完整後設資料紀錄
DC 欄位語言
dc.contributor.author姚乃綺en_US
dc.contributor.authorNai Chi Yaoen_US
dc.contributor.author葉義雄en_US
dc.contributor.authorDr. Yi-Shiung Yehen_US
dc.date.accessioned2014-12-12T02:27:42Z-
dc.date.available2014-12-12T02:27:42Z-
dc.date.issued2001en_US
dc.identifier.urihttp://140.113.39.130/cdrfb3/record/nctu/#NT900392078en_US
dc.identifier.urihttp://hdl.handle.net/11536/68487-
dc.description.abstract在本篇論文中,我們提出利用加入一個隨機變數和基底的轉換的機制對明文先做一個處理,使得在密碼系統中同樣的一個明文可以因此而產生出不同的密文。一方面因為隨機變數是不固定的,若其長度為r,則可產生出2|r|不同的隨機變數。另一方面,我們運用基底轉換的技巧打亂了原來的訊息。如此一來,讓攻擊者很難做攻擊。此外,在此篇論文中,我們另外將此種可抵禦明文攻擊的機制應用在DES和AES上。整個方法的安全性是建立於我們採用的區塊加密法DES或AES。本方法讓攻擊者更難攻擊,使得原有的DES或AES演算法擁有更進一步清楚而明確的安全性質。zh_TW
dc.description.abstractIn this thesis, we suggest a new method to add random number and convert among radices such as the fixed plaintext can produce more and different ciphertext in AES. On the one hand, because the random number is not fixed, that is to say, if the length of random number is r, then it can produce 2|r| different random number. On the other hand, we utilize the method of converting among radices to disarrange original message. Then, it is more difficult for an attacker. Furthermore, we apply this scheme to DES and AES in this thesis. The security of the whole scheme is based on the block cipher, AES and DES. Our method makes the attacker is difficult to decrypt, and that improve the original AES or DES algorithm to have more clear security properties.en_US
dc.language.isoen_USen_US
dc.subject密碼學zh_TW
dc.subject隨機變數產生器zh_TW
dc.subject基底轉換zh_TW
dc.subjectCryptographyen_US
dc.subjectRandom number generatoren_US
dc.subjectConverting Among radicesen_US
dc.subjectAESen_US
dc.subjectDESen_US
dc.subjectRijndaelen_US
dc.title可抵禦明文攻擊的一種機制zh_TW
dc.titleA Scheme Withstanding the Plaintext Attacken_US
dc.typeThesisen_US
dc.contributor.department資訊科學與工程研究所zh_TW
顯示於類別:畢業論文