Security of bsw time bound hierarchical key management scheme for secure broadcasting

243 views
184 views

Published on

For more projects visit @ www.nanocdac.com

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
243
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Security of bsw time bound hierarchical key management scheme for secure broadcasting

  1. 1. Security of Bertino-Shang-Wagstaff Time-Bound Hierarchical KeyManagement Scheme for Secure BroadcastingABSTRACTRecently, Bertino, Shang and Wagstaff proposed a time-bound hierarchical keymanagement scheme for secure broadcasting. Their scheme is built on elliptic curvecryptography and implemented with tamper-resistant devices. In this paper, we presenttwo collusion attacks on Bertino-Shang-Wagstaff scheme. The first attack does not needto compromise any decryption device, while the second attack requires to compromisesingle decryption device only. Both attacks are feasible and effectivewww.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  2. 2. EXISTING SYSTEMTzeng proposed a time-bound cryptographic key assignment scheme for access control ina partial-order hierarchy. Tzeng’s scheme requires the computation of Lucas functionsand module exponentiations to derive a secret class key and thus, is computationallyinefficient. Moreover, Yi and Ye has shown that three users can conspire to access somesecret class keys that they should not know according to Tzeng’s scheme . In 2004, Chienimproved the efficiency and security of Tzeng’s scheme, and proposed another time-bound hierarchical key assignment scheme. Chien’s scheme is built on hash function andimplemented with tamper-resistant devices, and therefore, greatly reduces thecomputation load and implementation cost. However, Yi has shown that three users canstill conspire to decrypt some data with one of their decryption devices, which should nothave derived the decryption key according to Chien’s scheme.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  3. 3. PROPOSED SYSTEMInspired by Chien’s idea, Bertino, Shang and Wagstaff [1]proposed a new time-boundhierarchical key management schemefor secure broadcasting recently. Their scheme isbuilt on ellipticcurve cryptography and also implemented with tamper-resistant devices.In this paper, we present two collusion attacks on Bertino-Shang-Wagstaff scheme. Inboth attacks, two users collude todecrypt some broadcast data that they have notsubscribed to,using one of their decryption devices.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  4. 4. SYSTEM SPECIFICATIONHARDWARE CONFIGURATIONPROCESSOR : PENTIUM IVRAM : 512 MD SD RAMHARD DISK : 50 GBSOFTWARE CONFIGURATIONOPERATING SYSTEM : Windows XP (Version 2002)ENVIRONMENT : Visual Studio .NET 2008.NET FRAMEWORK : Version 3.5FRONT END : C#.NetLANGUAGE : C#www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  5. 5. BACK END : SQL SERVER 2005www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  6. 6. BACK END : SQL SERVER 2005www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur

×