Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.2 Tree-Based Group Diffie Hellman Protocol Acknowledgment:

Slides:



Advertisements
Similar presentations
Generic Task Routine Design.
Advertisements

CWSP Guide to Wireless Security Enterprise Wireless Hardware Security.
CWSP Guide to Wireless Security
CWSP Guide to Wireless Security
CWSP Guide to Wireless Security Operational Support and Wireless Convergence.
24-May-01D.P.Kelsey, GridPP WG E: Security1 GridPP Work Group E Security Development David Kelsey CLRC/RAL, UK
Sketch-based Querying of Distributed Sliding-window Data Streams
Secure Time Synchronization Service for Sensor Networks S. Ganeriwal, R. Kumar, M. B. Sirvastava Presented by: Kaiqi Xiong 11/28/2005 Computer Science.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 6. Security in Mobile Ad-Hoc Networks.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 9, 2003 Introduction to Computer Security Lecture.
Computer Science Dr. Peng NingCSC 774 Advanced Network Security1 Topic 3.1: NetBill.
Technology Mapping. Perform the final gate selection from a particular library Two basic approaches 1. ruled based technique 2. graph covering technique.
II. Potential Errors In Epidemiologic Studies Random Error Dr. Sherine Shawky.
1 Distribution of Data and Remote Invocation of Programs Tomasz Müldner, Zhonghai Luo and Elhadi Shakshuki* Jodrey School of Computer Science, Acadia University,
Net Security1 Chapter 8 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew Yang.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 4.2 BiBa.
COL 106 Shweta Agrawal, Amit Kumar
Using Implications for Online Error Detection Nuno Alves, Jennifer Dworak, and R. Iris Bahar Division of Engineering Brown University Providence, RI
U of Houston – Clear Lake
3/3 Factoid for the day: “Most people have more than the average number of feet” & eyes & ears & noses.
A Survey of Key Management for Secure Group Communications Celia Li.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5 Group Key Management.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Preparation for In-class Presentations.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
KAIS T Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups IEEE/ACM Trans. on Netw., Vol. 14, No. 2, April 2006.
Computer Science 1 Efficient Self-healing Group Key Distribution With Revocation Capability Archana Rajagopal CSC 774 Presentation Based on Original Slides.
CSE332: Data Abstractions Lecture 9: B Trees Dan Grossman Spring 2010.
Secure Multicast (II) Xun Kang. Content Batch Update of Key Trees Reliable Group Rekeying Tree-based Group Diffie-Hellman Recent progress in Wired and.
ZIGZAG A Peer-to-Peer Architecture for Media Streaming By Duc A. Tran, Kien A. Hua and Tai T. Do Appear on “Journal On Selected Areas in Communications,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CPSC 231 B-Trees (D.H.)1 LEARNING OBJECTIVES Problems with simple indexing. Multilevel indexing: B-Tree. –B-Tree creation: insertion and deletion of nodes.
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau IEEE ICNP 2002.
Computer Science Red-Black CS 330: Algorithms and Red-Black Trees Gene Itkis.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
B-Trees Chapter 9. Limitations of binary search Though faster than sequential search, binary search still requires an unacceptable number of accesses.
1 Group Key Agreement - Theory and Practice - Ph.D Defense Presentation June 29, 2015 Yongdae Kim.
1 Database Tuning Rasmus Pagh and S. Srinivasa Rao IT University of Copenhagen Spring 2007 February 8, 2007 Tree Indexes Lecture based on [RG, Chapter.
Computer Science CSC 774 Adv. Net. SecurityDr. Peng Ning1 CSC 774 Advanced Network Security Topic 4. Broadcast Authentication.
CPSC 335 BTrees Dr. Marina Gavrilova Computer Science University of Calgary Canada.
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups David Insel John Stephens Shawn Smith Shaun Jamieson.
Lecture 17 Trees CSCI – 1900 Mathematics for Computer Science Fall 2014 Bill Pine.
Project guide Dr. G. Sudha Sadhasivam Asst Professor, Dept of CSE Presented by C. Geetha Jini (07MW03)
Binary Trees, Binary Search Trees RIZWAN REHMAN CENTRE FOR COMPUTER STUDIES DIBRUGARH UNIVERSITY.
Red-Black Trees Acknowledgment Many thanks to “erm” from Purdue University for this very interesting way of presenting this course material. 1.
Topic 17 Introduction to Trees
2-3 Trees, Trees Red-Black Trees
B-Trees. Motivation for B-Trees So far we have assumed that we can store an entire data structure in main memory What if we have so much data that it.
A Study of Balanced Search Trees: Brainstorming a New Balanced Search Tree Anthony Kim, 2005 Computer Systems Research.
The School of Electrical Engineering and Computer Science (EECS) CS/ECE 419/478 Applied Cryptography ADVANCED KEY ESTABLISHMENT AND GROUP KEY MANAGEMENT.
Lecture 11COMPSCI.220.FS.T Balancing an AVLTree Two mirror-symmetric pairs of cases to rebalance the tree if after the insertion of a new key to.
K-Anycast Routing Schemes for Mobile Ad Hoc Networks 指導老師 : 黃鈴玲 教授 學生 : 李京釜.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Data Structures and Algorithms in Parallel Computing Lecture 2.
1Computer Sciences. 2 HEAP SORT TUTORIAL 4 Objective O(n lg n) worst case like merge sort. Sorts in place like insertion sort. A heap can be stored as.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.3 Group Key Distribution Acknowledgment: Slides on.
Seminar On Rain Technology
Lecture 23 Red Black Tree Chapter 10 of textbook
Golden Linear Group Key Agreement Protocol
NSF Faculty Career Award
B+ Tree.
Announcements All Labs and Their Demo All HWs and Their Grading
CSC 774 Advanced Network Security
Distributed security – Dynamic Group Key Management by Jaman Bhola
Combinatorial Optimization of Multicast Key Management
Diffie-Hellman Algorithm
… 1 2 n A B V W C X 1 2 … n A … V … W … C … A X feature 1 feature 2
Key Management Protocols
Presentation transcript:

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 5.2 Tree-Based Group Diffie Hellman Protocol Acknowledgment: Slides were originally provided by Dr. Yongdae Kim at University of Minnesota.

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security2 Membership Operations Formation Member add Member leave Group merge Group partition

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security3 Membership Operations Join: a prospective member wants to join Leave: a member wants to (or is forced to) leave Partition: a group is split into smaller groups –Network failure: network event causes disconnectivity –Explicit partition: application decides to split the group Merge: two or more groups merge to form one group –Network fault heal: previously disconnected partitions reconnect –Explicit merge: application decides to merge multiple pre- existing groups into a single group

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security4 Tree-Based Group Diffie Hellman Simple: One function is enough to implement it Fault-tolerant: Robust against cascade faults Secure –Contributory –Provable security –Key independence Efficient –d is the height of key tree ( < O(log 2 N)), and N is the number of users –Maximum number of exponentiations per node 3d

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security5 Key Tree (General) n4n4 n5n5 gn4n5gn4n5 n6n6 n1n1 n2n2 n3n3 gn2n3gn2n3 gn1gn2n3gn1gn2n3 g g n 1 g n 2 n 3 g n 6 g n 4 n 5 gn6gn4n5gn6gn4n5

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security6 Key Tree (n 3 ’s view) gn4gn4 gn5gn5 ggn4n5ggn4n5 gn6gn6 gn1gn1 gn2gn2 n3n3 gn2n3gn2n3 gn1gn2n3gn1gn2n3 GROUP KEY ggn6gn4n5ggn6gn4n5 = g g n 1 g n 2 n 3 g n 6 g n 4 n 5 n3n3 gn2n3gn2n3 gn1gn2n3gn1gn2n3 GROUP KEY Key-path: Set of nodes on the path from member node to root node gn1gn1 gn2gn2 ggn6gn4n5ggn6gn4n5 Co-path: Set of siblings of nodes on the key-path Member knows all keys on the key-path and all blinded keys Any member who knows blinded keys on every nodes and its session random can compute the group key.

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security7 Join (n 3 ’s view) n3n3 gn1gn1 gn2gn2 ggn1n2ggn1n2 gn3gn1n2gn3gn1n2 gn4gn4 Tree(n 4 ) n3n3

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security8 n3n3 Join (n 3 ’s view) gn1gn1 gn2gn2 ggn1n2ggn1n2 gn3gn1n2gn3gn1n2 gn4gn4 n3n3 gn3n4gn3n4 ggn1n2gn3n4ggn1n2gn3n4

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security9 Leave (n 2 ’s view) gn1gn1 n2n2 gn1n2gn1n2 gn3gn3 gn4gn4 ggn1n2gn3n4ggn1n2gn3n4 ggn3n4ggn3n4 n2n2 gn1gn1

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security10 Leave (n 2 ’s view) n2n2 gn1n2gn1n2 gn3gn3 gn4gn4 ggn1n2gn3n4ggn1n2gn3n4 ggn3n4ggn3n4 n2n2

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security11 Leave (n 2 ’s view) gn3gn3 gn4gn4 ggn3n4ggn3n4 n 2’ g n 2’ g n 3 n 4

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security12 Partition (n 5 ’s view) gn4gn4 n5n5 gn4n5gn4n5 gn1gn1 gn3gn3 ggn2n3ggn2n3 ggn1gn2n3ggn1gn2n3 g g n 1 g n 2 n 3 g n 6 g n 4 n 5 gn6gn4n5gn6gn4n5 n6n6 n2n2 gn6gn6 gn2gn2 gn6gn6 gn2gn2 n5n5

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security13 Partition (n 5 ’s view) gn4gn4 n5n5 gn4n5gn4n5 gn1gn1 gn3gn3 gn2n3gn2n3

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security14 Partition (n 5 ’s view) gn1gn1 gn3gn3 gn4n5gn4n5 gn4gn4 n5n5 n5n5 gn3gn3 n5n5 Change share n 5’ ggn1n3ggn1n3 g n 4 n 5’ g g n 1 n 3 g n 4 n 5’

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security15 Partition: Both Sides gn4gn4 n5n5 gn1gn1 gn3gn3 gn6gn6 gn2gn2

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security16 Partition: Both sides (N 5 and N 6 ) gn1gn1 gn3gn3 gn2gn2 ggn1n3ggn1n3 n 5’ g n 4 n 5’ g g n 1 n 3 g n 4 n 5’ g n 2 n 6’ n6n6 n2n2 n 6’ gn4gn4

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security17 Merge (N 2 ’s view) ggn3n4ggn3n4 gn4gn4 ggn5gn3n4ggn5gn3n4 gn5gn5 gn3gn3 ggn1n2gn5gn3n4ggn1n2gn5gn3n4 ggn6n7ggn6n7 gn7gn7 gn6gn6 gn1n2gn1n2 n2n2 gn1gn1 n2n2 gn1gn1 gn1n2gn1n2 n2n2

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security18 Merge (to intermediate node) ggn3n4ggn3n4 gn4gn4 ggn5gn3n4ggn5gn3n4 gn5gn5 gn3gn3 n1n1 n2n2 gn1gn1 gn1n2gn1n2 ggn6n7ggn6n7 gn7gn7 gn6gn6 n2n2 ggn1n2gn6n7ggn1n2gn6n7 gggn1n2gn6n7gn5gn3n4gggn1n2gn6n7gn5gn3n4

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security19 Tree Management: do one’s best Join or Merge Policy –Join to leaf or intermediate node, if height of the tree will not increase. –Join to root, if height of the tree increases. Leave or Partition policy –No one can expect who will leave or be partitioned out. –No policy for leave or partition event Successful –Still maintaining logarithmic (height < 2 log 2 N)

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security20 Discussion Efficiency –Average number of mod exp: 2 log 2 n –Maximum number of round: log 2 n Robustness is easily provided due to self- stabilization property