Dissertation > Excellent graduate degree dissertation topics show

Design and Implement of a New Group-Key Exchange Protocol

Author: JinFeng
Tutor: TianYuan
School: Dalian University of Technology
Course: Software Engineering
Keywords: Group key exchange with authentication Secure channel group Anonymous Elliptic Curve Cryptography
CLC: TN918.6
Type: Master's thesis
Year: 2008
Downloads: 37
Quote: 0
Read: Download Dissertation

Abstract


The group key exchange protocol is a new generation of network environment , one of the most basic security mechanisms in the the contemporary wireless mobile / ad hoc network environment , and involves a series of new features and a new problem , more than the traditional two-party security protocols complex. Therefore, the present study was relatively small. Design a group key exchange protocol for the LAN dynamic group environment , safety analysis , and software implementation based on elliptic curve cryptography system . Firstly application Canetti 's UC theory to establish a group key exchange group ideal secure channel UC model , the model accurately portray the group secure communications should have a series of important properties . The intractability assumptions then , based on the so-called group Diffie-Hellman decisional problem , the specific construct a standard model (standard model) , the key exchange protocol suitable for dynamic group environment , the agreement is in addition to authentication and key addition to to confidentiality these basic nature , also has the / ad hoc network of wireless mobile environment often requires post - authentication and anonymous nature ( including Anonymous illegal members of Anonymous and legitimate members ) . And clearly defined the attackers the ability to emulate the aggressive behavior . The agreement also has the good characteristics of the structure according to the security nature , it is easy to cut and compromise design . This paper further functional modules based on elliptic curve public key cryptography software implementation , group key exchange protocol suitable for LAN and developed on the basis of this module . The main module comprises encryption / decryption module , a digital signature module , the resource management module and the I / O operation module . The detailed analysis of all aspects of the agreement in the various sub- protocol security , and combined with the security of elliptic curve , we can see that the agreement has a higher security . Through the analysis of experimental data shows that the protocol has a higher efficiency . And easy to expand the program design , portability , stability , etc. .

Related Dissertations

  1. On Growing Problems and Growing Factors in Dear Nobody by Adolescence Psychology,I561.074
  2. The Research and Implementation of Personalized K-anonymous Location Privacy Protection Technology Based on the Internet of Things,TP393.08
  3. Position based on personal feelings of anonymity privacy protection technologies,TP309
  4. Companies anonymous contributors Legal Issues,D922.291.91
  5. On the anonymous contributors shareholder qualification,D922.291.91
  6. Tor anonymous communication system security analysis and research,TP393.08
  7. K-anonymity data query method,TP309
  8. Study on Methods of Privacy-Preserving Multi-Stage Attack Correlation,TP311.13
  9. Research on Group Signature Scheme in Anonymous Communication System,TN918.1
  10. Traitor Tracing and Revocation Mechanisms with Privacy Preserving,TN918.1
  11. Study on the Legal System of Employee Shareholding Consignment,D922.291.91
  12. Research on Security of E-Commerce Protocols Based on UPPAAL,TP393.08
  13. Design and Analysis of Some Security Protocols Based on CPK in Trusted Computing Environment,TP309
  14. Research on the Problem of Finding Optimal Value on Quasi-Identifier for K-Anonymity Privacy Protection Model,TP309
  15. The Design and Implement of Military Anonimous Communication System Based on Tor and P2P Architecture,TP393.08
  16. Research and Implementation of Anonymous Digital Certificate Based on PKI,TP393.08
  17. Research and Implementation of Direct Anonymous Authentication Base on Goppa Codes,TP309
  18. Looking for \,I207.42
  19. Location Privacy Protection Based on Path Planning,TP309
  20. Probe into the problem of the Taiwan businessmen mainland undisclosed investment laws,D922.29
  21. Research on Re-Routing Mechanism in Anonymous Communication System,TP393.08

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Secure communication : structural principle points
© 2012 www.DissertationTopic.Net  Mobile