Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/141840
|
Title: | 透過電信門號認證自然人以進行數位簽章之研究 Study on Phone Number based Natural Person Authentication in Digital Signature |
Authors: | 蔡孟修 Tsai, Meng-Hsiu |
Contributors: | 張宏慶 Jang, Hung-Chin 蔡孟修 Tsai, Meng-Hsiu |
Keywords: | 數位簽章 橢圓曲線數位簽章算法 遠端使用者撥入驗證服務 Digital signature ECDSA RADIUS |
Date: | 2022 |
Issue Date: | 2022-09-02 15:47:38 (UTC+8) |
Abstract: | 流程數位化有很多實現方式,其中數位簽章就是一個典型的例子,數位簽章可以取代實體簽核流程降低紙本使用,好處可降低運輸與交付時間成本,且有助於保護我們的環境;此外,透過帳密登入識別使用者,有可能遭到破解,如再搭配社交等網站透露個人資料或使用者習慣,將會增加帳號密碼遭盜用或外洩等風險,建立一套安全的使用者識別方式,也是本文進行探討與研究的主要目的。 橢圓曲線密碼學(Elliptic Curve Cryptography,ECC)主要優勢可以透過較小的密鑰長度提供相當等級的安全性,並可有效降低儲存空間,故選用橢圓曲線數位簽章算法(Elliptic Curve Digital Signature Algorithm,ECDSA) 作為本次數位簽章實驗之研究。另外對於使用者識別方式將採用電信門號認證方式,透過遠端使用者撥入驗證服務(Remote Authentication Dial In User Service, RADIUS)完善自然人認證識別,應可有效降低使用者帳密遭駭之風險。 There are many ways to digitize processes, of which digital signatures are a typical example. Digital signatures can replace the physical signature process and reduce paper use. The benefits can reduce the cost of transportation and delivery time and help protect our environment; in addition, to identify users through account password login, it may be cracked. Using social networking sites to disclose personal information or user habits will increase the risk of account password theft or leakage. Establish a set of secure user identification. The main advantage of Elliptic Curve Cryptography (ECC) is that it can provide a considerable level of security through a smaller key length and can effectively reduce storage space. Therefore, the Elliptic Curve Digital Signature Algorithm (Elliptic Curve Digital Signature Algorithm, ECDSA) is selected as a study on the application of digital signatures. In addition, the user identification method will use the mobile phone number authentication method and improve the natural person authentication and identification through the Remote Authentication Dial In User Service (Remote Authentication Dial In User Service, RADIUS) which should effectively reduce the risk of user account password hacking. |
Reference: | [1] S. I. Adam and S. Andolo, "A New PHP Web Application Development Framework Based on MVC Architectural Pattern and Ajax Technology," 2019 1st International Conference on Cybernetics and Intelligent System (ICORIS), 2019, pp. 45-50, doi: 10.1109/ICORIS.2019.8874912. [2] X. Cui, C. Li, Y. Qin and Y. Ding, "A Password Strength Evaluation Algorithm Based on Sensitive Personal Information," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1542-1545, doi: 10.1109/TrustCom50675.2020.00211. [3] J. Feng, "Design and Implementation of RADIUS Client Based on Finite State Machine," 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009, pp. 435-438, doi: 10.1109/PACCS.2009.53. [4] S. Fugees and P. Sanchol, "Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing," 2021 13th International Conference on Knowledge and Smart Technology(KST), 021, pp. 78-83, doi: 10.1109/KST51265.2021.9415816. [5] Y. Genç and E. Afacan, "Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)," 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-6, doi: 10.1109/IEMTRONICS52119.2021.9422589. [6] E. Husni, "Digital signing using national identity as a mobile ID," 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), 2016, pp. 261-264, doi: 10.1109/ISITIA.2016.7828668. [7] D. Johnson, A. Menezes and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)", International journal of information security, pp. 36-63, 2001. [8] J. J. Rodriguez, M. F. Zibran and F. Z. Eishita, "Finding the Middle Ground: Measuring Passwords for Security and Memorability," 2022 IEEE/ACIS 20th International Conference on Software Engineering Research, Management and Applications (SERA), 2022, pp. 77-82, doi: 10.1109/SERA54885.2022.9806772. [9] S. Ji, S. Yang, X. Hu, W. Han, Z. Li and R. Beyah, "Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords," in IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 5, pp. 550-564, 1 Sept.-Oct. 2017, doi: 10.1109/TDSC.2015.2481884. [10] S.Ji,S.Yang, A. Das, X. Hu and R. Beyah, "Password correlation: Quantification, evaluation and application," IEEE INFOCOM 2017 - IEEE Conference on Computer Communications,2017,pp.1-9,doi: 10.1109/INFOCOM.2017.8057067. [11] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of computation, vol. 48, no. 177, pp. 203-209, 1987. [12] Y. Li, H. Wang and K. Sun, "A study of personal information in human-chosen passwords and its security implications," IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, 2016, pp. 1-9, doi: 10.1109/INFOCOM.2016.7524583. [13] V. S. Miller, "Use of elliptic curves in cryptography", Conference on the theory and application of cryptographic techniques, pp. 417-426, 1985. [14] D. L. Moise and K. Wong, "Extracting Facts from Perl Code," 2006 13th Working Conference on Reverse Engineering, 2006, pp. 243-252, doi: 10.1109/WCRE.2006.28. [15] I. Mannuela, J. Putri, Michael and M. S. Anggreainy, "Level of Password Vulnerability," 2021 1st International Conference on Computer Science and Artificial Intelligence (ICCSAI), 2021, pp. 351-354, doi: 10.1109/ICCSAI53272.2021.9609778. [16] N. Nayyar and S. Arora, "Paperless Technology – A Solution to Global Warming," 2019 2nd International Conference on Power Energy, Environment and Intelligent Control (PEEIC), 2019, pp. 486-488, doi: 10.1109/PEEIC47157.2019.8976599. [17] C. Rigney、A. Rubens、W. Simpson、S. Willens。RFC 2865:Remote Authentication Dial In User Service (RADIUS)。http://www.ietf.org/rfc/rfc2865。 [18] C. Rigney。RFC 2866: RADIUS Accounting. http://www.ietf.org/rfc/rfc2866。 [19] C. Rigney、W. Willats、P. Calhoun。RFC 2869:RADIUS Extensions。http://www.ietf.org/rfc/rfc2869。 [20] E. Rahmawati et al., "Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone," 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017, pp. 234-238, doi: 10.1109/ELECSYM.2017.8240409. [21] M. R. Perbawa, D. I. Afryansyah and R. F. Sari, "Comparison of ECDSA and RSA signature scheme on NLSR performance," 2017 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), 2017, pp. 7-11, doi: 10.1109/APWiMob.2017.8284007. [22] Joseph H. Silverman, The Arithmetic of Elliptic Curves, 2009. [23] Y. Shang, "Efficient and Secure Algorithm: The Application and Improvement of ECDSA," 2022 International Conference on Big Data, Information and Computer Network (BDICN), 2022, pp. 182-188, doi: 10.1109/BDICN55575.2022.00043. [24] D. Toradmalle, R. Singh, H. Shastri, N. Naik and V. Panchidi, "Prominence Of ECDSA Over RSA Digital Signature Algorithm," 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018, pp. 253-257, doi: 10.1109/I-SMAC.2018.8653689. [25] J. VenkataGiri and A. Murty, "Elliptical Curve Cryptography Design Principles," 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), 2021, pp. 889-893, doi: 10.1109/RTEICT52294.2021.9573662. [26] L. Xiaosong and C. A. Jahanzaib, "An Empirical Study of Three PHP Frameworks", International Conference on Systems and Informatics, 2017. [27] 3GPP ,“ TS 29.061 version 13.4.0 Release 13,”2016. [28] 林秋輝,” 5G行動通訊網路安全:認證安全機制淺談”,第14卷第5期,2020. [Online]. Available: https://nccnews.com.tw/202010/ch4.html. [29] “2022年第1季行動通訊市場統計資訊”,ncc.gov.tw. [Online]. Available: https://www.ncc.gov.tw/chinese/news_detail.aspx?site_content_sn=3773&sn_f=47688. |
Description: | 碩士 國立政治大學 資訊科學系碩士在職專班 109971018 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0109971018 |
Data Type: | thesis |
DOI: | 10.6814/NCCU202201365 |
Appears in Collections: | [資訊科學系碩士在職專班] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
101801.pdf | | 3836Kb | Adobe PDF2 | 0 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|