Font Size: a A A

Design And Analysis Of Several Security Protocols

Posted on:2007-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y CuiFull Text:PDF
GTID:2178360212975707Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The research of Security Protocol has been going on about 20 years; furthermore, it has been developed to the main branch of information security field. In addition, the technology of Mobile Communication and Computer Internet break into people's daily life so that more and more people focus on the security problem. This paper analyzes the GSM, the safe payment of Mobile Electronic Commerce, and the Intranet Data Security, and also refers to solve the problem of them basing on Security Protocol.Firstly, this paper analyzes the security problem in GSM. According to the current GSM method and the proposed schemes, a new Identity Authentication Protocol is built by AES arithmetic and is analyzed by SVO logic. The new method makes up the wake points in the primary Protocol. The new one is provided with more advantages such as security. It is more efficient to implement, and it is able to keeps safe from track.Secondly, several typical Mechanisms of Micro-payment are mentioned; moreover, it also gets some characteristics from Mobile Electronic Commerce to make a Mechanism in order to apply the mechanism of safe payments. The Mechanism is analyzed formally by the SVO logic and the developed model of Kailar logic, which are the non-repudiation, accountability and fairness in new Mechanism. The five Micro-payment Mechanisms compared with Quantization, and the analysis shows that the new Mechanism has low computational complexity and uses less memory. The new method solves the problem of taxes in Micro-payment. It can protect users without the fraud and it has anonymity. Consequently, it achieves indiscriminative traffic between customers and manufacturer.Lastly, this paper shows a method that normal USB disk can carry out Two-factor Identify Authentication so as to satisfy corporations'needs. The method does not need system clock synchronization, and gets Single Sign-on. The new method is simple, efficient, and low cost. Specially, it is extremely safer than the traditional password, and gives the primary framework of the intranet data security system in corporations.
Keywords/Search Tags:Security Protocol, GSM, Mobile Electronic Commerce, Intranet Security, AES Arithmetic, One-off Signature, Two-factor Identify Authentication, Single Sign-on
PDF Full Text Request
Related items