Key Management Protocols

Slides:



Advertisements
Similar presentations
A key agreement protocol using mutual Authentication for Ad-Hoc Networks IEEE 2005 Authors : Chichun Lo, Chunchieh Huang, Yongxin Huang Date : 2005_11_29.
Advertisements

A Survey of Key Management for Secure Group Communications Celia Li.
Computer Networking A Top-Down Approach Chapter 4.7.
Group Protocols for Secure Wireless Ad hoc Networks Srikanth Nannapaneni Sreechandu Kamisetty Swethana pagadala Aparna kasturi.
AVL Trees Balancing. The AVL Tree An AVL tree is a balanced binary search tree. What does it mean for a tree to be balanced? It means that for every node.
Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison.
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
1.1 Distributed and Collaborative Key Agreement Protocols with Authentication and Implementation for Dynamic Peer Groups Patrick Pak-Ching LEE.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
CS2420: Lecture 28 Vladimir Kulyukin Computer Science Department Utah State University.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 23 Introduction to Computer Networks.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS 261 – Winter 2010 Trees. Ubiquitous – they are everywhere in CS Probably ranks third among the most used data structure: 1.Vectors and Arrays 2.Lists.
MULTICASTING Network Security.
Group Key Distribution Chih-Hao Huang
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
CSC 600 Internetworking with TCP/IP Unit 8: IP Multicasting (Ch. 17) Dr. Cheer-Sun Yang Spring 2001.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
IP Multicast COSC Addressing Class D address Ethernet broadcast address (all 1’s) IP multicast using –Link-layer (Ethernet) broadcast –Link-layer.
1 Distributed and Collaborative Key Agreement Protocols with Authentication and Implementation for Dynamic Peer Groups Patrick P. C. Lee.
A secure re-keying scheme Introduction Background Re-keying scheme User revocation User join Conclusion.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
SAODV and Distributed Key Management Mark Guzman, Jeff Walter, Dan Bress, Pradhyumna Wani.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Group Key Distribution Xiuzhen Cheng The George Washington University.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 14 Multicasting And Multicast Routing.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Spring 2006CS 3321 Multicast Outline Link-state Multicast Distance-vector Multicast Protocol Independent Multicast.
Question 4 Tutorial 8. Part A Insert 20, 10, 15, 5,7, 30, 25, 18, 37, 12 and 40 in sequence into an empty binary tree
Binary Search Trees Chapter 7 Objectives
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Lecture 23 Red Black Tree Chapter 10 of textbook
COMP/ELEC 429 Introduction to Computer Networks
Trees Chapter 15.
AA Trees.
Multicast Outline Multicast Introduction and Motivation DVRMP.
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
Red Black Trees
Binary Search Tree (BST)
NSF Faculty Career Award
AVL DEFINITION An AVL tree is a binary search tree in which the balance factor of every node, which is defined as the difference between the heights of.
Data Structures and Algorithms (AT70. 02) Comp. Sc. and Inf. Mgmt
Section 8.1 Trees.
Trees and Binary Trees.
5.2 FLAT NAMING.
Announcements All Labs and Their Demo All HWs and Their Grading
CSC 774 Advanced Network Security
Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Membership Andrew Moore 9/27/2011.
Efficient State Update for Key Management
Lecture 2- Query Processing (continued)
به نام آنکه هستی نام از او یافت
Lecture 36 Section 12.2 Mon, Apr 23, 2007
B-TREE ________________________________________________________
Representing binary trees with lists
Design and Implementation of SUPnP Networks
CS 261 – Data Structures Trees.
Distributed security – Dynamic Group Key Management by Jaman Bhola
Combinatorial Optimization of Multicast Key Management
2-3 Trees Extended tree. Tree in which all empty subtrees are replaced by new nodes that are called external nodes. Original nodes are called internal.
Other Routing Protocols
IP Multicast COSC /5/2019.
EE 122: Lecture 13 (IP Multicast Routing)
Implementing Multicast
7.1 Trees.
B-Tree of degree 3 t=3 data internal nodes
Optional Read Slides: Network Multicast
IPv6 Addresses Hwajung Lee Key Reference:
Presentation transcript:

Key Management Protocols

STR Protocol (Distributed GKMP) It is totally decentralized and based on equal contributions from all the members. It provides basic requirements like forward secrecy, backward secrecy and key independence. It also requires smaller number of unicasts and multicasts to compute a new group key after a member leave or join. 8/22/2019

STR Protocol Unbalanced tree of height n-1 where n is current group size. Final group key : Important Recurrence All bri’s and bki’s are known to all members. 8/22/2019

STR Protocol (Cont.) Initialization : M1 computes M1 broadcasts all bki’s to members Each member then computes the group key from bki’s. For ex: M3 computes 8/22/2019

STR Protocol (Cont.) Join : M5 broadcasts br5 to all members. Each member then computes new key. M4 sends all previous bri’s and bki’s to M5 who then computes new key k5. 8/22/2019

STR Protocol (Cont.) Leave : If Mn leaves then Mn-1 takes responsibility to create new key. Everybody renumbers the node. Mn-1 selects new random key r’n-1. Computes all bki’s and broadcasts it to all members. 8/22/2019

TGDH protocol The TGDH protocol uses binary trees; every node is either a leaf or a parent of two nodes. The nodes are denoted as < l, v >, where 0 < v < 2l − 1 since each level l hosts at most 2l nodes. Each node < l, v > is associated with the key K < l, v >and the public blinded key (bkey) BK < l, v >= f(K < l, v >) where the function f ( ) is modular exponentiation in prime order groups, i.e. f(K) = gkmodp. Computing a key at < l, v > requires the knowledge of the key of one of the two child nodes and the bkey of the other child node. 8/22/2019

TGDH 8/22/2019

The final group key K < 0, 0 > is : K < 0, 0 >= 8/22/2019