An Efficient Group Key Generation - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

An Efficient Group Key Generation

Description:

CIST & GSIS, Korea University. Nov. 16. 2005. 2. Contents. Multi-layer ad hoc Network (Battlefield) ... Includes regular ground mobile nodes (GN) GN is equipped ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 14
Provided by: nathan113
Category:

less

Transcript and Presenter's Notes

Title: An Efficient Group Key Generation


1
An Efficient Group Key Generation in the
Battlefield
Jin Wook Byun byunstar_at_korea.ac.kr CIST GSIS,
Korea University
Nov. 16. 2005
2
Contents
  • Multi-layer ad hoc Network (Battlefield)
  • Password-based key exchange protocols
  • An efficient Group Key Generation in Battlefield
  • Conclusion

3
Multi-layer Ad-hoc Network
  • Multi-layer Ad-hoc Network
  • Ground MANET
  • Includes regular ground mobile nodes (GN)
  • GN is equipped with limited powers.
  • Ground mobile backbone network
  • Includes special fighting nodes such as tanks.
  • Tanks may carry a lot equipment than soldiers.
  • Unmanned aerial vehicles (UAV)
  • UAV maintains a station that at an altitude of
  • 50 thousands feet by flying a circle.

4
Motivation Contributions
  • Motivations
  • Second and third layers gt the first layer
  • Communicational and computational power !!
  • The first Ground MANET
  • Various physical attacks and bombs with dynamic
    changing network configuration
  • Lightweight, convenient, and secure cryptographic
    solutions should be applied to soldiers
  • N-Party EKE-D Protocol
  • Constant round - lightweight
  • Distinct Human-memorable passwords - convenient
  • Dynamic setting - MANET

Battlefield !!
5
Password-based Key Exchange
  • Goal
  • Confidentiality, Integrity
  • Application
  • Building secure communications in cryptographic
    protocols such as IPSec, SSL.
  • Password-based Key Exchange (PAKE)
  • Shared Password-Authenticated Model
  • Provides PAKE between a client and server using
    shared password
  • Different Password-based Authenticated Key
    Exchange (DPWA)
  • Provides PAKE between a client and a client using
    different passwords

6
Password-based Key Exchange
  • Brief History in this area
  • Different Password- Authentication Model (DPWA)
  • Two party
  • 1995, Steiner et al. 3-Party EKE
  • 1998, Lin et al. LSSH-3PEKE
  • 2002, Byun et al. C2C-PAKE
  • 2005, Byun et al. efficient and provably secure
    C2C-PAKE
  • 2005, Abdalla et al. Generic construction of a
    3-party protocol
  • N-party
  • 2005, Byun et al. suggested N-party EKE protocols
  • 2005, Byun et al. suggested N-party EKE secure
    against insider attacks.

7
Model and Definition
  • NEKE Security
  • Assumption
  • Computational Diffie-Hellman Assumption

Asks queries
Test Query
Coin toss b If b1, real sk?SK Else, random str?SK
SK
Guess b
8
N-party EKE-D
  • Setup Algorithm

9
N-party EKE-D
  • Leave Algorithm

10
N-party EKE-D
  • Join Algorithm

11
Security Results
  • N-party EKE-D
  • of send, hash, enc/dec queries
  • Forward Secrecy
  • Backward Secrecy

12
Conclusion
  • N-Party EKE-D
  • Different passwords
  • Constant round
  • Provable security
  • Dynamic scenario
  • On Going works
  • We are now designing a general key management
    framework covering all layers of Multi-layer
    ad-hoc networks

13
Thank you very much !!Q AE-mail address
byunstar_at_korea.ac.kr
Write a Comment
User Comments (0)
About PowerShow.com