公开金钥加密系统於考试业务之应用

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

193BulletinofTestingandAssessment公開金鑰加密系統於考試業務之應用考試學刊第五期2008.12ֆၲ८ᨤףയߓอ࣍ەᇢᄐ೭հᚨشʳʳᏥ৬ൈʳʳຑટဎʳՕᖂԵᖂەᇢխ֨ʳኴ૞ʳʳء֮׌૞ಾኙՕᖂԵᖂەᇢխ֨ᚨشֆၲ८ᨤףയߓอڇەᇢᄐ೭ՠ܂ੌ࿓խऱኔᎾൣउΔൕച۩૿ऱߡ৫ნᖞᎅࣔΖץਔΚ(ԫ)ֆၲ८ᨤףയߓอᄗ૪Ζ(Բ)ڇەᇢᄐ೭ऱᚨشᎅࣔΙץܶᠲ஄ߓอΕᇢ೭ຌ᧯ߓอऱໂགΕ໴ټᇷறΕᙇᖗᠲOMRܒᦰ࿨࣠Εॺᙇᖗᠲ౐૿ᔹ࠴଱ەᢞයᒘ࿆ᙕ֗ګᜎ࿆ᙕΕሽᆰᘛኟᔹ࠴Εګᜎૠጩ࿨࣠ᓤு֗ګᜎຏव࿛܂ᄐᚨشֆၲ८ᨤףയߓอऱመ࿓ດԫ܂ᎅࣔΖ׼ኙ࣍ץਔࠫૡᠲ஄ICདྷׂ׬ऱ׬ׂዄ८ᨤኙጥ෻ᙄऄΕႃ᧯໴ټ໢ۯ໴ټߓอዄګᜎ਷ᇬ១࣐ᚨشֆၲ८ᨤףയߓอհפ౨ઔ࿇א֗ՕᖂԵᖂەᇢխ֨PKIΰPublicKeyInfrastructureαֆᨤ৬๻ഗ៕ऱᚨش֗ංᐖ࿛Δ༼נઌᣂ৬ᤜࠃႈΖᣂ᝶ဲΚֆၲ८ᨤףയΕॺኙጠڤ८ᨤףയΕᑇۯ᡽ີʳʳʳʳᏥ৬ൈΔՕᖂԵᖂەᇢխ֨೏్റ୉ʳຑટဎΔՕᖂԵᖂەᇢխ֨റ॰ࡡ୉ʳ194BulletinofTestingandAssessment考試學刊公開金鑰加密系統於考試業務之應用第五期2008.12UsingPublicKeyEncryptionSysteminExaminationProceduresChien-KangLiu,Chiou-HwaLienCollegeEntranceExaminationCenterAbstractThisarticlepresentsanillustrationoftheuseofPublicKeyEncryptionSystemΰPKESαintheexaminationproceduresatCEECsince2005.Itconsistsofthreesections:ThefirstsectionintroducesthePKES.ThesecondsectiondescribessomefeaturesofPKES,suchastheitembanksoftwaresystem,thesoftwaresystembackupprocedure,theexaminationregistersystem,theOpticalMarkRecognitionsystem,thepaperbarcodeandscoreinputsystem,Computer-AssistedScoringSystem,finalexamresultsreconfirming,andnotificationofexamresults,etc.ThearticlesconcludeswithsuggestionsaboutusingPKESatCEEC,suchasestablishingthemanagementrulesforICcardsandGPGkeypairinitembanksoftwaresystem,researchanddevelopmentoftheregistersystemandfinalresultsinquirysystem,andthepopularizationofPublicKeyInfrastructureΰPKIα.Keywords:PublicKeyEncryption,AsymmetricKeyEncryption,DigitalSignatureChien-KangLiu,SeniorStaffMember,CollegeEntranceExaminationCenterChiou-HwaLien,Specialist,CollegeEntranceExaminationCenter໸Εছߢʳʳڇཏሙሎشሽᆰ๠෻ᇷಛऱழז᝟ႨՀΔՕᖂԵᖂەᇢխ֨ΰ១ጠՕەխ֨αऱەᇢᄐ೭ઌᣂ܂ᄐΔሎشሽᆰ๠෻ᇢ೭ᇷಛਢլױᝩ܍ऱ೚ऄΔ൫ᇢ೭ᇷಛऱإᒔࢤޑᣂەᇢհֆؓΔኔլױլ᠃შ๠෻Ζڇاഏ԰Լ؄ڣնִԼԲֲΔᅝழऱՕەխ֨ᇷಛጥ෻๠ᄘݛີ๠९੡ᇠխ֨ऱՠ܂Գ୉ᜰᙄԫ໱ټ੡ψ֮ٙঅ٤ፖຏॾঅ٤ωऱᓰ࿓ᇙΔإڤտฯٵழലֆၲ८ᨤףയߓอ֧ၞࠀᚨشڇەᇢᄐ೭܂ᄐխΙڇᇠᓰ࿓խᄘ๠९ᇡาऱտฯֆၲ८ᨤףയዝጩऄऱ଺෻֗ሎ܂ऱੌ࿓Δط࣍ᄘ๠९ࠠໂ९ழၴऱᑇᖂඒᖂᆖ᧭Δ಻ٽ۞طຌ᧯ΰFreewareαGN˨˄PrivacyGuardΰאՀ១ጠGPGαֆၲ८ᨤףയߓอऱኔᎾᖙᒭΔڇৰ࿍ऱழၴփΔઌᣂᇢ೭܂ᄐऱՠ܂Գ୉݁౨ലֆၲ८ᨤףയߓอך։ሎشڇࠡࢬ૤ຂऱᄐ೭խΖ៶طֆၲ८ᨤףയߓอऱઌᣂ௽ࢤΔࠏڕߏയࢤΰConfidentialityαΕߪ։ᒔᎁΰAuthenticationαΕլױܡᎁࢤΰNon-repudiationα֗ᇷறݙᖞࢤΰIntegrityαΔױא߻ַᇢ೭ᇷறฝٌழขسᙑᎄΕᝩ܍៚ޏא֗ᆄԫᙑᎄ࿇سழױא೴ሶנ࿇سᙑᎄऱ܂ᄐ֗ၸ੄Δאܓ৵ᥛհಳ᠋ጥە֗᠖堚ຂٚូ᥆࿛ΖאՀႛ༉ؾছՕەխ֨ኔᎾሎشֆၲ८ᨤףയߓอᄐ೭խΔ٨ᜰ༓ႈ܂ᎅࣔΖʳ၁Εֆၲ८ᨤףയߓอᄗ૪ʳʳയᒘᖂΰCryptographyڇ۫ᑛ፿֮խΔএᄭ࣍ݦᢊ፿kryptósΔψឆ៲ऱωΔࡉgrápheinΔψ஼ᐊωαਢઔߒڕ۶ឆയچႚᎠᇷಛऱᖂ॰ΖထټऱയᒘᖂृRonRivestᇞᤩሐΚψയᒘᖂਢᣂ࣍ڕ۶ڇᑅԳژڇऱᛩቼխຏಛωΙڂڼലയᒘᖂ1GNUǺGNUᔈ྽วॣࣁȨGuh-NOOȩࢂȨGNU'sNotUnixȩޑ२ӷᕭቪǶGNUीჄǴΞᆀȨॠѩीჄȩǴࢂҗഞ࣪౛πᏢଣޑำԄ೛ीৣRichardStallmanӧ1983ԃ9Д27ВϦ໒วଆޑǶѬޑҞ኱ࢂബࡌ΋঺ֹӄԾҗޑբ཰س಍ǶGNUीฝޑᆛ֟ࣁΰPKESαintheexaminationproceduresatCEECsince2005.Itconsistsofthreesections:ThefirstsectionintroducesthePKES.ThesecondsectiondescribessomefeaturesofPKES,suchastheitembanksoftwaresystem,thesoftwaresystembackupprocedure,theexaminationregistersystem,theOpticalMarkRecognitionsystem,thepaperbarcodeandscoreinputsystem,Computer-AssistedScoringSystem,finalexamresultsreconfirming,andnotificationofexamresults,etc.ThearticlesconcludeswithsuggestionsaboutusingPKESatCEEC,suchasestablishingthemanagementrulesforICcardsandGPGkeypairinitembanksoftwaresystem,researchanddevelopmentoftheregistersystemandfinalresultsinquirysystem,andthepopularizationofPublicKeyInfrastructureΰPKIα.Keywords:PublicKeyEncryption,AsymmetricKeyEncryption,DigitalSignatureChien-KangLiu,SeniorStaffMember,CollegeEntranceExaminationCenterChiou-HwaLien,Specialist,CollegeEntranceExaminationCenter໸Εছߢʳʳڇཏሙሎشሽᆰ๠෻ᇷಛऱழז᝟ႨՀΔՕᖂԵᖂەᇢխ֨ΰ១ጠՕەխ֨αऱەᇢᄐ೭ઌᣂ܂ᄐΔሎشሽᆰ๠෻ᇢ೭ᇷಛਢլױᝩ܍ऱ೚ऄΔ൫ᇢ೭ᇷಛऱإᒔࢤޑᣂەᇢհֆؓΔኔլױլ᠃შ๠෻Ζڇاഏ԰Լ؄ڣնִԼԲֲΔᅝழऱՕەխ֨ᇷಛጥ෻๠ᄘݛີ๠९੡ᇠխ֨ऱՠ܂Գ୉ᜰᙄԫ໱ټ੡ψ֮ٙঅ٤ፖຏॾঅ٤ωऱᓰ࿓ᇙΔإڤտฯٵழലֆၲ८ᨤףയߓอ֧ၞࠀᚨشڇەᇢᄐ೭܂ᄐխΙڇᇠᓰ࿓խᄘ๠९ᇡาऱտฯֆၲ८ᨤףയዝጩऄऱ଺෻֗ሎ܂ऱੌ࿓Δط࣍ᄘ๠९ࠠໂ९ழၴऱᑇᖂඒᖂᆖ᧭Δ಻ٽ۞طຌ᧯ΰFreewareαGN˨˄PrivacyGuardΰאՀ១ጠGPGαֆၲ८ᨤףയߓอऱኔᎾᖙᒭΔڇৰ࿍ऱழၴփΔઌᣂᇢ೭܂ᄐऱՠ܂Գ୉݁౨ലֆၲ८ᨤףയߓอך։ሎشڇࠡࢬ૤ຂऱᄐ೭խΖ៶طֆၲ८ᨤףയߓอऱઌᣂ௽ࢤΔࠏڕߏയࢤΰConfidentialityαΕߪ։ᒔᎁΰAuthenticationαΕլױܡᎁࢤΰNon-repudiationα֗ᇷறݙᖞࢤΰIntegrityαΔױא߻ַᇢ೭ᇷறฝٌழขسᙑᎄΕᝩ܍៚ޏא֗ᆄԫᙑᎄ࿇سழױא೴ሶנ࿇سᙑᎄऱ܂ᄐ֗ၸ੄Δאܓ৵ᥛհಳ᠋ጥە֗᠖堚ຂٚូ᥆࿛ΖאՀႛ༉ؾছՕەխ֨ኔᎾሎشֆၲ८ᨤףയߓอᄐ೭խΔ٨ᜰ༓ႈ܂ᎅࣔΖʳ၁Εֆၲ८ᨤףയߓอᄗ૪ʳʳയᒘᖂΰCryptographyڇ۫ᑛ፿֮խΔএᄭ࣍ݦᢊ፿kryptósΔψឆ៲ऱωΔࡉgrápheinΔψ஼ᐊωαਢઔߒڕ۶ឆയچႚᎠᇷಛऱᖂ॰ΖထټऱയᒘᖂृRonRivestᇞᤩሐΚψയᒘᖂਢᣂ࣍ڕ۶ڇᑅԳژڇऱᛩቼխຏಛωΙڂڼലയᒘᖂ1GNUǺGNUᔈ྽วॣࣁȨGuh-NOOȩࢂȨGNU'sNotUnixȩޑ२ӷᕭቪǶGNUीჄǴΞᆀȨॠѩीჄȩǴࢂҗഞ࣪౛πᏢଣޑำԄ೛ीৣRichardStallmanӧ1983ԃ9Д27ВϦ໒วଆޑǶѬޑҞ኱ࢂബࡌ΋঺ֹӄԾҗޑբ཰س಍ǶGNUीฝޑᆛ֟ࣁ܂੡ᇷಛڜ٤ு֨ݾ๬ਢ᧩࣐ۖߠऱΔࠏڕᎁᢞΕژ࠷൳ࠫ࿛شຜΔࠀ׊բ๯ᐖऑᚨشڇֲൄس੒Κץਔ۞೯឵୉ᖲऱདྷׂ׬Εሽᆰࠌشृژ࠷യᒘΕሽ՗೸೭࿛࿛Ζڇ෼վሽ՗ᇷறףയݾ๬ऱᒤᡱփΔપฃױ೴։੡όኙጠڤ८ᨤףയዝጩऄΰSymmetricKeyEncryptionαύࡉόॺኙጠڤ८ᨤףയዝጩऄΰAsymmetricKeyEncryptionαύࠟጟΙছृਢਐႚಬֱፖ൷گֱຟᖑڶઌٵऱ८ᨤၞ۩ףΕᇞയΔ৵ृਢਐࠌشլٵऱ८ᨤၞ۩ףΕᇞയΖء֮ૻ࣍ᒧ༏ྤऄಾኙݾ๬าᆏᇡ૪ΔႛಾኙኔᎾ෼उ܂ᄗਔᎅࣔΖ෼זऱኙጠڤ८ᨤףയዝጩऄऱઔߒΔ׌૞ڇ೴ჇףയऄΰBlockCipherαፖۭੌףയऄΰStreamCipherαࠟຝ։Ζ೴Ⴧףയऄਢല૞ףയऱಛஒ։ګᑇଡ೴ჇΔಾኙଡܑ೴Ⴧ܂ףയΔᙁנઌٵՕ՛ऱയ֮೴ჇΖDataEncryptionStandardΰDESαࡉAdvancedEncryptionStandardΰAESαਢભഏᜤ߶ਙࢌுࡳऱ೴ჇףയऄᑑᄷΖᙟထሽᆰઝݾאԼ଍ຒၞ୶Δආش८ᨤ९৫ለ࿍ऱDES૿ᜯ๯ݶຒధᇞऱٲᖲΔሑ࣍۫ց2000ڣ10ִ2ֲֆၲᙇࡳRijndael੡AESࢬආشऱݾ๬Δشא࠷זDESΖຍࠄףയዝጩऄਢ෼վࠌش່ᐖऱയᒘցٙΔ๯ࠌشڇॺൄڍऱᚨشՂΔൕ८ᘜᄐऱ۞೯༼ཱིᖲΕሽᆰጻᎾጻሁփൕሽ՗ၡٙࠩ᎛ጤژ࠷Εྤᒵຏॾऱ֫ᖲ࿛ຟڶኔࠏΖࠡהൄߠऱࡸڶBlowfishΔInternationalDataEncryptionAlgorithmΰ

1 / 20
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功