Project Proposal Presentation Research Methodology Gayan Jayasinghe 2007/MCS/024
Introduction  <ul><li>Never Lasting Problem of a man kind </li></ul><ul><ul><ul><li>Never Satisfy </li></ul></ul></ul><ul>...
Gap that tries to fill  <ul><li>“ Elliptic Curve Cryptographic (ECC) based Group Key Establishment Protocol for Mobile Ad ...
Group Key Management Protocol Dropping Node A <ul><li>Symmetric Key </li></ul><ul><ul><ul><li>Diffe Hellman Key Exchange <...
Elliptic Curve Cryptography (ECC) <ul><li>Small Devices can’t bare huge keys </li></ul><ul><ul><ul><li>Failure of PKI </li...
Elliptic Curve Cryptography (ECC) <ul><li>Solution is ECC </li></ul><ul><ul><ul><ul><li>Its security comes from the ellipt...
Defend <ul><li>ECC right candidate </li></ul><ul><ul><ul><li>Mathematically proved unbreakable </li></ul></ul></ul><ul><ul...
Upcoming SlideShare
Loading in...5
×

Project Proposal Presentation

8,482

Published on

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
8,482
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
80
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Project Proposal Presentation

  1. 1. Project Proposal Presentation Research Methodology Gayan Jayasinghe 2007/MCS/024
  2. 2. Introduction <ul><li>Never Lasting Problem of a man kind </li></ul><ul><ul><ul><li>Never Satisfy </li></ul></ul></ul><ul><ul><ul><li>Spreading not only to IT but to all visual/tangible/intangible objects in real life </li></ul></ul></ul><ul><ul><ul><li>What is it? </li></ul></ul></ul><ul><li>Security </li></ul><ul><ul><ul><li>We use “ cryptography ” </li></ul></ul></ul><ul><ul><ul><li>Can we talk about any IT solutions with out Security? </li></ul></ul></ul><ul><ul><ul><li>Standalone, networks, mobile networks </li></ul></ul></ul><ul><li>Mobile Ad hoc network security </li></ul><ul><ul><ul><li>Ad hoc nature </li></ul></ul></ul><ul><ul><ul><li>What are the limitations </li></ul></ul></ul>
  3. 3. Gap that tries to fill <ul><li>“ Elliptic Curve Cryptographic (ECC) based Group Key Establishment Protocol for Mobile Ad hoc networks” </li></ul><ul><ul><ul><li>Mobile Ad hoc Network √ </li></ul></ul></ul><ul><ul><ul><li>Group Key Management? </li></ul></ul></ul><ul><ul><ul><li>ECC, alien ?? </li></ul></ul></ul><ul><li>Group Key Management Protocol (GKMP) </li></ul><ul><ul><ul><li>Establishment of the shared key in mobile ad-hoc groups . </li></ul></ul></ul><ul><ul><ul><li>Compute the group key based on their individual contributions providing verifiable trust relationship between participants </li></ul></ul></ul>
  4. 4. Group Key Management Protocol Dropping Node A <ul><li>Symmetric Key </li></ul><ul><ul><ul><li>Diffe Hellman Key Exchange </li></ul></ul></ul><ul><ul><ul><li>Keep track of live nodes </li></ul></ul></ul><ul><ul><ul><li>Key Distribution </li></ul></ul></ul><ul><ul><ul><ul><li>Use of Efficient Data Structures </li></ul></ul></ul></ul>Different Key Dropping Node A
  5. 5. Elliptic Curve Cryptography (ECC) <ul><li>Small Devices can’t bare huge keys </li></ul><ul><ul><ul><li>Failure of PKI </li></ul></ul></ul><ul><ul><ul><ul><li>No more RSA, DSA in mobile devices </li></ul></ul></ul></ul><ul><li>But we need the same strength </li></ul><ul><ul><ul><li>Small key but same strength </li></ul></ul></ul><ul><ul><ul><ul><li>No more RSA, DSA on mobiles </li></ul></ul></ul></ul>The explosive growth in the use of mobile and wireless devices demands a new generation of PKI schemes that has to accommodate limitations on power and bandwidth, at the same time, to provide an adequate level of security for such devices.
  6. 6. Elliptic Curve Cryptography (ECC) <ul><li>Solution is ECC </li></ul><ul><ul><ul><ul><li>Its security comes from the elliptic curve logarithm, which is the DLP (Discrete Logarithm Problem) in a group defined by points on an elliptic curve over a finite field. This results in a dramatic decrease in key size. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>ECC offers equivalent security with smaller key sizes resulting in faster computations, lower power consumption, as well as memory and bandwidth savings. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>While these characteristics make ECC especially appealing for mobile devices, they can also alleviate the computational burden. </li></ul></ul></ul></ul>
  7. 7. Defend <ul><li>ECC right candidate </li></ul><ul><ul><ul><li>Mathematically proved unbreakable </li></ul></ul></ul><ul><ul><ul><li>Stronger than any other in Cryptographic History </li></ul></ul></ul><ul><ul><ul><li>Require little processing and memory power </li></ul></ul></ul><ul><li>GKMP </li></ul><ul><ul><ul><li>Suggest a protocol which satisfies </li></ul></ul></ul><ul><ul><ul><ul><li>Ad hoc requirements </li></ul></ul></ul></ul><ul><li>Asynchronous/Dynamic topology acceptable </li></ul><ul><ul><ul><ul><li>Efficient Key Distribution </li></ul></ul></ul></ul><ul><li>Problem of Key Size and key generation </li></ul><ul><ul><ul><li>It is solved </li></ul></ul></ul><ul><li>Computer Science proof of concept </li></ul><ul><ul><li>Able to cover all requirements </li></ul></ul><ul><ul><li>Technically feasible solution </li></ul></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×