Font Size: a A A

Security Analysis And Improvement For IHO S-63 Data Protection Scheme

Posted on:2009-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhouFull Text:PDF
GTID:2178360242477098Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Traditional paper navigational chart which has been used for several years will be replaced with Electronic Navigational Chart (ENC) along with the arrival of information-based ages. International community extremely values ENC and its application systems (ECDIS etc.), International Hydrographic Organization (IHO) and related international organization make lots of specifications while ENC is rising.In order to protect ENC to avoid an unauthorized replication, to insure its source reliability and the data integrity in the meantime, IHO drew up and promulgated Data Protection Scheme (Special Publication No. 63). This scheme is based on the PRIMAR protection scheme, adopt Blowfish algorithm to encrypt, use Hash function (SHA-1) and Cyclic Redundancy Check to make sure the data integrity, and adopt DSA signature.This thesis makes an integrate analysis of IHO S-63 Data Protection Scheme firstly, lays emphasis on analysis of the participant's responsibility and authorization, also gives a particular summary on each module in this scheme. Secondly the thesis does security analysis from the data confidentiality, integrity, authentication and non-repudiation respectively.There are several improvements in the end of thesis to make the scheme more safety. Forward security digital signature improvement could reduce the impact of key leakiness: When the key leaks passively, the attacker could not forge previous period signature of information. When the key leaks actively, the Data Server and Scheme Administrator could not deny the original signature; after cell key algorithm improvement, Data Client do not need submit user permit frequently from Data Server to get cell permit, although ENC information is updated much more frequently; We could get much more random cipher text from random filling; We also makes an improvement for M_KEY issue.
Keywords/Search Tags:Electronic Navigational Chart, Blowfish, DSA, Data Integrity, Forward Security
PDF Full Text Request
Related items