a survey of key management for secure group communication
play

A survey of Key Management for Secure Group Communication Sandro - PowerPoint PPT Presentation

A survey of Key Management for Secure Group Communication Sandro Rafaeli and David Hutchison Presented By: Anil Bazaz CS6204, Spring 2005 Intro: Group Communication Uses IP multicast to transmit data Does not limit access to data No


  1. A survey of Key Management for Secure Group Communication Sandro Rafaeli and David Hutchison Presented By: Anil Bazaz CS6204, Spring 2005

  2. Intro: Group Communication ♦ Uses IP multicast to transmit data ♦ Does not limit access to data ♦ No authentication or access control CS6204, Spring 2005

  3. Intro: Basic Solution ♦ Encryption – Encryption using a group key – Selective Key Distribution ♦ Challenges – Rekeying Group Key with membership changes – Backward Secrecy – Forward Secrecy CS6204, Spring 2005

  4. A simple scheme ♦ A secret key for all members ♦ Group key distributed using secret keys ♦ Problems: – Requires extensive computation – Size of message containing group key CS6204, Spring 2005

  5. Categories of key management schemes ♦ Centralized key management protocols ♦ Decentralized key management protocols ♦ Distributed key management protocols CS6204, Spring 2005

  6. Centralized Key Management ♦ Single Entity Controls the group (KDC) ♦ Single point of failure ♦ Scalability Issues ♦ Measuring Efficiency – Storage Requirements – Size of Messages – Backward & forward Secrecy – Collusion CS6204, Spring 2005

  7. Logical Key Hierarchy CS6204, Spring 2005

  8. Logical Key Hierarchy Join Operation Leave Operation CS6204, Spring 2005

  9. Centralized Flat Table ♦ Table has one entry for TEK ♦ 2w entries for KEKs (w = No. of Bits in member ID) ♦ ID determines KEKs held by members CS6204, Spring 2005

  10. Centralized flat table ♦ Rekeying: – {TEK new } unchanged KEKs – {KEKs new }KEKs old , TEK new ♦ Susceptible to collusion attacks CS6204, Spring 2005

  11. Decentralized Architecture ♦ Large group split into smaller groups ♦ Controllers for subgroups ♦ More fault tolerant ♦ Measuring Efficiency – Key independence – Decentralized controller – Local Rekey – Key vs. Data – Backward & forward secrecy – Type of Communication (1 to n or n to n) CS6204, Spring 2005

  12. Intra-Domain Group Key Management ♦ DKD: Domain Key Distributor ♦ AKD: Area Key Distributor ♦ Single key for everybody ♦ Single point of failure CS6204, Spring 2005

  13. MARKS ♦ Applies to time lengths (TV transmission) ♦ Keys changed as function of time CS6204, Spring 2005

  14. Distributed Key Management ♦ No group controller ♦ Group key generation: contributory or single member ♦ Evaluating efficiency – Number of rounds – Number of messages – Processing during setup – DH key CS6204, Spring 2005

  15. Group Diffie-Hellman Key Exchange ♦ Group agrees on public Values q and α ♦ Upflow: – First member calculates α x1 , passes it along – Subsequent members receive set, raise it, pass it along – Example: • Fourth member receives set: { α x1 , α x1x2 , α x1x2x3 } • Sends set: { α x1 , α x1x2 , α x1x2x3 , α x1x2x3x4 } CS6204, Spring 2005

  16. Group Diffie-Hellman Key Exchange ♦ Member n calculates key using : α x1x2x3…Xn mod q ♦ Downflow: – Each member calculates Key – Each member provides intermediate values to lower index members – Example (n = 5) • Fourth member recieves: { α x5 , α x1x5 , α x1x2x5 , α x1x2x3x5 } • Fourth member sends: { α x5x4 , α x1x5x4 , α x1x2x5x4 } CS6204, Spring 2005

  17. Distributed Logical Key Hierarchy ♦ Key Hierarchy generated among members ♦ Subtrees agree on mutual key ♦ Left subtree: leader m l , key k L ♦ Right subtree: leader m r , key k R ♦ Protocol – m l chooses k LR , sends it to k R – m l encrypts k LR with k L sends it to subtree L – m r encrypts k LR with k r sends it to subtree R CS6204, Spring 2005

  18. Distributed Logical Key Hierarchy CS6204, Spring 2005

  19. Conclusion ♦ Lots of schemes for key management ♦ Centralized: – Simplest and easiest – Single point of failure, scalability ♦ Decentralized: – Relatively harder – Interfering with data paths ♦ Distributed – Not scalable – Not fault tolerant CS6204, Spring 2005

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend