English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110934/141854 (78%)
Visitors : 47816332      Online Users : 681
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/141840


    Title: 透過電信門號認證自然人以進行數位簽章之研究
    Study on Phone Number based Natural Person Authentication in Digital Signature
    Authors: 蔡孟修
    Tsai, Meng-Hsiu
    Contributors: 張宏慶
    Jang, Hung-Chin
    蔡孟修
    Tsai, Meng-Hsiu
    Keywords: 數位簽章
    橢圓曲線數位簽章算法
    遠端使用者撥入驗證服務
    Digital signature
    ECDSA
    RADIUS
    Date: 2022
    Issue Date: 2022-09-02 15:47:38 (UTC+8)
    Abstract: 流程數位化有很多實現方式,其中數位簽章就是一個典型的例子,數位簽章可以取代實體簽核流程降低紙本使用,好處可降低運輸與交付時間成本,且有助於保護我們的環境;此外,透過帳密登入識別使用者,有可能遭到破解,如再搭配社交等網站透露個人資料或使用者習慣,將會增加帳號密碼遭盜用或外洩等風險,建立一套安全的使用者識別方式,也是本文進行探討與研究的主要目的。
    橢圓曲線密碼學(Elliptic Curve Cryptography,ECC)主要優勢可以透過較小的密鑰長度提供相當等級的安全性,並可有效降低儲存空間,故選用橢圓曲線數位簽章算法(Elliptic Curve Digital Signature Algorithm,ECDSA) 作為本次數位簽章實驗之研究。另外對於使用者識別方式將採用電信門號認證方式,透過遠端使用者撥入驗證服務(Remote Authentication Dial In User Service, RADIUS)完善自然人認證識別,應可有效降低使用者帳密遭駭之風險。
    There are many ways to digitize processes, of which digital signatures are a typical example. Digital signatures can replace the physical signature process and reduce paper use. The benefits can reduce the cost of transportation and delivery time and help protect our environment; in addition, to identify users through account password login, it may be cracked. Using social networking sites to disclose personal information or user habits will increase the risk of account password theft or leakage. Establish a set of secure user identification.
    The main advantage of Elliptic Curve Cryptography (ECC) is that it can provide a considerable level of security through a smaller key length and can effectively reduce storage space. Therefore, the Elliptic Curve Digital Signature Algorithm (Elliptic Curve Digital Signature Algorithm, ECDSA) is selected as a study on the application of digital signatures. In addition, the user identification method will use the mobile phone number authentication method and improve the natural person authentication and identification through the Remote Authentication Dial In User Service (Remote Authentication Dial In User Service, RADIUS) which should effectively reduce the risk of user account password hacking.
    Reference: [1] S. I. Adam and S. Andolo, "A New PHP Web Application Development Framework Based on MVC Architectural Pattern and Ajax Technology," 2019 1st International Conference on Cybernetics and Intelligent System (ICORIS), 2019, pp. 45-50, doi: 10.1109/ICORIS.2019.8874912.
    [2] X. Cui, C. Li, Y. Qin and Y. Ding, "A Password Strength Evaluation Algorithm Based on Sensitive Personal Information," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1542-1545, doi: 10.1109/TrustCom50675.2020.00211.
    [3] J. Feng, "Design and Implementation of RADIUS Client Based on Finite State Machine," 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009, pp. 435-438, doi: 10.1109/PACCS.2009.53.
    [4] S. Fugees and P. Sanchol, "Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing," 2021 13th International Conference on Knowledge and Smart Technology(KST), 021, pp. 78-83, doi: 10.1109/KST51265.2021.9415816.
    [5] Y. Genç and E. Afacan, "Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)," 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-6, doi: 10.1109/IEMTRONICS52119.2021.9422589.
    [6] E. Husni, "Digital signing using national identity as a mobile ID," 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), 2016, pp. 261-264, doi: 10.1109/ISITIA.2016.7828668.
    [7] D. Johnson, A. Menezes and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)", International journal of information security, pp. 36-63, 2001.
    [8] J. J. Rodriguez, M. F. Zibran and F. Z. Eishita, "Finding the Middle Ground: Measuring Passwords for Security and Memorability," 2022 IEEE/ACIS 20th International Conference on Software Engineering Research, Management and Applications (SERA), 2022, pp. 77-82, doi: 10.1109/SERA54885.2022.9806772.
    [9] S. Ji, S. Yang, X. Hu, W. Han, Z. Li and R. Beyah, "Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords," in IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 5, pp. 550-564, 1 Sept.-Oct. 2017, doi: 10.1109/TDSC.2015.2481884.
    [10] S.Ji,S.Yang, A. Das, X. Hu and R. Beyah, "Password correlation: Quantification, evaluation and application," IEEE INFOCOM 2017 - IEEE Conference on Computer Communications,2017,pp.1-9,doi: 10.1109/INFOCOM.2017.8057067.
    [11] N. Koblitz, "Elliptic curve cryptosystems", Mathematics of computation, vol. 48, no. 177, pp. 203-209, 1987.
    [12] Y. Li, H. Wang and K. Sun, "A study of personal information in human-chosen passwords and its security implications," IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, 2016, pp. 1-9, doi: 10.1109/INFOCOM.2016.7524583.
    [13] V. S. Miller, "Use of elliptic curves in cryptography", Conference on the theory and application of cryptographic techniques, pp. 417-426, 1985.
    [14] D. L. Moise and K. Wong, "Extracting Facts from Perl Code," 2006 13th Working Conference on Reverse Engineering, 2006, pp. 243-252, doi: 10.1109/WCRE.2006.28.
    [15] I. Mannuela, J. Putri, Michael and M. S. Anggreainy, "Level of Password Vulnerability," 2021 1st International Conference on Computer Science and Artificial Intelligence (ICCSAI), 2021, pp. 351-354, doi: 10.1109/ICCSAI53272.2021.9609778.
    [16] N. Nayyar and S. Arora, "Paperless Technology – A Solution to Global Warming," 2019 2nd International Conference on Power Energy, Environment and Intelligent Control (PEEIC), 2019, pp. 486-488, doi: 10.1109/PEEIC47157.2019.8976599.
    [17] C. Rigney、A. Rubens、W. Simpson、S. Willens。RFC 2865:Remote Authentication Dial In User Service (RADIUS)。http://www.ietf.org/rfc/rfc2865。
    [18] C. Rigney。RFC 2866: RADIUS Accounting. http://www.ietf.org/rfc/rfc2866。
    [19] C. Rigney、W. Willats、P. Calhoun。RFC 2869:RADIUS Extensions。http://www.ietf.org/rfc/rfc2869。
    [20] E. Rahmawati et al., "Digital signature on file using biometric fingerprint with fingerprint sensor on smartphone," 2017 International Electronics Symposium on Engineering Technology and Applications (IES-ETA), 2017, pp. 234-238, doi: 10.1109/ELECSYM.2017.8240409.
    [21] M. R. Perbawa, D. I. Afryansyah and R. F. Sari, "Comparison of ECDSA and RSA signature scheme on NLSR performance," 2017 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob), 2017, pp. 7-11, doi: 10.1109/APWiMob.2017.8284007.
    [22] Joseph H. Silverman, The Arithmetic of Elliptic Curves, 2009.
    [23] Y. Shang, "Efficient and Secure Algorithm: The Application and Improvement of ECDSA," 2022 International Conference on Big Data, Information and Computer Network (BDICN), 2022, pp. 182-188, doi: 10.1109/BDICN55575.2022.00043.
    [24] D. Toradmalle, R. Singh, H. Shastri, N. Naik and V. Panchidi, "Prominence Of ECDSA Over RSA Digital Signature Algorithm," 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018, pp. 253-257, doi: 10.1109/I-SMAC.2018.8653689.
    [25] J. VenkataGiri and A. Murty, "Elliptical Curve Cryptography Design Principles," 2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT), 2021, pp. 889-893, doi: 10.1109/RTEICT52294.2021.9573662.
    [26] L. Xiaosong and C. A. Jahanzaib, "An Empirical Study of Three PHP Frameworks", International Conference on Systems and Informatics, 2017.
    [27] 3GPP ,“ TS 29.061 version 13.4.0 Release 13,”2016.
    [28] 林秋輝,” 5G行動通訊網路安全:認證安全機制淺談”,第14卷第5期,2020. [Online]. Available: https://nccnews.com.tw/202010/ch4.html.
    [29] “2022年第1季行動通訊市場統計資訊”,ncc.gov.tw. [Online]. Available:
    https://www.ncc.gov.tw/chinese/news_detail.aspx?site_content_sn=3773&sn_f=47688.
    Description: 碩士
    國立政治大學
    資訊科學系碩士在職專班
    109971018
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0109971018
    Data Type: thesis
    DOI: 10.6814/NCCU202201365
    Appears in Collections:[資訊科學系碩士在職專班] 學位論文

    Files in This Item:

    File Description SizeFormat
    101801.pdf3836KbAdobe PDF20View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback