ASIA unversity:Item 310904400/10661
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 94286/110023 (86%)
造访人次 : 21661306      在线人数 : 509
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    ASIA unversity > 資訊學院 > 資訊工程學系 > 博碩士論文 >  Item 310904400/10661


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://asiair.asia.edu.tw/ir/handle/310904400/10661


    题名: An Efficient E-mail Protocol Using Elliptic Curve Cryptography
    作者: Shang-Yu Hsu
    贡献者: Department of Computer Science and Information Engineering
    关键词: Electronic mail (e-mail);elliptic curve cryptography (ECC);Perfect forward secrecy
    日期: 2010
    上传时间: 2010-11-04 08:16:22 (UTC+0)
    出版者: Asia University
    摘要: Electronic mail (e-mail) is one of the most important and widely used network applications. It has been used in communications between individuals, business organizations and governmental agencies around the world. In 2006, Kim et al. proposed two e-mail protocols with perfect forward secrecy. Unfortunately, Yoon and Yoo recently demonstrated that Kim et al.’s second e-mail protocol is insecure under two impersonation attacks, where an attacker can easily impersonate a legal sender in order to send a forged e-mail to a recipient, or and attacker can easily impersonate a legal e-mail server to get all e-mail content sent from senders to recipients.
    However, Yoon and Yoo didn’t propose the improved version for the impersonation attacks. For this reason, the first goal of the thesis is to propose a secure e-mail protocol, which not only can remedy the weakness came from the impersonation attacks, but also can provide the additional functionality by attaching the time-stamp issued by the Time-Stamping Service (TSS). Hence, some time-sensitive e-mail content, typically for e-commerce, intellectual property protection, and records integrity, all benefit from the time-stamping service. In additions, some possible attacks, i.e. delay or replay, can also be eliminated.
    With the rapid development of communication technologies, mobile communication environments are pervasive. Major e-mail providers, such as Gmail, Yahoo, currently provide mobile e-mail services. However, mobile devices are not equipped with sufficient resources to handle the expensive computations required for exploiting PKI. Furthermore, there has been growing interest in executing web-applications on resource-constrained mobile devices via browser-based interface. Therefore, it is necessary to design an efficient and secure e-mail system for mobile applications. According to the point, the second goal of the thesis is to design an efficient e-mail protocol with elliptic curve cryptography (ECC).
    From the viewpoint of the security, these two e-mail systems proposed in this thesis not only can provide perfect forward secrecy but also can withstand variety of well-known attacks. Besides, some basic security requirements, such as non-repudiation, confidentiality, integrity, and authentication, can also be guaranteed. In this way, this model can be put on many deployed popular mobile e-mail services directly. Thus, we thought that this project is important and ought to be examined.
    显示于类别:[資訊工程學系] 博碩士論文

    文件中的档案:

    档案 大小格式浏览次数
    0KbUnknown172检视/开启


    在ASIAIR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈