Golden Linear Group Key Agreement Protocol

Slides:



Advertisements
Similar presentations
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Advertisements

An Introduction to Pairing Based Cryptography Dustin Moody October 31, 2008.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
CS555Spring 2012/Topic 161 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Public-Key Cryptography and RSA CSE 651: Introduction to Network Security.
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Cryptography issues – elliptic curves Presented by Tom Nykiel.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Presented by Edith Ngai MPhil Term 3 Presentation
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Lesson 2-18 AP Computer Science Principles
Practical Aspects of Modern Cryptography
Hash Functions Which of these problems is easier to solve:
Network Security Design Fundamentals Lecture-13
Advanced Information Security 5 ECC Cryptography
Cybersecurity: Aspects of Cryptography from a Classical and Quantum Perspective (An Ongoing Review) Joseph Spring University of Hertfordshire British Council.
Symmetric and Asymmetric Encryption
Cryptography Dr. X.
Protocol Analysis.
A three round authenticated group key agreement protocol for ad hoc networks Authors: Daniel Augot, Raghav Bhaskar, Valérie Issarny, and Daniele Sacchetti.
Public Key Encryption Systems
CS480 Cryptography and Information Security
Public-Key Cryptography and RSA
RSA and El Gamal Cryptosystems
Public-key Cryptography
Chapter 8 Network Security.
Public Key Encryption and the RSA Algorithm
Big Numbers: Mathematics and Internet Commerce
Introduction to security goals and usage of cryptographic algorithms
Mobile Payment Protocol 3D by Using Cloud Messaging
CS 259 Octopus Taral Joglekar Ryan Wisnesky.
Message Security, User Authentication, and Key Management
Public Key Infrastructure
Cryptography and Security Fall 2009 Steve Lai
Diffie-Hellman Secure Key Exchange 1976.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
9.2 SECURE CHANNELS Medisetty Swathy.
Quantum Cryptography Alok.T.J EC 11.
Diffie-Hellman Key-Exchange Algorithm
Celia Li Computer Science and Engineering York University
NET 311 Information Security
The Secure Sockets Layer (SSL) Protocol
Chapter 4 Cryptography / Encryption
به نام آنکه هستی نام از او یافت
Key Management Network Systems Security
Homework #4 Solutions Brian A. LaMacchia
Appendix 5: Cryptography p
NET 311 Information Security
Cryptography Reference: Network Security
Diffie-Hellman key exchange/agreement algorithm
Key Establishment Protocols ~
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Introduction to Elliptic Curve Cryptography
Public-Key, Digital Signatures, Management, Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
CSCE 715: Network Systems Security
Chapter 29 Cryptography and Network Security
Asymmetric Cryptographic Algorithms
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Public Key Encryption Systems
Network Security Design Fundamentals Lecture-13
Secure Diffie-Hellman Algorithm
AIT 682: Network and Systems Security
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

Golden Linear Group Key Agreement Protocol Mohammad Vahidalizadehdizaj AND AVERY LEIDER RESEARCH DAY – MAY 5, 2017 - Pace University

Introduction Security in group communication has been a significant field of research for decades. Because of the emerging technologies like cloud computing, mobile computing, ad-hoc networks, and wireless sensor networks, researchers are considering high group dynamics in communication security. Group key agreement protocol is for providing enough security for the group communication. Group key agreement protocol is a way to establish a shared cryptographic key between groups of users over public networks. Group key agreement protocol enables more than two users to agree on a shared secret key for their communications.

Key Agreement Protocol Diffie-Hellmand key agreement is the most popular key agreement protocol Diffie-Hellman is one of the earliest implementations of the public key cryptography, which generates a shared session key between two users We can use this key later for encrypting or decrypting our information just like a symmetric key Most of the key agreement protocols use Diffie-Hellman as their basis. RSA also followed Diffie-Hellman method to implement its public key cryptography method

Group Key Agreement Protocols The first group key agreement protocol that we are going to review is DL08 Desmedt and Lange proposed a three-round group key agreement protocol in 2007 This protocol is based on pairings and it is proper for groups of parties with different computational capabilities. In this protocol, a balanced group of n parties should have approximately n/2 more powerful parties The next protocol that we want to review is KON08. It is a cluster-based GKA protocol proposed by Konstantinou in 2010 It is based on Joux’s tripartite key agreement Protocol. It has two variants: contributory and non-contributory. This protocol assumes that nodes are clusters with two or three members

Golden Key Agreement Protocol (GKA) The fundamental math includes algebra of logarithms and modulus arithmetic The goal of this process is agreeing on a shared secret session key between Alice and Bob. In this process eavesdroppers should not be able to determine the shared session key This shared session key will be used by Alice and Bob to independently generate the keys for each side These keys will be used symmetrically to encrypt and decrypt data stream between Alice and Bob Note that, our shared session key should not travel over the network

Secure Channel Sub-protocol In this part the leader will establish a secure connection to each one of users in the group. Firstly, each user will choose a private key The leader also will choose a private key Then, each user will send his mid number to the leader. Also the leader will broadcast the shared key through the secure channels

Initiation Sub-protocol In this part, the leader will generate a shared session for the users Firstly, each user chooses his own private key and send it to the leader through the secure channel After that, the leader will generate a shared session key for the group based on the equation below and will send it to the members through their secure channels

Join Protocol When a new user want to join a group, he should establish a secure channel with leader of the group. He uses our secure channel protocol (GKA) for this step Then, he will send his private key with positive sign to the leader through his secure channel Then, the leader will update his shared session key by multiplying it to the received number, since the sign is positive After that, the leader will broadcast the updated shared session key to the group members The key will be updated for the leader, members of the group, and the new member Based on the equation below

Leave Protocol When an existing user want to leave the group, he should inform the leader before he leaves. He should send his private key with negative sign to the leader through his secure channel Then, the leader will update his private key by dividing it by the received number Note that, the leader ignores the negative sign This negative sign is only symbol of leaving After that, the leader will broadcast the new shared group key After that, the leader and the group members will have the same updated key based on the equation below

Comparison

Conclusion We recommended two protocols in this paper The first one was golden key agreement protocol that is faster than Diffie-Hellman We also suggested a linear group key agreement protocol

Question