:::

詳目顯示

回上一頁
題名:研究建置國軍網路安全認證中心
書刊名:黃埔學報
作者:程凱程家妤陳啟南戴鑑廷
作者(外文):Chain, KaiCheng, Ga-yuChen, Chi-nanTai, Chien-ting
出版日期:2012
卷期:63
頁次:頁299-307
主題關鍵詞:資訊安全密碼學公開金鑰基礎建設認證中心Information securityCryptographyPublic key infrastructureCertification authority
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:22
通訊安全在國防上特別重要,倘若儲存在電腦或在網路傳播之機密因安全措施之不 足或不當,而導致曝光或者系統遭人入侵,造成的危害可能不只是一個軍事單位,而是 整體的國家安全。因此,如何確保各軍事單位電腦網路的安全,避免遭受攻擊與破壞, 乃是當前最優先且須立即努力完成的重要工作。 本研究在我國公開公開金鑰基礎建設下,配合國軍之網路環境,設計一適合之認證 中心,以利將來提供必要的資訊安全服務,保護其通訊的安全。所設計之系統包括認證 中心建置、金鑰和憑證產生、秘密金鑰加解密模組、數位簽章模組、目錄伺服器查詢、 新增、更改與刪除等應用軟體。本研究期望能使能透過應用程式介面,支援各系統所需 的安全模組與安全協定,能為我國國防之網路安全做出貢獻。
Communication security is particularly important for national defense. If the secret which is stored in the computer or in a network is spread due to the improper or lack of security measures, and cause the system to be exposure or invaded, the harm may not be only inside the military unit, but also the overall national security. Therefore, how to ensure the security of the computer network of the various military units and to avoid the attack and destruction is currently the most important work that should be done with the highest priority and immediate efforts. This study is designed an appropriate certification authority under the public key infrastructure and with the army network environment, and to provide the necessary information security services, and also to protect the security of their communications. The design of the system includes the construction of certification authority, generations of keys and certificates, encryption and decryption modules of secret keys, digital signature module, directory server query, also add, change and delete the applications software. This study attempts to contribute to the national defense through network security, and the application interface to support the security module and security agreements that the system required.
期刊論文
1.W. Diffie、M. Hellman(1976)。New direction in cryptography。IEEE Transaction in Information Theory,22,644-654。  new window
2.B. Clifford Neuman、Theodore Ts’o, Kerberos(1994)。An Authentication Service for Computer Networks。IEEE Communications,32(9),33-38。  new window
3.Rivest, R.、Shamir, A.、Adleman, L.(1978)。A Method for Obtaining Digital Signatures and Public-key Cryptosystems。Communications of the ACM,21(2),120-126。  new window
圖書
1.鄧安文(2006)。密碼學-加密演算法與密碼分析計算實驗。全華科技圖書股份有限公司。  延伸查詢new window
2.林祝興、黃志雄(2011)。資訊安全實務-數位憑證技術與應用。全華科技圖書股份有限公司。  延伸查詢new window
3.鍾慶豐(2005)。近代密碼學與其應用。儒林圖書公司。  延伸查詢new window
4.Stallings, W.(1998)。Cryptography and Network Security: Principle and Practice。Prentice Hall。  new window
5.賴溪松、張真誠、韓亮(2003)。近代密碼學及其應用。臺北:松崗圖書公司:旗標出版股份有限公司。  延伸查詢new window
其他
1.(1995)。ISO/IEC 9594-8, Information Technology – Open Systems Interconnection – The Directory: Overview of concepts, models, and service,Switzerland:International Organization for Standardization。  new window
2.(1993)。ITU-T Rec. X.509, The Directory – Authentication framework,Switzerland:International Telecommunication Union。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE