Network Security in Ring Multicast Diffie - Hellman Algorithm 1.A and B agree on a prime q and a number 1 <g <q. 2.A and B choose private keys, S A and.

Slides:



Advertisements
Similar presentations
Diffie-Hellman Diffie-Hellman is a public key distribution scheme First public-key type scheme, proposed in 1976.
Advertisements

Secure Mobile IP Communication
A Survey of Key Management for Secure Group Communications Celia Li.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI.
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style A Survey on Decentralized Group Key Management Schemes.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Annexations and Merging in Weighted Voting Games: The Extent of Susceptibility of Power Indices by Ramoni Lasisi Vicki Allan.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
Real Time Flow Handoff in Ad Hoc Wireless Networks using Mobility Prediction William Su Mario Gerla Comp Science Dept, UCLA.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Secure Multimedia Multicast: Interface and Multimedia Transmission GROUP 2: Melissa Barker Norman Lo Michael Mullinix server router client router client.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
Multicast Security May 10, 2004 Sam Irvine Andy Nguyen.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
The Diffie-Hellman Algorithm Riley Lochridge April 11, 2003.
Multicast Security CS239 Advanced Network Security April 16 th, 2003 Yuken Goto.
Computer Science Public Key Management Lecture 5.
1.  A protocol is a set of rules that governs the communications between computers on a network.  Functions of protocols:  Addressing  Data Packet.
Andreas Steffen, , 4-PublicKey.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications.
Lab 1 Bulletin Board System Farnaz Moradi Based on slides by Andreas Larsson 2012.
Computer Science 1 CSC 774 Advanced Network Security Secure Group Communications Using Key Graphs Presented by: Siddharth Bhai 9 th Nov 2005.
Hierarchical agent-based secure and reliable multicast in wireless mesh networks Yinan LI, Ing-Ray Chen Robert Weikel, Virginia Sistrunk, Hung-Yuan Chung.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
Overlay Network Physical LayerR : router Overlay Layer N R R R R R N.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Key Management Celia Li Computer Science and Engineering York University.
Efficient Overlay Multicast Protocol in Mobile Ad hoc Networks Hochoong Cho, Sang-Ho Lee Mobile Telecommunication Research Division, ETRI, KOREA Younghwan.
Farnaz Moradi Based on slides by Andreas Larsson 2013.
Examples. Examples (1/11)  Example #1: f(A,B,C,D) =  m(2,3,4,5,7,8,10,13,15) Fill in the 1’s. 1 1 C A B CD AB D 1 1.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
1 Section 1.6 Sets. 2 Set Fundamental discrete structure on which all other discrete structures are built Can be loosely defined as a collection of elements.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
October 21th, 2009 HGP Team Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet Hyunho Park, Gianni M. Ricciardi, Pierre Alauzet CS642 - Distributed Systems.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Efficient Group Key Management in Wireless LANs Celia Li and Uyen Trang Nguyen Computer Science and Engineering York University.
Great Theoretical Ideas In Computer Science Anupam GuptaCS Fall 2006 Lecture 15Oct 17, 2006Carnegie Mellon University Algebraic Structures: Groups,
CMPUT Computer Organization and Architecture II1 CMPUT329 - Fall 2003 Topic 4: Cost of Logic Circuits and Karnaugh Maps José Nelson Amaral.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
KAIS T A Secure Group Key Management Scheme for Wireless Cellular Network Hwayoung Um and Edward J. Delp, ITNG’ Kim Pyung.
Election Theory A Tale of Two Countries or Voting Power Comes To the Rescue!
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
Computer Science Authenticated Group Key Agreement and Friends Giuseppe Ateniese, Michael Stiener and Gene Tsudik Presented by Young Hee Park November.
1 CS 352 Introduction to Logic Design Lecture 2 Ahmed Ezzat Boolean Algebra and Its Applications Ch-3 + Ch-4.
Reducing Number of Candidates
Lesson 2.9 Objective: Probability permutations and combinations
RSVP: A New Resource ReSerVation Protocol
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
CS480 Cryptography and Information Security
Lec 2: Protocols.
Celia Li Computer Science and Engineering York University
Lecture 7 Logistics Last lecture Today HW2 due now Lab2 going on
Fractional Factorial Design
CPEG514 Advanced Computer Networkst
El Gamal and Diffie Hellman
Exploring Partially ordered sets
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
Lecture 7 Logistics Last lecture Today HW2 due now Lab2 going on
Design matrix Run A B C D E
Secure Diffie-Hellman Algorithm
Presentation transcript:

Network Security in Ring Multicast Diffie - Hellman Algorithm 1.A and B agree on a prime q and a number 1 <g <q. 2.A and B choose private keys, S A and S B. 3.A and B compute public keys, K A = g S A mod q K B = g S A mod q 4.For A, K = (K B ) S A mod p = g S A S B mod q For B, K = (K A ) S B mod p = g S A S B mod q X EA, D’EA, CD’EA da b c EABC * D’, CD’, BCD’, ABCD’ * * * e * E, D’E, CD’E, BCD’E EAB, D’EAB Member Addition Protocol a b c 2 AC’ 1 C’, BC’ * * * Member Exclusion Protocol e joins the multicast ring; d updates D to D’; New key will be ABCD’E. d leaves the multicast ring; c updates C to C’; New key will be ABC’. Mass Join Protocol ABF,ABEF, ABD’EF da b c * D’, CD’, BCD’, ABCD’ * * * e * f E,D’E, CD’E BCD’E, ABCD’E F,EF,D’EF, CD’EF BCD’EF, * AF,AEF, AD’EF, ACD’EF 4 ABCF, ABCEF 7 ABCD’F da b c 2 1 * D’’, CD’’, ACD’’ * * ef D’’F, CD’’F * 3 AD”F Subgroup Exclusion Protocol e, f join the group; Chain e & f in sequence; d updates D to D’; New key is ABCD’EF. b, e leave the group; d updates D to D’’; New key is ACD’’F. da b c ef a b c 2 AC’ 1 C’, BC’ * * * d ef Group 1: d e f 1 D’’ E’’, D’’E’’ F’’, E”F’’ * * * D’’F’’ Group 2: Subgroup Exclusion IKE Group Division Protocol Run the subgroup exclusion protocol to form Group 1; Run IKE to form Group 2. da b c Ko [F;0;new;B’,AB’,AB’D] * * * Ko [F;0;new;B’C,AB’C] Ko [F;0;new;B’CD] K N [G;1;-;-] Key Refresh with New word Policy Ko [F; 0; new; B’C,AB’C] Packet dataAlternating bitNew subkeys New key specified b refreshes the key; F & G are packet data; Key refresh doesn’t interrupt data flow. Key format KoKNKN Old key New key Key Refresh with Transformation K [F; 0; from d; T 1 ] Packet dataAlternating bitTransformation Refreshing member da b c * * * K [F;0;from d;T 1 ] * K [G;1;from d;T 1 ] T 1 K [G;1;-;-] K T1KT1K Key format d refreshes the key; F & G are packet data; New key is T 1 K; Key refresh doesn’t interrupt data flow. Key Refresh with Transformations K TK T=T A T B T C T D d a b c * * K [F;0;from d;T D ] K [G;1;from d; T D,T A ] K [G;1;from d; T D,T A,T B ] K [G;1;from d; T C,T A,T B ] K [G;1;from d; T B,T C ] * * K [H;0;from d;T C ] TK [H;0;-;-] d initiates the key refresh; Each member contributes its own transformation; F, G & H are packet data; Key refresh doesn’t interrupt data flow. Multicast Network Advantages: Low network transmission overheads High user scalability Applications: Stock quote services, Internet radio, Video conferencing, Pay per view TV Concerns: Backward/Forward secrecy Data confidentiality Membership changes (Dynamic Groups) Efficient key management scheme (Key Agreement, Key Refresh etc.) New word Policy in Ring Multicast N1N1 N1N1 M0M0 M0M0 M0M0 DC X 1 N1N1 N1N1 N1N1 N1N Station Station 1 is source; N 1 is new message; M 0 is prior packet; X means transmission error; DC means “Don’t Care”; 1 resent N 1 when seeing M 0. Secure Acknowledging Multicast (SAM) da b c 1 A B, AB C, BC, ABC * D, CD, BCD * * * AD,ACD ABD a is source; b, c, d are receivers; Group key is ABCD; Asterisk denotes receiver now has common secret key. ABCD AB ABC A Initial Key Establishment (IKE) Notations: SAM scheme achieves secure and efficient key agreement in the context of dynamic ring multicast network, such as initial key establishment, member addition, member exclusion, mass join, subgroup exclusion and group division etc. SAM provides both simple acknowledgement with new-word policy and simple key refresh via transformations. Key refresh does not interrupt the data exchange and acknowledgement. Conclusions Thank you for stopping by ! Any Questions ?? Contact us via John J. Metzner Yuexin Liu John J. Metzner, Yuexin Liu Dept. of Computer Science and Engineering, The Pennsylvania State University