowledge,” in Advances in Cryptology: CRYPTO’93, 1993, Springer-Verlag, pp. 73-84.
[42] C. P. Schnorr, “Efficient signature generation by smart cards,” Journal of Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
[43] L. J. Sheu, “A speech encryption using fractional chaotic systems,” Nonlinear Dynamics, vol. 65, no. 1-2, pp. 103-108, 2011.
[44] G. J. Simmons, “Contemporary Cryptology: The Science of Information Integrity,” IEEE, Inc., New York, 1992.
[45] R. G. Song, “Advanced smart card based password authentication protocol,” Computer Standards & Interfaces, vol. 32, no. 5-6, pp. 321-325, 2010.
[46] H. B. Tang and X. S. Liu, “Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme,” International Journal of Communication Systems, vol. 25, no. 12, pp. 1639–1644, 2012.
[47] H. R. Tseng and E. Jou, “An efficient anonymous key agreement protocol based on chaotic maps,” in Proc. IEEE International Conference on High Performance Computing and Communications, 2011, pp. 752-757.
[48] X. Y. Wang, L. Yang, R. Liu and A. Kadir, “A chaotic image encryption algorithm based on perceptron model,” Nonlinear Dynamics, vol. 62, no. 3, pp. 615-621, 2010.
[49] X. Y. Wang, X. J. Wang, J. F. Zhao and Z. F .Zhang, “Chaotic encryption algorithm based on alternant of stream cipher and block cipher,” Nonlinear Dynamics, vol. 63, no. 4, pp. 587-597, 2011.
[50] K. W. Wong, “A fast chaotic cryptographic scheme with dynamic look up table,” Physics Letters A, vol. 298, no. 4, pp. 238-242, 2002.
[51] D. Xiao, X. F. Liao and S. J. Deng, “One-way hash function construction based on the chaotic map with changeable parameter,” Chaos Solitons & Fractals, vol. 24, no. 1, pp. 65-71, 2005.
[52] D. Xiao, F. Y. Shih and X. F. Liao, “A chaos-based hash function with both modification detection and localization capabilities,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2254-2261, 2010.
[53] Q. Xie, “A new authenticated key agreement for session initiation protocol,” International Journal of Communication Systems, vol. 25, no. 1, pp. 47–54, 2012.
[54] J. Xu, W. T. Zhu and D. G. Feng, “An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks,” Journal of Computer Communications, vol. 34, no. 3, pp. 319-325, 2011.
[55] L. H. Zhang, “Cryptanalysis of the public key encryption based on multiple chaotic systems,” Chaos Solitons & Fractals, vol. 37, no. 3, pp. 669-674, 2008.
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2015-05-18起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2016-05-18起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw