1. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
BKSGKMP: Blind Key Sequenced Group Key Management
Protocol
S Archana Reddy
Tudi Ram Reddy Institute of science & Technology, JNTU
Bibinagar, Gudur, Andhra Pradesh, India
E-mail: archanareddys22@gmail.com
J Srikanth
Aurora’s Engineering College, JNTU
Bhongiri, Andhra Pradesh, India
E-mail: jsrikanth@aurora.ac.in
Abstract
Group communication is erupting in Internet world through social network, online chatting, Video/audio
conferencing and games. As internet is free and open environment and also the major medium of communication,
information security is the most important concern. Hence, the group members must be provided with security
services such as authentication, confidentiality, integrity and access control among themselves. To serve these
provisions, the group members must use a Group Key (GK), used to encrypt or decrypt the message
delivered/received. Many efficient and secure key generation techniques are developed for Group Keys. Of these,
Tree based Group Diffie Hellman (TGDH) group key agreement protocol is one of the most efficient. As internet,
having distributed computers has the characteristic of heterogeneity i.e. a person can access internet either through
PC, laptop, mobile computer, etc. Thus, TGDH and other group key agreement protocols have the assumption that
all the GK accessing people have the same capacity of computing. Hence, this research considers all the dimensions
including various diversities and improves efficiency of GK generation process by moving off low performing
candidates.
Key Words: Group key management, Scalability, Secure multicast, Re-keying.
1. Introduction
As we all know, today group communication act is mostly done through internet world through various social
networks, applications, video/audio conferencing etc. Security plays a major role in such contexts. As earlier paper
(Wong et al. 2000) argues that the process of authentication and key sharing is done before the start of group
communication session. As the GK has a vital role in group communication, all the group members donate for its
generation and usage. On the other hand, it has been reported that (Steiner et al. 2000) that the GK generation
process has many modular exponentiations included in it, making the process take a long time for computation even
if the number of members in the group are less (approx 100) . To provide tight security Wong et al. (2000) specified
that the GK must be changed after every updating of group members in order to provide privacy to every set of
group members .Thus, GK management is more concerned about the generation of efficient GK this point was made
number of times Kim et al. (2000) that the modular exponentiation which depends on number of group members is a
costly process. The usage of key trees in this context serves the purpose best by reducing the overhead of huge
computations. TGDH is one such tree based group key agreement protocol. The efficiency of TGDH is O(log2n), n
representing number of group members. One major drawback of TGDH is that it remains efficient until tree is kept
correctly balanced. But balancing a key tree is another problem to deal with. Moreover, according to TGDH as well
as other key management protocols, all the group members are in homogeneous environment. But, in reality,
160
2. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
internet is a distributed computer network having the characteristic of heterogeneity, having different modes of
accessing media (PC, laptop, mobile). This may leads to some computation problems as person working from
mobile internet takes more time compared to person working from any workstation or PC. Also, if a person in a
group is far away from the other members in terms of location or in network latency area, the GK generation process
may become inefficient as several message sharing practices are required while generating GK. Thus, such members
leading to degradation of performance of GK generation process is deleted from the list. If instead of tree-based, we
use queue-based DH group key protocol, it improves latency of network and the heterogeneity of the network world.
Still it has an overhead of balancing tree every time the group members are updated. The queue based DH protocol
provides a Queue based divide and conquer algorithm, which needs comparatively less maintenance to accomplish
the task. This queue based mechanism is used to identify the fast and low performance members. The process of
identifying fast and low performance members is different in prior and proposed agreements. While tree-based
group key agreement does it by comparing elapsed times of the members to compute their public keys, the proposed
protocol uses Group key Controller Server (GCS). GCS asks all the members to compute their keys and store it in its
queue. It follows First-In - First- Out (FIFO) strategy to store and retrieve the data from the queue. The keys of the
members are stored from right to left based on their performance i.e. fastest on right followed by lowest on the left.
The proposed queue based protocol does not have additional overhead of tree balancing. As security and efficiency
are major concerns for the group communication, low performance members are found and logged off from the
group. Thus, this research is primarily concerned about improving GK generating process by increasing its usability
to the peak level.
1.1. Related work
Group communication can be at different levels it can range from the level of multi casting to the level of
conferencing using groupware or social networking applications. Many security services are indulged in the
communication process to provide high level of security. This can be done by following security mechanisms for key
distribution and communication session. The key management wing is the base for the secure communication as it is
the one concerned with safe key generation and distribution. Another main aspect to consider for safer
communication is to have a secure channel to destine our messages correctly. In node to node communication, the
management of GK can be done in two ways. First is the Centralized group key distribution which makes use of a
key server for GK management. In this method the generation and distribution of GK can be made possible with the
use of a Trusted Third Party (TTP). But, this approach may have two drawbacks Firstly: TTP should be always
available and Secondly : TTP should be a member of every subset of the group to allow the continuous operation
even in the cases of network distribution. The first drawback is has been effective as Kim (2004) claims with fault
tolerance and replication methodologies. The second drawback is that it is impossible to attain in an efficient
procedure. In one-to-many multicast cases, the centralized technique serves well, because in this case the TTP is
physically near to the communication source and thus can support continuous operation even in the case of network
distribution. But, mostly one-to-many multicast process is aimed at only partition having the source. In case of
dynamic node to node communication, the communication must be continuous even if the number of network
partitions is variable. Kim et al. (2004) argues that in such cases, centralized technique may not be suited well. For
these exclusive cases, the second approach is more applicable, i.e. decentralized group key distribution also called
group key agreement. It includes the generation and distribution of key dynamically. Unlike centralized key
distribution which is based on single entity, contributory distribution is a contribution based key management
technique. It requires contribution from every group member for the GK. This avoids the need of TTP and thus
avoiding single point failure. This approach is well applicable to peer-to-peer communication, since it allows
contribution for shared key from all the peers. Hence, this research is concerned with the decentralized and
contributory GK management. Presently, there are five key agreement protocols available. They are:
1. CKD (Centralized Key Distribution)
One possible definition (Amir et al. pp.330-343, 2000) is CKD and GDH are similar to each other except that CKD
has a CKD center to generate and distribute GK to every group member.
GK = gK1K2K3K4……Kn-1Kn
161
3. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
2. BD (Burmester-Desmedt)
On other hand, it has been reported (Burmester et al, pp. 275-286, 1994.) that this protocol allows dynamic group
functions. It has less computational overhead due to the presence of two modular exponentiations. But, it has a
drawback of needing large message exchanges for the generation of GK.
GK = gK1K2+K2K3+……+Kn-1Kn
3. TGDH (Tree based Group Diffie Hellman)
Kim (2004) argued that it is one of the most efficient group key agreement protocols having less communication and
computation (O(log n) modular exponentiation) overhead. It has the advantage of provides robustness.
k1k2 g k3k4 ..... kn1.... kn1kn
GK g gg g g
g
4. GDH (Group Diffie Hellman)
Steiner & Tsudik (2000) argues that this protocol though assures high level of security, has included high
computational cost too (O(n) modular exponentiation) and it hardly provide robustness.
GK = gK1K2K3K4……Kn-1Kn
5. STR (Skinny Tree)
Wong & Gouda (2000) argues that it is updated to support dynamic group operations. It has the advantages of low
communication overhead, robustness and well suited to add new member in the group. The only backlog of this
protocol is it is difficult to exclude a group member (O(n) modular exponentiation)
k2 g k1
kn g kn1 .... g
GK g
1.2. Tree- based Group Diffie Hellman (TGDH)
It is a tree based extension of DH key exchange protocol. The computation of GK plays a major role for a secure
group communication. Hence, this point has been made a number of times (Tsudik 2000, 2004; Burmester, and
Desmedt 1994; Fratto 2001; Kim & Perrig 2004; Steiner & Waidner 2000; Wong, Gouda & Lam2000) but the each
group member has his contribution for the key computation. Thus, GK management mainly aims at decrementing
GK computational overhead which occurs due to the inherent expensive cryptographic operations [19]. Hence, to
reduce the overhead of GK computation, a key tree structure is adapted which reduces the number of times of
computations. On other hand, Amir et al (2000 pp. 330-343) has reported that the key trees are even implemented in
centralized group key generation to decrease the complexity of key management Hong & Benitez (2006) argues that
the TGDH is one of such Group key Generation Protocols (GKGPs). Let us consider an example.
162
4. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
Figure 1: A binary tree for generating group key
In the binary key tree for generating a GK in Figure 1, each node < l, v > represents a vth node at level l in the tree
and node < l, v >’s secret (private) key K<l, v> and a blind (public) key BK<l, v> = f (K<l, v>) = gK<l, v>mod p, where g
and p are 1,024 bit long integers. Every member holds the secret key along the key path. For simplicity, assume each
member knows the blind keys in the key tree. The key paths are the shadowed nodes (node < 0, 0 >, < 1, 0 > and <
2, 0 >) in Figure 1. The final group key K < 0, 0 > in Figure 1 is computed with the key paths using blind keys BK<3,
0>, BK<3, 1>, BK<2, 1>, BK<2, 2>, BK<3,2>, and BK<3, 3> . Therefore, the final group key can be computed as Equation (1):
g 3,0 3,1 g 2,1 g 2,2 g 3,2 3,3
k k k k k k
K0,0 g g g
…… (1)
Even TGDH has two drawbacks First balancing GK generation tree which is an overhead. The balance process
should maintain the efficiency of the GK computation to O (log2n). Else, the performance goes worse. The second
drawback is the member’s diversity when a new member joins the group. The updating of a new member from a
diverse environment may disturb the time for key generation. Hence, to deal with these problems, we introduce a
new protocol.
1.3. Problem definition
The members in the group apart from being in distributed environment can be physically varied over internet.
Moreover, the members can be in the environment with the characteristic of heterogeneity. Standard GK agreement
protocols make all the group members to donate for the generation of GK. Furthermore, any member leading to
degrade of performance is logged off and the members having fast performance must be authorized to contribute in
the generation and distribution of GK. The GKGP depends upon the computing capacity of group members and
network latency. Hence, in order to avoid the time delay and performance degradation, we better delete less
performance candidates from the management process.
2. Blind Key sequenced group key management protocol [BKSGKMP]
The below figure shows the Blind Key Sequenced Group key entity model. The BKSGKMP has a database having
the list of currently login members, user IDs, their passwords, MAC (Media Access Control) addresses and Blind
key queues. Hong, & Benitez (2005) argues that the whenever a member logins to the server, it compares his ID,
password and MAC address from the database in the server. After authenticating group members, they participate in
the GK generation by storing their respective blind keys into the server. The server, now, saves all such keys into a
163
5. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
queue called Blind Key Queue (BKQ) in FIFO order. Later, the server announces the members who will involve in
the GK generation at the next stage.
Figure 2: Blind Key Sequenced Group key entity model
On other hand, Moser et al.(1994) reported that the BKSGKMP is very much equivalent to Virtual Synchrony (VS)
which makes use of a client daemon program for managing the members. VS runs on every machine of member and
synchronizes with every member to manage the members with every update of the group members set. VS is used to
know the status of all other members of the group. But, the usage of VS may be complicated as it needs to
synchronize every member of the group because members keep on changing their status and thus need a lot of
exchanges. Thus, BKSGKMP uses GCS server which reduces the effort of maintaining daemons. Hence, GCS is
taken care by only one machine in our protocol.
Present process of authentication is to use a self signed certificate. But, it lacks to make sure that the sign is from the
actual member or not. Hence, to overcome this drawback we use GCS as a fully trusted party. The threat model
considers both passive and active outsiders (people who are not authenticated members). Eavesdropping is a passive
outsider attack for finding out the keys where as inserting, removing, changing and delaying protocol messages can
be considered as active outsider attacks.
BKSGKMP invites only fast performing members having less network latency to participate in the GK generation
and thus improving efficiency of the management system. The GK must be updated with every change in the set of
group members. The details of the proposed procedure are explained as following:
164
6. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
Fig 3: Set of BK queues in server
Let us assume that number of group members is n and members are M1, M2, M3, … Mn-1, Mn for n<100. GCS asks
all group members to compute blind key g Ki mod p, where 1<=i<=n, g is exponential base, p is a prime number and
Ki is the ith private key. GCS collects all keys and save them in its queue according to FIFO order. This is used to
identify fast performance candidates to invite them for GKGP at the next stage. The keys are stored from left to right
i.e. placing keys of fast performance candidates at front and that of less performance candidates at the rear of the
queue. Two factors are taken into consideration for computing performance of candidates. They are their computing
capacity and network latency. Even if the performance of a candidate is high, if his message exchange time is more,
then he is also considered to be a low performance candidate and thus be filtered. Thus, BKQ is used to determine
performance considering both parameters at a time. The number of levels in the GK generation process is calculated
by the number of group members. If group size is n, then number of levels will be log2(n+1). At level 1, blind key is
generated followed by assigning two opposite blind keys together to next level. Then the members in the colored
region are asked to calculate Diffie Hellman key exchange using those two blind keys and to save them in the queue
in (First Come First Serve) FCFS order at each and every level. As in the figure 3, the fastest performing candidate’s
key is stored at A1, second fastest at A2 and so on. The queue always allocate the key in the first cell, the key in the
last one i.e. member of A1 has to compute with the member of An. Thus, the blind keys of those two spots will be
computed. The process continues and the final GK is computed as
… (2)
165
7. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
Here, only members in the colored region are invited in GKGP of next stage. Thus BKSGKMP avoids
delays and performance degradation.
3. Performance Analysis
Here, we analyze the cost of computation and network latency for enter, exit, combine and divide of the
BKSGKMP. To depict the performance of BKSGKMP, total elapsed time was found for various key generation
protocols and they are compared to show that BKSGKMP is a better choice. Total elapsed time is the time from the
joining into the group to the time when GKGP completes. The above mentioned information can be seen in the
following figures from 4 to 7.
3.1. Membership Operations
BKSGKMP must be capable of providing different functions to the members with every update of the group set.
BKSGKMP provides some protocols to allow such functions. They are:
1. Partition: a set of members divided from the group.
2. Merge: a set of previously divided group is allowed to join with the present group.
3. Join: a person is added to the group.
4. Leave: a person is deleted from the group.
The analysis is mainly aimed at the complete number of control messages, the number of exchanges, drawbacks
included and the cost of GKGP. The whole cost is the summation of all members’ costs included in the generation
process at each stage. The proposed BKSGKMP is compared with all above mentioned various available GK
agreement protocols. Let us see the comparison in the form of a table having the present group size, no. of members
joined/ exited/merged which are denoted by n, m, k (m>=k) and p respectively.
Table 1: Communication and computation costs summary
The above table compares the communication and computation costs of these five protocols is taken from Fratto
(2001 pp. 69-77) Here, no. of rounds implies no. of exchanges happened between group members. Whenever a
person enters into the group, GCS asks the existing members to compute a new blind key which is the foremost
stage. In the next stage, all the blind keys are collected from all existing members. Where in join, two stages are
166
8. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
required; we need only one stage in case of leaving, as exiting person just informs all other group members through
a single broadcast. Moreover, the no. of messages exchanged is also reduced to half of the prior stage. The infinite
series α+ αr+ αr2+…..+ αrn (n is infinite) is convergent and its sum is α / (1-r) iff -1<r<1[1]. Here, α = n-1 and r=1/2.
Hence, at last, no. of messages is calculated based on this series leading to sum as (n-1)/(1-1/2) = 2n-2. In case of
division has the value (n-1)/m and r=1/2. Here, the value of α varies from other ones. Finally, the no. of messages
((n-1)/m)/(1-1/2) must be multiplied with m. Hence, the whole no. of messages (2n-2) is same in all cases.
Table 2: Total messages in join and leave for BKSGKMP
As it is known that modular exponentiation, which depends on number of group members, Fratto (2001) argues that
this is more expensive operation in case of TGDH and STR [8]. Thus, there is a direct relationship between no. of
group members and computational overhead.
3.2. Test Method
In order to do concise comparisons, the values of g, k, p are taken 1,024 bits long in all calculations. Lenstra (1999)
argued that these values are considered to be safe in present tech world. Apart from it, a technique is followed to
calculate the delay. Here, n represents no. of existing group members for all the protocols, where n = 10, 20, 30, 40,
50 and 60. The test bed chosen for this trial is a 64 Intel Pentium machine running Windows XP. As it was assumed
that all participators of GKGP are physically located uniformly across LAN (Local Area Network), one member
from each area must act as GCS to control GKGP with out participating in the generation process. With every entry
of a member, all the existing members calculate Blind keys and save it in the queue of BKQ; this is used to find out
low performance members and to oust them. To perform analysis test, the elapsed times are calculated for every
update of the group set. Tests are performed at GCS where the parameters of performance i.e. network latency and
computational delay is calculated for each member by exchanging messages between group members. It was tested
above 30 times by incrementing and decrementing a machine at a case. In case of LAN, the cost of computation is
comparatively less, between 17µsec and 25 µsec to send messages of length 1,024 bits. It may not be considered if
the no. of group members is 60 to the max. Most part of the calculated cost is due to computation. But, in case of
WAN (Wide Area Network), the overhead is completely regarding other thing. The elapsed time from USA to
Mozambique is 670 µsec; where the same in case from USA to Thailand is 420 µsec. Kim (2002) argued that the
LAN is million times faster than WAN . Let us leave the WAN based concept for later research. Thus, to show the
performance effectiveness of BKSGKMP, it was compared with other available protocols and thus proved.
3.3. Join Operation Results
The main drawbacks we face are computation and communication costs. Figure 4 depicts that BD and GDH are not
advisable in case of join cost (in terms of no. of group members). In the graphs, we denote x-axis with group size
and y-axis with cost of computation. But, in the same event, BKSGKMP, STR and TGDH are considered effective
as they make use of divide and conquer strategy to calculate GK. BKSGKMP is more efficient and is scaling
logarithmic in case of exponentiation size. TGDH as well as STR make use of binary tree to calculate GK.
BKSGKMP makes 2n-2 message exchanges which is large comparative to other protocols. The noticeable part here
167
9. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
is that, the more no. of message exchanges does not adversely affect the efficiency as the time to exchange messages
is 20 µsec to the most. Hence, BKSGKMP is considered more efficient comparatively to tree based protocols.
figure 4--- join cost comparison
3.4. Leave Operation Results
The cost of exiting depends on the no. of members will be left in the group. Hence, the no. of members exiting from
the group doesn’t really affect. Hence, cost of leaving is similar to that of joining. But, in case of STR, the cost of
exiting depends on the physical existence of the member exiting the group in the key generation tree. Hence, in STR
exit cost is not same as entry cost.
3.5. Partition Operation Results
For experimental results, the group is divided into smaller groups and is requested to calculate the GK of their
individual groups. In case of BKSGKMP, STR and TGDH, the physical existence of the member do matter; where
as it doesn’t in case of BD and GDH. In TGDH each time a partition occurs, the members of the group have to
update their binary trees which may not be feasible leading to TGDH as an inefficient protocol. But, in other
protocols the result is similar to reverse of leave event.
3.6. Merge Operation Results
The merge event happens after correcting the network error. The performances of all the protocols but GDH are
better. The reason is that GDH depends on the no. of existing group members. Apart from it, it has n+2m+1
exponentiations and n+2m+1 communications. The same doesn’t matter in other protocols where merge event is
similar to that of leave one. Thus, it can be concluded that protocols with divide and conquer strategy perform
consistent.
Based on these results, BKSGKMP is better performing protocol apart from its large message exchanges.
BKSGKMP makes use of a queue to calculate GK. Along with it, BKSGKMP considers heterogeneity and thus
allow only certain members to join the group. Thus, heterogeneity is considered in case of distributed group
members to improve the effectiveness of GKGP.
4. Conclusions
Tight security mechanisms are needed to allow secure communication among the group members. Thus, a
communication session must have security services to provide authentication, integrity, and confidentiality. Group
Key (GK) is the primary and key part of the safe group communication. The performance of GK generation process,
which is required for secure communication, may degrade due to less performing members. Thus, the generation
process must be done is a more precise way but filtering less performing members. Many changes are occurring in
the recent years as increase in usage of mobile computers, network clusters communication with standard servers.
Apart from this, heterogeneity and distributed computer environment became common in the current internet world.
Thus, GK management system must consider various parameters, differences and environments involved in the
communication. These considerations as the basis, the effectiveness of BKSGKMP protocol in comparison to other
168
10. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
protocols is proved. This protocol improves the efficiency by considering the parameters effecting the performance
i.e. computational delay and network latency. Thus, this research is aimed at and thus proved that GKGP is more
efficient and maximizes the applicability of communication.
References
M. Abramowitz, and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical
Tables, 9th printing, New York: Dover, p. 10, 1972.
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. N. Rotaru, T. Schlossnagle, J. Schultz, J. tanton, and G. Tsudik, Secure
group communication in asynchronous networks with failures, Integration and experiments," IEEE International
Conference on Distributed Computing Systems, pp. 330-343, 2000.
Y. Amir, Y. Kim, C. N. Rotaru, J. Schultz, and J. Stanton, Secure group communication using robust contributory
key agreement," IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 4, pp. 468-480, Apr. 2004.
Y. Amir, Y. Kim, and C. N. Rotaru, On the performance of group key agreement protocols," ACM Transactions on
Information and System Security, vol. 7, no. 3, pp. 457-488, 2004.
E. Bresson, O. Chevassut, D. Pointcheval, amd J. Quisquater, Provably authenticated group Diffie Hellman key
exchange," Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255-264,
Philadelphia, PA, 2001.
M. Burmester, and Y. Desmedt, A secure and efficient conference key distribution system," Advancesin Cryptology
- Eurocrypt'94, pp. 275-286, 1994.
W. Diffie, and M. E. Hellman, New directions in cryptography," IEEE Transactions on Information Theory, IT-
vol. 22, no. 6, pp. 644-654. Nov. 1976.
M. Fratto, In PKI Ww Trust?," Network Computing, vol.12, no. 18, pp. 69-77, Sep., 2001.
S. Hong, and N. L. Benitez, Media access control (MAC) address-based group key authentication scheme," The 9th
World Multi conference on Systemics, Cybernetics and Informatics, pp. 160-164, Orlando, Florida, USA, July 2005.
S. Hong, and N. L. Benitez, Enhanced Group Key Computation Protocol," The 2006 International Conference on
Security and Management (SAM'06), Las Vegas, USA, June 26-29, 2006.
Y. Kim, A. Perrig, and G. Tsudik, Simple and fault-tolerant key agr S. Hong, and N. L. Benitez eement for dynamic
collaborative groups," The 7th ACM Conference on Computer and Communications Security, pp. 235-244, ACM
Press, Athens, Greece, Nov. 2000.
Y. Kim, A. Perrig, and G. Tsudik, Communication efficient group key agreement," 17th International Information
Security Conference (IFIP SEC'01), pp. 229-244, June 2001.
Y. Kim, Group Key Agreement: Theory and Practice, Ph.D. thesis, May 2002.
Y. Kim, A. Perrig, and G. Tsudik, Tree-based group key agreement," ACM Transactions on Information and
System Security, pp. 60-96, 2004.
A. K. Lenstra, and E. R. Verheul. Selecting cryptographic key sizes," 99 PricewaterhouseCoopers CCE newsletter,
Nov. 1999. http://www.cryptosavvy.com/
L. E. Moser, Y. Amir, P. M. M. Smith, and D. A. Agarwal, Extended virtual synchrony," Proceedings of the IEEE
14th International Conference on Distributed Computing Systems, pp. 56-65, IEEE Computer Society Press, Los
Alamitos, CA, 1994.
M. Steiner, G. Tsudik and M. Waidner, Key agreement in dynamic peer groups," IEEE Transactions on Parallel
and Distributed Systems, vol. 11, no. 8, pp. 769-780, Aug. 2000.
169
11. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.3
D. Wallner, E. Harder, and R. Agee, Key Management for Multicast: Issues and Architecture, Internet-Draft draft-
wallner-keyarch-00.txt, June 1997.
C. Wong, M. Gouda, and S. Lam, Secure group communications using key graphs," IEEE/ACM Transactions on
Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
170