文章詳目資料

國防管理學報

  • 加入收藏
  • 下載文章
篇名 設計具多因子之身分認證協定機制-以空軍指管通情系統為例
卷期 39:2
並列篇名 Design of Multi-Factor Authentication Agreement for Air Force Command Control Communication Intelligence System
作者 蘇品長謝定芳高尉晏
頁次 033-054
關鍵字 橢圓曲線密碼系統國軍智慧卡一次性密碼串流加密法Oval and Curved Cryptography SystemMilitary Smart CardOne-Time PasswordStream Cipher
出刊日期 201811

中文摘要

鑒於科技蓬勃發展,相關資訊技術及軟硬體不斷地創新,檢視國軍各單位現行戰 備整備作業都逐漸採用電腦化,伴隨而來的資訊安全為當前遂行作戰的重要課題之一, 除了落實實體隔離政策及建置嚴密防護機制外,並將網路攻擊列為年度演習重要驗證 項目,藉以建置絕對安全的作業環境。指管通情系統提供空軍於重大演習時傳遞戰場 指管訊息媒介,現僅用識別名稱及密碼鑑別使用者是否為合法的身分,惟單一模式身 分認證容易遭敵破解進而竊取訊息。為提高系統的安全性,以橢圓曲線密碼系統為基 底,結合國軍智慧卡、一次性密碼及串流加密法等技術,建構出適用於空軍指管通情 系統多因子身分認證協定機制,本研究所提出的方法内容包含註冊、登入、驗證及金 鑰產製、強化訊息傳遞流程及異常警告等階段,並可抵禦竊聽攻擊、離線密碼猜測攻 擊、重送攻擊、使用者偽冒攻擊、伺服器偽冒攻擊、中間人攻擊及驗證表竊取攻擊, 若遭敵入侵系統時,亦可主動回傳告警訊息,藉以研發出不易遭破解的加密演算法, 有效降低機密資訊遺失的風險。

英文摘要

In view of the vigorous development of science and technology, information technology and hardware and software continue to innovate. Combat operation from every unit of military are gradually computerized, accompanied with information security for the current combat operation as one of the important issues. In addition to the implementation of entities isolation policy and the establishment of strict protection mechanism, protection from network attack is listed as an annual exercise important validation project, in order to build an absolutely safe environment for operation. In order to improve the security of the air force command control communication intelligence system, an oval and curved cryptography system is used as the base, combined with the military smart card, one-time password and streaming cipher technology to construct a multi-factor authentication agreement for the air force command control communication intelligence system. Our research proposed methods includes registration, login, verification and key production, enhanced messaging process and abnormal warning stage. They can resist eavesdrop attack, off-line password guessing attack, reply attack, impersonation attack, server spoofing attack , man-in-the-middle attack, stolen-verifier attack and other attacks. If the enemies invade the system, the system will send alarm message automatically, to develop an invulnerable encryption algorithm, and effectively reduce the risk of confidential information loss.

相關文獻