Dissertation > Excellent graduate degree dissertation topics show

Forward-secure encryption technology

Author: LiChengBang
Tutor: XuChunXiang
School: University of Electronic Science and Technology
Course: Information Security
Keywords: Key compromise Forward Security Digital signature Public Key Cryptography Group key exchange
CLC: TN918.2
Type: Master's thesis
Year: 2011
Downloads: 81
Quote: 0
Read: Download Dissertation


Since cryptographic operations (such as: encryption or signature, etc.) is usually performed on a number of unsafe equipment, once the attacker mastered these unsafe equipment, key compromise will be inevitable. The key cryptosystem security leak means a complete loss. In order to reduce the threat posed by key compromise, Anderson1997 was made prior to the security concept. Forward secure cryptosystem, the user's private key is the time period with regular updates with one-way function. A certain period of time will not divulge private key to an attacker compromise the system the time period before the security capabilities. In this paper, forward secure encryption technology research achieved the following results: 1. Propose forward-secure encryption schemes construct a general method. This method can be any of the standard public-key encryption schemes are constructed. The encryption and decryption efficiency as the standard solution. (2) proposed a new key update method. This key update method is an inverse problem as intractable problem, although the difficulty of this intractable problem than the difficulty of the discrete logarithm problem is low, but the analysis also found a higher than solving the discrete logarithm problem a more efficient way to solve this difficult problem. 3 key update method will be presented separately and ElGamal encryption scheme and Cramer-Shoup encryption scheme combined got two forward-secure public key encryption scheme: FS-CPA-PKE scheme and FS-CCA2-PKE scheme. FS-CPA-PKE scheme is a heuristic forward secure encryption scheme with chosen-plaintext attack security. FS-CCA2-PKE scheme with adaptive chosen ciphertext attack security, and its public and private key length, encryption and decryption of the ciphertext length and the efficiency of the existing standard public key encryption scheme (such as RSA-OAEP, Cramer-Shoup and other public encryption scheme) considerably, so FS-CCA2-PKE program is a safe and efficient forward-secure public-key encryption scheme. 4. Propose a certificate-based chain of forward-secure digital signature scheme. The program can be seen as a process of constructing a standard digital signature into a secure digital signature prior to the general method. This method has the public and private key length is fixed, the signature verification algorithm with characteristics of high efficiency, a higher significance. 5 key update method will be presented with the Schnorr signature scheme combined to give FS-Sign-2 program. FS-Sign-2 program with anti-adaptive chosen message attack security, but also has a forward security, with the existing forward-secure digital signature scheme compared to a higher advantage, while with standard digital signature (eg: DSS, RSA-PPS, Schnorr and other digital signature scheme) compared to both the public and private key length, length of the signature, or the signature verification and efficiency are roughly equal. 6 proposes two forward-secure group key exchange protocol, which is dynamic, can resist the attacker's initiative to attack, but also has a very high efficiency, with provable security.

Related Dissertations

  1. Subliminal Channel in Multisignature,TN918.1
  2. Study on System of Electronic Documetnt Security Signature,TN918.2
  3. The Design and Implementation of Student Information Management System Based on Workflow,TP311.52
  4. Analysis and improvement of several e-cash payment scheme,TP393.08
  5. Research and Application of digital signature system based on smart cards,TP393.08
  6. Research on the Security in Wireless Sensor Network,TN915.08
  7. Mobile terminal identity digital signature scheme based on research,TN918.1
  8. Identity-based NVD remote key system design and implementation,TN918.2
  9. Drug Safety Supervision System Research and Implementation,F203
  10. Research and Implementation of Electronic Signature Based on USBKey System,TP309
  11. Design and Application of Electronic Payment Protocol in Electronic Commerce,TP393.08
  12. Design of a Safety Management System and the Implement of Security Strategy,TP393.08
  13. Design and Implementation of E-Document Transfers System Base on PKI,TP393.08
  14. Blind Signature Design and Its Application in Electronic Business,F713.36
  15. Design and Implementation of Electronic Seal System Based on Improved Algorithm of MD5,TN918.1
  16. Analysis and improvement of proxy blind signature scheme,TN918.1
  17. Research and Implement of Mobile Payment Security System Based on ECC Composite Encryption,TN918.1
  18. Study on the Softare of Remote Forest Resources Asset Evaluation and It’s Development,S757
  19. Design and Realization of Security Email System Based on PKI and USBKEY Technology,TP393.098
  20. The Office Automation Work System Key Technologies Based on the ASP.NET the Research,TP317.1

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Password, machine
© 2012 www.DissertationTopic.Net  Mobile