viii iii TABLE OF CONTENTS

advertisement
viii
TABLE OF CONTENTS
CHAPTER
TITLE
PAGE
DECLARATION ....................................................................................... iii
DEDICATION ........................................................................................... iv
ACKNOWLEDGEMENT ......................................................................... v
ABSTRACT ............................................................................................... vi
ABSTRAK ................................................................................................ vii
TABLE OF CONTENTS........................................................................ viii
LIST OF TABLES .................................................................................... xi
LIST OF FIGURES ................................................................................. xii
1
INTRODUCTION .....................................................................................
1.1 Introduction .................................................................................... 1
1.2 Background of the problem ............................................................ 7
1.2.1 Reduce complex problem with different methods ............... 7
1.2.2 Addressing the Protection of Information
Processing Applications ....................................................... 7
1.2.3 Future Key Management Methods: David McGrew,
Cisco .................................................................................... 8
1.2.4 Problem of key management in an access hierarchy ........... 9
1.3 Problem Statement ........................................................................ 10
1.4 Project Objective .......................................................................... 11
1.5 Research Questions....................................................................... 11
1.6 Project Scope ................................................................................ 11
1.7 The Project Importance ................................................................ 12
1.8 Organization Report ..................................................................... 12
2
LITERATURE REVIEW .........................................................................
ix
2.1 Introduction .................................................................................. 14
2.2 Importance of Symmetric Key Management ................................ 16
2.3 Key Management .......................................................................... 17
2.3.1 Key Management Techniques............................................ 18
2.3.2 Key Management Requirements ........................................ 19
2.4 Key Management in an Access Hierarchy.................................... 20
2.5 Distributed Key Management ....................................................... 22
2.5.1 Distributed Logical Key Hierarchy .................................... 23
2.5.2 Distributed One-way Function Tree .................................. 24
2.6 The Key Distribution Problem ..................................................... 25
2.6.1 Sharing Keys in Advance................................................... 27
2.6.2 Problems with Sharing Keys in Advance .......................... 28
2.6.3 Using a Trusted Third Party ............................................... 30
2.6.3.1 Problems with trusted third party (TTP) Scheme ......... 32
2.7 Key Derivation Function .............................................................. 33
2.8 The Implementation Language for This Study ............................. 34
2.9 Summary ....................................................................................... 38
3
RESEARCH METHODOLOGY ............................................................
3.1 Introduction .................................................................................. 39
3.2 Research Framework .................................................................... 40
3.3 Research Roadmap ....................................................................... 41
3.4 Phase I: Literature Review............................................................ 43
3.5 Phase II : Design and Analysis ..................................................... 45
3.5.1 System Requirements Analysis.......................................... 45
3.5.2 Systems Analysis and Design ............................................ 45
3.6 Phase III: Implementation and Test .............................................. 46
3.6.1 Program Writing ................................................................ 47
3.6.2 Test ..................................................................................... 47
3.6.3 Evaluation .......................................................................... 48
3.7 Summary ....................................................................................... 48
4
ANALYSIS AND DESIGN .......................................................................
4.1 INTRODUCTION ........................................................................ 49
x
4.2 Analysis and Design of This Project ............................................ 51
4.3 Flow Diagram ............................................................................... 58
4.4 Pseudo code .................................................................................. 62
4.5 Communication between two employees ..................................... 63
4.6 Summery ....................................................................................... 63
5
IMPLEMENTATION AND TEST ..........................................................
5.1 Introduction .................................................................................. 65
5.2 Software Instructor ....................................................................... 66
5.2.1 User Interface ..................................................................... 66
5.2.2 Preferences ......................................................................... 67
5.3 Final Interface ............................................................................... 72
5.4 Test and Evaluate.......................................................................... 74
5.5 Summary ....................................................................................... 74
6
CONCLUSION ..........................................................................................
6.1 Introduction .................................................................................. 76
6.2 Research Contribution .................................................................. 78
6.3 Aims and Objectives of This Project ............................................ 80
6.4 Further Work ................................................................................ 80
7
REFERENCES ...................................................................................... 81
xi
LIST OF TABLES
TABLE NO.
TITLE
PAGE
1.1
Definition of existing keys
3
1.2
NIST guidelines for public key sizes
10
6.1
NIST guidelines for public key sizes
79
xii
LIST OF FIGURES
FIGURE NO.
TITLE
PAGE
1.1
Key distribution center model
3
1.2
Key management Activities
4
2.1
LKH tree
24
2.2
The key distribution problem
26
2.3
Trusted third party, distributing keys between Pao- Chi and
Gwen
31
Creating a hierarchy that Pao-Chi and Daniel in the two
cities
32
3.1
Research Framework
41
3.2
Research Roadmap
42
3.3
Literature Review Phase I of Framework
43
3.4
Design and Analysis Phase II of Framework
45
3.5
Implementation and Test Phase III of Framework
47
4.1
The sample of Hierarchical government organization
52
4.2
Key Generation Diagram
58
4.3
Bits Determine from 64bits with 72 bits
60
4.4
The key generation functions
61
4.5
Pseudocode of the program
61
5.1
Software User Interface (startup)
67
5.2
Preference Window (Chart Specification)
68
5.3
Hash/ Encryption specification
69
5.4
Lists of Hash Functions (First Hash)
70
5.5
Lists of Hash Functions (Final Hash)
71
5.6
Lists of Encryption Algorithm (Final Encryption)
72
5.7
User Interface Key management Draw
73
2.4
Download