节点文献

基于椭圆曲线密码体制的密钥管理方法研究

Research of Key Management Method Based on Elliptic Curve Cryptosystem

【作者】 孙佳思

【导师】 斯勤夫;

【作者基本信息】 内蒙古大学 , 计算机软件与理论, 2011, 硕士

【摘要】 信息经济时代网络与信息安全的重要性日趋增强,因此,保护信息的安全就成了信息时代的迫切要求。密码学的原则要求密码系统的保密性不依赖加密体制或算法的保密,而依赖于密钥的保密。密钥管理是密码技术的重要组成部分,它要求密码系统应具有良好的密钥分配和管理措施。密钥管理不仅影响密码系统的安全性,而且涉及到应用密码的系统的可靠性、有效性和安全性。密码学发展至今,密钥管理始终是一个不断出现新问题和挑战的复杂课题。本文首先总结了分级系统结构上密钥管理方案的发展现状,.给出了经典的分级密钥管理方案的描述,并对其进行了安全性分析,给出了该方案的优点和存在的缺点,并针对Jeng-Wang(2006)方案和Chung-Lee(2008)方案提出可能存在的一种在多项式时间内求根攻击状况。本文基于椭圆曲线密码体制和单向散列函数提出一种新的密钥管理方法,更好的解决动态访问控制下的密钥管理问题。本文提出的密钥管理方法中,基于用户等级权限,构造了一个函数,使得当系统中等级关系结构发生临时变更时,代理职责人能够既保证原有应用系统的安全性,又能够很好的处理职责所在。

【Abstract】 In the information economy of society, network and information security becomes increasingly important, so it is an urgent requirement that information security is protected for the information age. The principle of cryptography requires that the security of cryptographic system does not rely on the confidentiality of cryptosystem or algorithm, but relies on secret keys. Key management which is an important part of cryptography requires that the cryptographic system contain good measures about key distribution and key management. Not only key management system affects the security of the cryptographic system, but also affects the reliability, effectiveness and safety of the application system. So far, key management remains a continuous emergence of new problems and challenges of complex issues.This paper summarizes the development status of key management system in the hierarchical system structure, and describes the classic hierarchical key management scheme and analyzes its security, and gives its advantages and shortcomings, and proposes a possible Roots Attack in the polynomial time for Jeng-Wang’s scheme and Chung-Lee’s scheme. Based on the Elliptic Curve Cryptography and One-way Hash Function, a new key management method which better handle key management issues under the dynamic access control is proposed, which construct a function using user level permission, in which once the hierarchical relationship structure in the hierarchical system structure to be changed, agent user can guarantee the security of applications system, and deal well responsibilities.

  • 【网络出版投稿人】 内蒙古大学
  • 【网络出版年期】2011年 10期
  • 【分类号】TN918.1
  • 【下载频次】68
节点文献中: 

本文链接的文献网络图示:

本文的引文网络