SlideShare a Scribd company logo
1 of 11
Blom’s Key
Pre-distribution Scheme
- J A Y E S H
S U K D E O P A T I L
What is Key Pre-Distribution
∙ Key Pre-distribution is a scheme to distribute keys onto different sensor nodes
prior to deployment. Therefore, these sensor nodes creates network through
establishing secured links between different nodes using their shared secret keys
after the deployment.
∙ A key pre-distribution scheme has three phases:
∙ 1) Key Distribution
∙ 2) Shared Key Discovery
∙ 3) Path-key establishment.
Blom’s Key Pre-distribution Scheme
∙ Blom's scheme is a symmetric threshold key exchange protocol in cryptography. The scheme
was proposed by the Swedish cryptographer Rolf Blom in a series of articles in the early
1980s.
∙ A trusted party gives each participant a secret key and a public identifier, which enables any
two participants to independently create a shared key for communicating. Every participant
can create a shared key with any other participant, allowing secure communication
to take place between any two members of the group.However, if an attacker can
compromise the keys of at least k users, they can break the scheme and reconstruct every
shared key. Blom's scheme is a form of threshold secret sharing.
∙ Blom's scheme is currently used by the HDCP (High-bandwidth Digital Content
Protection) copy protection scheme to generate shared keys for high-definition content
sources and receivers, such as HD DVD players and high-definition televisions.
∙ The protocol
The key exchange protocol involves a
trusted party (Trent) and a group
of n users. Let Alice and Bob be two
users of the group.
∙ Protocol setup
Trent chooses a random and secret symmetric
matrix Dk,k over the finite field GF(p), where p is a
prime number. D is required when a new user is to be
added to the key sharing group.
∙ Inserting a new participant
New users Alice and Bob want to join the key exchanging group. Trent chooses public
identifiers for each of them; i.e., k-element vectors:
∙ For example:
∙ Trent then computes their private keys:
∙ Using D as described above:
Each will use their private key to compute shared keys with other participants of
the group
Computing a shared key between Alice and
Bob
∙ Now Alice and Bob wish to communicate with one another. Alice has Bob's
identifier IBob and her private key gAlice.
∙ She computes the shared key kAlice/Bob=gAliceTIBob, where T denotes matrix
transpose. Bob does the same, using his private key and her identifier, giving the same
result:
∙ They will each generate their shared key as follows:
Attack resistance
∙ In order to ensure at least k keys must be compromised before every shared
key can be computed by an attacker, identifiers must be k-linearly
independent: all sets of k randomly selected user identifiers must be linearly
independent.
∙ Otherwise, a group of malicious users can compute the key of any other
member whose identifier is linearly dependent to theirs. To ensure this
property, the identifiers shall be preferably chosen from a MDS-Code matrix
(maximum distance separable error correction code matrix).
∙ The rows of the MDS-Matrix would be the identifiers of the users. A MDS-
Code matrix can be chosen in practice using the code-matrix of the Reed–
Solomon error correction code (this error correction code requires only easily
understandable mathematics and can be computed extremely quickly).
References:
∙ https://weekly-geekly.imtqy.com/articles/269229/index.html
∙ http://cgiold.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto_Lectures/Stin
son_lectures/lec09.pdf
∙ https://mjoc.uitm.edu.my/main/images/journal/vol6-2-2021/3-Udin-et-al-
Vol-62.pdf

More Related Content

Similar to Blom Scheme CT -JSP.pptx

ch10_key_management.ppt
ch10_key_management.pptch10_key_management.ppt
ch10_key_management.ppt
PanimalarK
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
MelkamtseganewTigabi1
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
Sri Prasanna
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
Merlin Florrence
 

Similar to Blom Scheme CT -JSP.pptx (20)

Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
Ike
IkeIke
Ike
 
ch10_key_management.ppt
ch10_key_management.pptch10_key_management.ppt
ch10_key_management.ppt
 
chapter 7.pptx
chapter 7.pptxchapter 7.pptx
chapter 7.pptx
 
Applying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto libraryApplying Security Algorithms Using openSSL crypto library
Applying Security Algorithms Using openSSL crypto library
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Unit - 3.ppt
Unit - 3.pptUnit - 3.ppt
Unit - 3.ppt
 
chapter 11,12,15.pptx kya chal the hey bhai
chapter 11,12,15.pptx kya chal the hey bhaichapter 11,12,15.pptx kya chal the hey bhai
chapter 11,12,15.pptx kya chal the hey bhai
 
Slavisa web stories
Slavisa web storiesSlavisa web stories
Slavisa web stories
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...information security(Public key encryption its characteristics and weakness, ...
information security(Public key encryption its characteristics and weakness, ...
 
Secure Communication (Distributed computing)
Secure Communication (Distributed computing)Secure Communication (Distributed computing)
Secure Communication (Distributed computing)
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
 
Cryptography Key Management.pptx
Cryptography Key Management.pptxCryptography Key Management.pptx
Cryptography Key Management.pptx
 
doc1.pdf
doc1.pdfdoc1.pdf
doc1.pdf
 

More from Jayesh Patil (10)

AWS EC2 JSP.pptx
AWS EC2 JSP.pptxAWS EC2 JSP.pptx
AWS EC2 JSP.pptx
 
AWS Cloudtrail JSP.pptx
AWS Cloudtrail JSP.pptxAWS Cloudtrail JSP.pptx
AWS Cloudtrail JSP.pptx
 
Basics of cloud - AWS.pptx
Basics of cloud - AWS.pptxBasics of cloud - AWS.pptx
Basics of cloud - AWS.pptx
 
Cloud Roles.pptx
Cloud Roles.pptxCloud Roles.pptx
Cloud Roles.pptx
 
TensorFlow.pptx
TensorFlow.pptxTensorFlow.pptx
TensorFlow.pptx
 
ML Softmax JP 24.pptx
ML Softmax JP 24.pptxML Softmax JP 24.pptx
ML Softmax JP 24.pptx
 
IOT EDGE SS JP.pptx
IOT EDGE SS JP.pptxIOT EDGE SS JP.pptx
IOT EDGE SS JP.pptx
 
Flume DS -JSP.pptx
Flume DS -JSP.pptxFlume DS -JSP.pptx
Flume DS -JSP.pptx
 
AZURE CC JP.pptx
AZURE CC JP.pptxAZURE CC JP.pptx
AZURE CC JP.pptx
 
ATHLETICS - SD.pptx
ATHLETICS - SD.pptxATHLETICS - SD.pptx
ATHLETICS - SD.pptx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 

Blom Scheme CT -JSP.pptx

  • 1. Blom’s Key Pre-distribution Scheme - J A Y E S H S U K D E O P A T I L
  • 2. What is Key Pre-Distribution ∙ Key Pre-distribution is a scheme to distribute keys onto different sensor nodes prior to deployment. Therefore, these sensor nodes creates network through establishing secured links between different nodes using their shared secret keys after the deployment. ∙ A key pre-distribution scheme has three phases: ∙ 1) Key Distribution ∙ 2) Shared Key Discovery ∙ 3) Path-key establishment.
  • 3.
  • 4. Blom’s Key Pre-distribution Scheme ∙ Blom's scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom in a series of articles in the early 1980s. ∙ A trusted party gives each participant a secret key and a public identifier, which enables any two participants to independently create a shared key for communicating. Every participant can create a shared key with any other participant, allowing secure communication to take place between any two members of the group.However, if an attacker can compromise the keys of at least k users, they can break the scheme and reconstruct every shared key. Blom's scheme is a form of threshold secret sharing. ∙ Blom's scheme is currently used by the HDCP (High-bandwidth Digital Content Protection) copy protection scheme to generate shared keys for high-definition content sources and receivers, such as HD DVD players and high-definition televisions.
  • 5. ∙ The protocol The key exchange protocol involves a trusted party (Trent) and a group of n users. Let Alice and Bob be two users of the group.
  • 6. ∙ Protocol setup Trent chooses a random and secret symmetric matrix Dk,k over the finite field GF(p), where p is a prime number. D is required when a new user is to be added to the key sharing group.
  • 7. ∙ Inserting a new participant New users Alice and Bob want to join the key exchanging group. Trent chooses public identifiers for each of them; i.e., k-element vectors: ∙ For example: ∙ Trent then computes their private keys:
  • 8. ∙ Using D as described above: Each will use their private key to compute shared keys with other participants of the group
  • 9. Computing a shared key between Alice and Bob ∙ Now Alice and Bob wish to communicate with one another. Alice has Bob's identifier IBob and her private key gAlice. ∙ She computes the shared key kAlice/Bob=gAliceTIBob, where T denotes matrix transpose. Bob does the same, using his private key and her identifier, giving the same result: ∙ They will each generate their shared key as follows:
  • 10. Attack resistance ∙ In order to ensure at least k keys must be compromised before every shared key can be computed by an attacker, identifiers must be k-linearly independent: all sets of k randomly selected user identifiers must be linearly independent. ∙ Otherwise, a group of malicious users can compute the key of any other member whose identifier is linearly dependent to theirs. To ensure this property, the identifiers shall be preferably chosen from a MDS-Code matrix (maximum distance separable error correction code matrix). ∙ The rows of the MDS-Matrix would be the identifiers of the users. A MDS- Code matrix can be chosen in practice using the code-matrix of the Reed– Solomon error correction code (this error correction code requires only easily understandable mathematics and can be computed extremely quickly).