SlideShare a Scribd company logo
1 of 8
Download to read offline
Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013
pp. 175–182, 2013. Β© CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3619
A SECURE KEY COMPUTATION PROTOCOL
FOR SECURE GROUP COMMUNICATION WITH
PASSWORD BASED AUTHENTICATION
1
Velumadhava Rao R*
, 2
Vikhnesh ma*
, 3
Kailash B*
, 4
Selvamani K, and
5
Elakkiya R
1,2,3
Department of Computer Science,
Rajalakshmi Institute of Technology, Chennai, India
velu_b4u@yahoo.com,
{vikhneshiva19,kailashdaskd}@gmail.com
4
Department of Computer Science,
Anna University, CEG, Guidny, Chennai, India
smani@cs.annauniv.edu
5
Department of Computer Science,
Jerusalem College of Engineering, Chennai, India
elakkiyaceg@gmail.com
ABSTRACT
Providing security in group communication is more essential in this new network
environment. Authentication and Confidentiality are the major concerns in secure group
communication. Our proposed approach uses an authenticated group key transfer protocol
that relies on trusted key generation center (KGC). KGC computes group pair for each
individual and transport the pair of values to all group members in a secured manner.
Password based authentication mechanism is used to avoid the illegal member access in a
group Also, the proposed approach facilitates efficient key computation technique such that
only authorized group members will be able to computer and retrieve the secret key and
unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and
relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the
pair generated for the computation of key is also very strong since the cryptographic
techniques are used which provides efficient computation.
KEYWORDS
Authentication, Confidentiality, Key Generation, Key Distribution
1. INTRODUCTION
Security in group communication encompasses authentication and confidentiality. To avoid the
illegal users from accessing the group resources strong mutual authentication between entities
should be guaranteed. Password-based authentication is extensively used because of its
simplicity. Authorization provides a specific permission to a particular user on a specified
resource. Message Authentication and Message Confidentiality are the two important security
functions considered in most of the secure communication. Message Authentication ensures the
sender that the message was sent by a specified sender and the message was not altered anywhere
in the transmission path. Message confidentiality ensures that the sender confidential data can be
176 Computer Science & Information Technology (CS & IT)
read only by an authorized and intended receiver. Hence, the confidential data is secured in an
efficient way which is not tampered by unauthorized users.
To provide a secure group communication, it is necessary to manage the keys for creating,
updating and distribution. Moreover, before exchanging the confidential data, the key
establishment protocol has to distribute the group key to all participating entities in a secured and
effective manner. The two important types of key establishment protocols are namely key transfer
protocols and key agreement protocols. Key transfer protocols rely on KGC to select group key
for communicating information with the group members by sharing one or more secret key
during registration. But in key agreement protocols, the group key is determined by exchanging
public keys of two communication parties with the presence of communication entities.
The most commonly used key agreement protocol is Diffie-Hellman (DH) key agreement
protocol [4]. However, the Diffie Hellman key distribution algorithm can provide secret key only
for two entities, and cannot provide secret keys for the group that has more than two members.
When there are a more number of members in a group the time delay for setting up the group key
will take longer time. Hence, it is necessary to propose a new technique to avoid this type of
constraints in group communication. In this proposed work, group communication applications
will make use of key transfer protocol to transmit data to all the group members with the
minimum resources needed for this group communication.
In this work, a cryptographic technique for secure key distribution and key management in the
group environment is proposed. The algorithms are analyzed with suitable samples. The
remaining paper is organized as follows. Chapter 2 surveys about the existing work in this area.
Chapter 3 explores the proposed work and the implementation details. Chapter 4 and Chapter 5
analyzes and discusses the results obtained from the work. Chapter 6 discuss about the security
analysis. Chapter 7 concludes the proposed and implemented work and suggested some possible
enhancements.
2. LITERATURE SURVEY
There are many works pertaining to the secure Group Communication and that have been carried
out, but some of the important works has been surveyed and cited here. Among them, Mike
Burmester and Yvo Desmedt [3] presented a Group Key Exchange protocol which extends the
Diffie-Hellman protocol [2]. The protocol is scalable and secure against passive attacks. But,
Diffie Hellman public key distribution algorithm is able to provide group key only for two
entities. Bohli [4] developed a framework for robust group key agreement that provides security
against malicious insiders and active adversaries in an unauthenticated point-to-point network.
Bresson et al. [13] constructed a generic authenticated group Diffie-Hellman key exchange
algorithm which is more secure. Katz and Yung [5] proposed the first constant-round and fully
scalable group Diffie-Hellman protocol which is provably secure. There are many other works
related to group key management protocols based on non-DH key agreement approaches. Among
them, Tzeng [9] presented a conference key agreement protocol that relies on discrete algorithm
assumption with fault tolerance. This protocol establishes a conference key even if there is
several numbers of malicious participants in the conference. Hence, this method is not suitable
for group communication.
Moreover, in a centralized group key management, there is only one trusted entity responsible for
managing the entire group. Hence, the group controller need not depend on any auxiliary entity to
perform key distribution. Harney et al. [10] proposed a group key management protocol that
requires O(n) where n is the size of group, for encrypting and update a group key when a user is
evicted or added in backward and forward secrecy.
Computer Science & Information Technology (CS & IT) 177
Eltoweissy et al.[6] developed a protocol based on Exclusion Basis Systems (EBS), a
combinatory formulation for the group key management problem. Lein Harn and Changlu Lin [1]
introduced a group key transfer protocol where members of the group fully rely on Key
Generation Center (KGC). They proposed an authenticated key transfer protocol based on secret
sharing scheme that KGC can broadcast group key information to all group members at once.
Chin-Yin Lee et al. [7] addressed the security issues and drawback associated with existing group
key establishment protocols. They have also used secret sharing scheme to propose a secure key
transfer protocol to exclude impersonators from accessing the group communication. Their
protocol can resist potential attack and also reduce the overhead of system implementation.
Burmester et.al [11] has presented a practical conference key distribution systems based on
public-keys and also authenticates the users.
3. PROPOSED WORK
Based on the above survey in this secure group communication, it is necessary to propose a new
model to solve the identified issues. The proposed model consists of four processes namely the
User Registration, Group key generation based on prime numbers, Key generation and Key
distribution, Group re-keying. The four main processes are explained as below.
3.1. User Registration
This module explains the process of User Registration. Each user has to register their identity at
KGC for subscribing the key distribution service. While legitimate entities register to KGC, the
encrypted hash value of their password is stored in the authentication server. Hence, this
approach initially authenticates the user by matching its encrypted hash value with that of the
stored value. The hash value of the password is calculated using Message Digest (MD5)
algorithm and the encrypted password is stored in the authentication file. KGC keeps track of all
registered users and removes any unsubscribed users in the group. During registration process,
each user mi is required to share a random secret value Si with the KGC. Once user registration
process is completed, KGC assigns a permanent secret id, denoted by Pi for each member mi in
the group
3.2. Group Key Generation and Distribution
Whenever there is a group of users participating in a group communication, the Key Generation
Center (KGC) will select a random group key K > (Pi βŠ• Si) for all i of Group G and computes
the message (Xi, Yi) pairs in the following manner.
Xi = K / (Pi βŠ• Si) (1)
Yi = K mod (Pi βŠ• Si) (2)
Once the pair is generated, KGC published (Xi, Yi). From this public information, each group
member mi can able to retrieve the key by computing
K = Xi * (P1 βŠ• S1) + Yi (3)
Only authorized member can able to retrieve the hidden key using this pair (Xi, Yi).
3.3 Group Re-keying
Scalable group re-keying is the important task to be performed when user joins or leaves the
group in the secure group communication. The group keys needs to be updated to maintain the
178 Computer Science & Information Technology (CS & IT)
forward and backward secrecy. To achieve this, the two important tasks namely members join
and members leave operation is performed.
3.3.1 Member Join
When a member wants to join the system, the new member will register with the KGC. KGC will
share a prime number Pn+1 and the member will provide the secret id Sn+1 where K >(Pn+1 βŠ• Sn+1).
KGC generates the new pair of values (Xi, Yi) by using equation (1) and (2). After receiving the
(Xi, Yi) pairs, the newly joined member can use the prime number along with his secret id to
derive the key K from equation (3).
3.3.2 Member Leave
When a member leaves the system, the member should inform to the KGC. Now KGC generates
a new group key as follows. Step 1. KGC selects a new prime number K’ (where K’ > (P1 βŠ• S1)
for all i).
Step 2. New pair of values (Xi, Yi) are generated with the new Key K and distribute it to all the
group members.
Fig 1. Process of Key Generation
Computer Science & Information Technology (CS & IT) 179
4. EXPERIMENTAL SETUP
The proposed password based authenticated system is tested with five valid and five invalid
users. Each of the five valid users has their own username and password. Initially, the users have
created their username and password (Table 1). The authentication server stores the encrypted
hash values of the passwords. As the hash values of the passwords are different it ensures
uniqueness.
For key generation and key extraction mechanism, we considered a group with M=3 members.
Member1 has permanent secret id (Prime), P1=55837, Member2 has P2=55603, Member3 has
P3=35353, and key K= 65585.
The secret shared by each users are S1=28931, S2=37123, S3=12347. By applying equation (1)
of the pair generation by KGC, we generated the pair as
X1 = K / (P1 βŠ• S1) i.e 65585 / (55837βŠ• 28931) = 1
Y1 = K mod (P1 βŠ• S1) i.e 65585 mod (55837βŠ• 28931) = 21779
X2 = K / (P2 βŠ• S2) i.e 65585 / (55603βŠ• 37123) = 3
Y2 = K mod (P2 βŠ• S2) i.e 65585 mod (55603βŠ• 37123) = 10145
X3 = K / (P3 βŠ• S3) i.e 65585 / (35353βŠ• 12347) = 1
Y3 = K mod (P3 βŠ• S3) i.e 65585 mod (35353βŠ• 12347) = 17935
The generated pairs for the three members are (1, 21779), (3, 10145), (1, 17935). These pairs are
distributed to each member of the group. After receiving this message each member in the group
computes the key by using its pair as follows.
K1 = X1 * (P1 βŠ• S1) + Y1 i.e., 1 * 43806 + 21779 = 65585
K2 = X2 * (P2 βŠ• S2) + Y2 i.e., 3 * 18480 + 10145 = 65585
K3 = X3 * (P3 βŠ• S3) + Y1 i.e., 1 * 47650 + 17935 = 65585
We have taken K (Key) sizes as 64,128, 512, 1024 bits and the value of S (prime) has been taken
has 64, 128, 512 and 1024 bits. When a non-group member Mk attempts to compute the group
key with a unknown value pair it will not be able to retrieve the correct key.
5. PERFORMANCE ANALYSIS
The performance analysis for the password based authenticated module is analyzed with respect
to the number of valid and invalid users. The analysis of the work has been done under the
following heads
5.1 Md5 Analysis
The probability of two messages having the same message digest is on the order of 2^64
operations. The probability of coming up with any message having a given message digest is on
the order of 2^128 operations. This ensures uniqueness of the message digest.
5.2 Replay Attack
Usually replay attack is called as β€˜man in the middle’ attack. Adversary stays in between the user
and the file and hacks the user credentials when the user contacts file. As key matching between
180 Computer Science & Information Technology (CS & IT)
the users is checked before file transfer and the information is encrypted before transfer, the
probability of this attack is minimized.
Table 1. Authentication files with unique hash value passwords
5.3 Guessing Attack
Guessing attack is nothing but the adversaries just contacts the files byrandomly guessed
credentials. The effective possibility to overcome this attack is to choose the password by
maximum possible characters, so that the probability of guessing the correct password can be
reduced. As the proposed approach uses random generation of key, it is more difficult to guess
the password.
5.4 Stolen Verifier Attacks
Instead of storing the original password, the verifier of the password is stored. As the encrypted
hash value of the password is stored, the proposed protocol is also more robust against the attack.
6. SECURITY ANALYSIS
Given K , P and S, it is easy to compute
X= K / (P1 βŠ• S1) and Y= K mod (P1 βŠ• S1).
But given X and Y it is very difficult to compute K, in polynomial time, without knowing P and S
such that K = X * (P1 βŠ• S1) + Y, and it is NP hard for large size of K. Even if several pairs (Xi,
Yi) are known, it is very difficult to compute K, unless the corresponding Pi’s and Si’s are known.
Suppose,
K = X1 * (P1 βŠ• S1) + Y1 (P1 and S1 not known) (1)
K = X2 * (P2 βŠ• S2) + Y2 (P2 and S2 not known) (2)
K = X3 * (P3 βŠ• S3) + Y3 (P3 and S3 not known) (3)
K = X4 * (P4 βŠ• S4) + Y4 (P4 and S4 not known) (4)
From the first of two equations, we get
X1 * (P1 βŠ• S1) + Y1 = X2 * (P2 βŠ• S2) + Y2
X1 * (P1 βŠ• S1) - X2 * (P2 βŠ• S2) = Y2 – Y1 (say Y2> Y1)
X1 * (P1 βŠ• S1) – X2 * ((P1 βŠ• S1) + R1) = C1
Where (Y2 – Y1 = C1, (P2 βŠ• S2) = (P1 βŠ• S1) + R1)
(X1 – X2) (P1 βŠ• S1) - X2R1 = C1 (5)
S.no Username Password Hash Value
1 user1 admin 4c56ff4ce4aaf9573aa5dff913df913d
2 user2 Test2 Dfg45f4ce4aaf9573aa5dff913df913e
3 user3 test5 dddd6ffsdfdfdffffff913df997art567fg
4 user4 test8 4c56ff4ce4aaf9573aa5dff913df913d
5 user5 test10 sfggce4aaf9573aa5dff913df913fget
Computer Science & Information Technology (CS & IT) 181
Similarly from 1 and 3, we get
(X1 – X3) (P1 βŠ• S1) – X3R2 = C2 (6)
From 2 and 3, we get
(X2 - X3) (P2 βŠ• S2) – X3R3 = C3
(X2 - X3) ((P1 βŠ• S1) + R1) – X3R3 = C3
(X2 – X3) (P1 βŠ• S1) + (X2 – X3) R1-X3R3 = C3 (7)
Thus, there only 3 equations (5 – 7) to determine 5 unknowns (R1, R2, R3, P1 and S1), Therefore
one of the values R1, or R2 or R3 or P1 or S1will be left arbitrary, hence the value of K cannot be
determined easily and correctly.
The strength of the RSA algorithm relies on the fact that the given M (product of two large prime
numbers), it is not possible to find the two factors in polynomial time (It is NP-hard). In our
algorithm, we have more complex message M, than what is used in RSA algorithm. Therefore, it
is very difficult to find any of the prime numbers P1, P2,.., Pn is NP-hard. Thus the Key K is
more secure and safe preventing it from man-in-the-middle attack and brute-force attack. To
maintain secrecy, KGC generates a new pair message and broadcast it everytime when a member
leaves the system.
7. CONCLUSION AND FUTURE ENHANCEMENT
Key transfer protocol relies on a trusted Key Generation Center (KGC) to select group key and to
distribute group keys to all group members in a secret manner. KGC assign a large prime number
to each member in the group. Our proposed algorithm is efficient both in terms of message
generation and key extraction. In future, we wish to implement our design for communication in
dynamic and hierarchical groups. Also we wish to compare our algorithm with the dual-level key
management for secure group communication.
REFERENCES
[1] Lein Harn and Changlu Lin. Authenticated Group Key Transfer Protocol Based on Secret Sharing.
IEEE Trans.Computers; Vol.59, no.6, 2010, pp.842-846.
[2] W. Diffie and M.E. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory;
Vol. IT-22, No. 6, 1976, pp.644-654.
[3] Mike Burmester and Yvo Desmedt. A Secure and Scalable Group Key Exchange System,”
Information Processing Letters; 94(3), 2005, pp. 137β€”143.
[4] Bohli. A Framework for Robust Group Key Agreement. In Computational Science and Its
applications - ICCSA 2006 (3), Lecture Notes in Computer Science; vol. 3982, Springer 2006, pp.
355-364.
[5] J. Katz and M. Yung. Scalable Protocols for Authenticated Group Key Exchange. J Cryptology; Vol.
20, 2007, pp. 85-113.
[6] M. Eltoweissy, M.H. Heydari, L. Morales, and I.H. Sudborough, β€œCombinatorial Optimization of
Group Key Management,” J. Network and Systems Management, Vol. 12, No. 1, pp. 33-50, 2004.
[7] Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang. Secure Key Transfer Protocol Based on
Secret Sharing for Group Communications. IEICE Transactions; 94-D(11), 2011,pp. 2069-2076.
[8] E. Bresson, O. Chevassut, and D. Pointcheval. Provably-Secure Authenticated Group Diffie-Hellman
Key Exchange. ACM Trans. Information and System Security; Vol. 10, No. 3, Aug 2007, pp. 255-
264.
[9] Tzeng. A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Trans. Computers;
51(4), 2002, pp 373-379.
[10] H. Harney, C. Muckenhirn, and T. Rivers. Group Key Management Protocol (GKMP)
Architecture; RFC 2094, July 1997.
[11 .M. Burmester and Y.G. Desmedt. A Secure and Efficient Conference Key Distribution System. Proc.
Eurocrypt ’94 Workshop Advances in Cryptology;1995, pp. 275-286.
182 Computer Science & Information Technology (CS & IT)
[12. M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman Key Distribution Extended to Group
Communication. Proc. Third ACM Conf. Computer and Comm. Security (CCS ’96), 1996, pp. 31-37.
[13. E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably Authenticated Group Diffie-
Hellman Key Exchange. Proc. ACM Conf. Computer and Comm. Security (CCS ’01), 2000, pp. 255-
264.

More Related Content

What's hot

The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalIAEME Publication
Β 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
Β 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Jayanth Dwijesh H P
Β 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
Β 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Jayanth Dwijesh H P
Β 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
Β 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONijiert bestjournal
Β 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
Β 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
Β 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...ijsrd.com
Β 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2IAEME Publication
Β 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesJayanth Dwijesh H P
Β 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...eSAT Journals
Β 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
Β 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
Β 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notesJayanth Dwijesh H P
Β 
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...IJCI JOURNAL
Β 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
Β 

What's hot (19)

The efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamalThe efficient digital signature technique with message recovery based on elgamal
The efficient digital signature technique with message recovery based on elgamal
Β 
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
Β 
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Β 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
Β 
Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.Vtu network security(10 ec832) unit 3 notes.
Vtu network security(10 ec832) unit 3 notes.
Β 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Β 
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATIONEFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
EFFECTIVE KEY GENERATION FOR MULTIMEDIA AND WEB APPLICATION
Β 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
Β 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
Β 
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
A Survey of Source Authentication Schemes for Multicast transfer in Adhoc Net...
Β 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
Β 
H0362052056
H0362052056H0362052056
H0362052056
Β 
Vtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notesVtu network security(10 ec832) unit 1 notes
Vtu network security(10 ec832) unit 1 notes
Β 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...
Β 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
Β 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
Β 
Network security 10EC832 vtu notes
Network security 10EC832 vtu notesNetwork security 10EC832 vtu notes
Network security 10EC832 vtu notes
Β 
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
MINIMISATION OF KEY GENERATION OVERHEAD IN GROUP KEY MANAGEMENT WITH MODULAR ...
Β 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
Β 

Similar to A secure key computation protocol for secure group communication with password based authentication

Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...csandit
Β 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative GroupsIJMER
Β 
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
Β 
Secure Group Communication in Grid Environment
Secure Group Communication in Grid EnvironmentSecure Group Communication in Grid Environment
Secure Group Communication in Grid EnvironmentCSCJournals
Β 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
Β 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
Β 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...ijp2p
Β 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
Β 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
Β 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through TokenIRJET Journal
Β 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Β 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...revathirram
Β 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentIRJET Journal
Β 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
Β 
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKSSURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKSIJNSA Journal
Β 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET Journal
Β 
β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAINβ€β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”IRJET Journal
Β 

Similar to A secure key computation protocol for secure group communication with password based authentication (20)

Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
 Key Management Scheme for Secure Group Communication in WSN with Multiple Gr... Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Key Management Scheme for Secure Group Communication in WSN with Multiple Gr...
Β 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
Β 
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote  Cooperative GroupsA Novel Key Management Paradigm for Broadcasting to Remote  Cooperative Groups
A Novel Key Management Paradigm for Broadcasting to Remote Cooperative Groups
Β 
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Β 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
Β 
Secure Group Communication in Grid Environment
Secure Group Communication in Grid EnvironmentSecure Group Communication in Grid Environment
Secure Group Communication in Grid Environment
Β 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
Β 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
Β 
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
A NOVEL APPROACH TOWARDS COST EFFECTIVE REGION-BASED GROUP KEY AGREEMENT PROT...
Β 
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...
Β 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
Β 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
Β 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
Β 
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
766 a secure-data-sharing-in-cloud-storage-with-independent-key-generation-ce...
Β 
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA EnvironmentMulti-Server Authentication Key Exchange Approach in BIGDATA Environment
Multi-Server Authentication Key Exchange Approach in BIGDATA Environment
Β 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Β 
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKSSURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
Β 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
Β 
B018140813
B018140813B018140813
B018140813
Β 
β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAINβ€β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
β€œALERT SYSTEM FOR NEW USER TO CREATE SAFE AREA USING BLOCK CHAIN”
Β 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
Β 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
Β 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
Β 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
Β 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
Β 
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...Patryk Bandurski
Β 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
Β 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
Β 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
Β 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
Β 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
Β 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
Β 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
Β 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
Β 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
Β 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
Β 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Β 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
Β 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Β 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Β 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Β 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Β 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Β 
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleΒ Integration and Automat...
Β 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Β 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Β 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
Β 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Β 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
Β 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Β 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Β 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Β 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Β 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Β 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Β 
Hot Sexy call girls in Panjabi Bagh πŸ” 9953056974 πŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh πŸ” 9953056974 πŸ” Delhi escort ServiceHot Sexy call girls in Panjabi Bagh πŸ” 9953056974 πŸ” Delhi escort Service
Hot Sexy call girls in Panjabi Bagh πŸ” 9953056974 πŸ” Delhi escort Service
Β 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Β 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
Β 

A secure key computation protocol for secure group communication with password based authentication

  • 1. Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013 pp. 175–182, 2013. Β© CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3619 A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWORD BASED AUTHENTICATION 1 Velumadhava Rao R* , 2 Vikhnesh ma* , 3 Kailash B* , 4 Selvamani K, and 5 Elakkiya R 1,2,3 Department of Computer Science, Rajalakshmi Institute of Technology, Chennai, India velu_b4u@yahoo.com, {vikhneshiva19,kailashdaskd}@gmail.com 4 Department of Computer Science, Anna University, CEG, Guidny, Chennai, India smani@cs.annauniv.edu 5 Department of Computer Science, Jerusalem College of Engineering, Chennai, India elakkiyaceg@gmail.com ABSTRACT Providing security in group communication is more essential in this new network environment. Authentication and Confidentiality are the major concerns in secure group communication. Our proposed approach uses an authenticated group key transfer protocol that relies on trusted key generation center (KGC). KGC computes group pair for each individual and transport the pair of values to all group members in a secured manner. Password based authentication mechanism is used to avoid the illegal member access in a group Also, the proposed approach facilitates efficient key computation technique such that only authorized group members will be able to computer and retrieve the secret key and unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the pair generated for the computation of key is also very strong since the cryptographic techniques are used which provides efficient computation. KEYWORDS Authentication, Confidentiality, Key Generation, Key Distribution 1. INTRODUCTION Security in group communication encompasses authentication and confidentiality. To avoid the illegal users from accessing the group resources strong mutual authentication between entities should be guaranteed. Password-based authentication is extensively used because of its simplicity. Authorization provides a specific permission to a particular user on a specified resource. Message Authentication and Message Confidentiality are the two important security functions considered in most of the secure communication. Message Authentication ensures the sender that the message was sent by a specified sender and the message was not altered anywhere in the transmission path. Message confidentiality ensures that the sender confidential data can be
  • 2. 176 Computer Science & Information Technology (CS & IT) read only by an authorized and intended receiver. Hence, the confidential data is secured in an efficient way which is not tampered by unauthorized users. To provide a secure group communication, it is necessary to manage the keys for creating, updating and distribution. Moreover, before exchanging the confidential data, the key establishment protocol has to distribute the group key to all participating entities in a secured and effective manner. The two important types of key establishment protocols are namely key transfer protocols and key agreement protocols. Key transfer protocols rely on KGC to select group key for communicating information with the group members by sharing one or more secret key during registration. But in key agreement protocols, the group key is determined by exchanging public keys of two communication parties with the presence of communication entities. The most commonly used key agreement protocol is Diffie-Hellman (DH) key agreement protocol [4]. However, the Diffie Hellman key distribution algorithm can provide secret key only for two entities, and cannot provide secret keys for the group that has more than two members. When there are a more number of members in a group the time delay for setting up the group key will take longer time. Hence, it is necessary to propose a new technique to avoid this type of constraints in group communication. In this proposed work, group communication applications will make use of key transfer protocol to transmit data to all the group members with the minimum resources needed for this group communication. In this work, a cryptographic technique for secure key distribution and key management in the group environment is proposed. The algorithms are analyzed with suitable samples. The remaining paper is organized as follows. Chapter 2 surveys about the existing work in this area. Chapter 3 explores the proposed work and the implementation details. Chapter 4 and Chapter 5 analyzes and discusses the results obtained from the work. Chapter 6 discuss about the security analysis. Chapter 7 concludes the proposed and implemented work and suggested some possible enhancements. 2. LITERATURE SURVEY There are many works pertaining to the secure Group Communication and that have been carried out, but some of the important works has been surveyed and cited here. Among them, Mike Burmester and Yvo Desmedt [3] presented a Group Key Exchange protocol which extends the Diffie-Hellman protocol [2]. The protocol is scalable and secure against passive attacks. But, Diffie Hellman public key distribution algorithm is able to provide group key only for two entities. Bohli [4] developed a framework for robust group key agreement that provides security against malicious insiders and active adversaries in an unauthenticated point-to-point network. Bresson et al. [13] constructed a generic authenticated group Diffie-Hellman key exchange algorithm which is more secure. Katz and Yung [5] proposed the first constant-round and fully scalable group Diffie-Hellman protocol which is provably secure. There are many other works related to group key management protocols based on non-DH key agreement approaches. Among them, Tzeng [9] presented a conference key agreement protocol that relies on discrete algorithm assumption with fault tolerance. This protocol establishes a conference key even if there is several numbers of malicious participants in the conference. Hence, this method is not suitable for group communication. Moreover, in a centralized group key management, there is only one trusted entity responsible for managing the entire group. Hence, the group controller need not depend on any auxiliary entity to perform key distribution. Harney et al. [10] proposed a group key management protocol that requires O(n) where n is the size of group, for encrypting and update a group key when a user is evicted or added in backward and forward secrecy.
  • 3. Computer Science & Information Technology (CS & IT) 177 Eltoweissy et al.[6] developed a protocol based on Exclusion Basis Systems (EBS), a combinatory formulation for the group key management problem. Lein Harn and Changlu Lin [1] introduced a group key transfer protocol where members of the group fully rely on Key Generation Center (KGC). They proposed an authenticated key transfer protocol based on secret sharing scheme that KGC can broadcast group key information to all group members at once. Chin-Yin Lee et al. [7] addressed the security issues and drawback associated with existing group key establishment protocols. They have also used secret sharing scheme to propose a secure key transfer protocol to exclude impersonators from accessing the group communication. Their protocol can resist potential attack and also reduce the overhead of system implementation. Burmester et.al [11] has presented a practical conference key distribution systems based on public-keys and also authenticates the users. 3. PROPOSED WORK Based on the above survey in this secure group communication, it is necessary to propose a new model to solve the identified issues. The proposed model consists of four processes namely the User Registration, Group key generation based on prime numbers, Key generation and Key distribution, Group re-keying. The four main processes are explained as below. 3.1. User Registration This module explains the process of User Registration. Each user has to register their identity at KGC for subscribing the key distribution service. While legitimate entities register to KGC, the encrypted hash value of their password is stored in the authentication server. Hence, this approach initially authenticates the user by matching its encrypted hash value with that of the stored value. The hash value of the password is calculated using Message Digest (MD5) algorithm and the encrypted password is stored in the authentication file. KGC keeps track of all registered users and removes any unsubscribed users in the group. During registration process, each user mi is required to share a random secret value Si with the KGC. Once user registration process is completed, KGC assigns a permanent secret id, denoted by Pi for each member mi in the group 3.2. Group Key Generation and Distribution Whenever there is a group of users participating in a group communication, the Key Generation Center (KGC) will select a random group key K > (Pi βŠ• Si) for all i of Group G and computes the message (Xi, Yi) pairs in the following manner. Xi = K / (Pi βŠ• Si) (1) Yi = K mod (Pi βŠ• Si) (2) Once the pair is generated, KGC published (Xi, Yi). From this public information, each group member mi can able to retrieve the key by computing K = Xi * (P1 βŠ• S1) + Yi (3) Only authorized member can able to retrieve the hidden key using this pair (Xi, Yi). 3.3 Group Re-keying Scalable group re-keying is the important task to be performed when user joins or leaves the group in the secure group communication. The group keys needs to be updated to maintain the
  • 4. 178 Computer Science & Information Technology (CS & IT) forward and backward secrecy. To achieve this, the two important tasks namely members join and members leave operation is performed. 3.3.1 Member Join When a member wants to join the system, the new member will register with the KGC. KGC will share a prime number Pn+1 and the member will provide the secret id Sn+1 where K >(Pn+1 βŠ• Sn+1). KGC generates the new pair of values (Xi, Yi) by using equation (1) and (2). After receiving the (Xi, Yi) pairs, the newly joined member can use the prime number along with his secret id to derive the key K from equation (3). 3.3.2 Member Leave When a member leaves the system, the member should inform to the KGC. Now KGC generates a new group key as follows. Step 1. KGC selects a new prime number K’ (where K’ > (P1 βŠ• S1) for all i). Step 2. New pair of values (Xi, Yi) are generated with the new Key K and distribute it to all the group members. Fig 1. Process of Key Generation
  • 5. Computer Science & Information Technology (CS & IT) 179 4. EXPERIMENTAL SETUP The proposed password based authenticated system is tested with five valid and five invalid users. Each of the five valid users has their own username and password. Initially, the users have created their username and password (Table 1). The authentication server stores the encrypted hash values of the passwords. As the hash values of the passwords are different it ensures uniqueness. For key generation and key extraction mechanism, we considered a group with M=3 members. Member1 has permanent secret id (Prime), P1=55837, Member2 has P2=55603, Member3 has P3=35353, and key K= 65585. The secret shared by each users are S1=28931, S2=37123, S3=12347. By applying equation (1) of the pair generation by KGC, we generated the pair as X1 = K / (P1 βŠ• S1) i.e 65585 / (55837βŠ• 28931) = 1 Y1 = K mod (P1 βŠ• S1) i.e 65585 mod (55837βŠ• 28931) = 21779 X2 = K / (P2 βŠ• S2) i.e 65585 / (55603βŠ• 37123) = 3 Y2 = K mod (P2 βŠ• S2) i.e 65585 mod (55603βŠ• 37123) = 10145 X3 = K / (P3 βŠ• S3) i.e 65585 / (35353βŠ• 12347) = 1 Y3 = K mod (P3 βŠ• S3) i.e 65585 mod (35353βŠ• 12347) = 17935 The generated pairs for the three members are (1, 21779), (3, 10145), (1, 17935). These pairs are distributed to each member of the group. After receiving this message each member in the group computes the key by using its pair as follows. K1 = X1 * (P1 βŠ• S1) + Y1 i.e., 1 * 43806 + 21779 = 65585 K2 = X2 * (P2 βŠ• S2) + Y2 i.e., 3 * 18480 + 10145 = 65585 K3 = X3 * (P3 βŠ• S3) + Y1 i.e., 1 * 47650 + 17935 = 65585 We have taken K (Key) sizes as 64,128, 512, 1024 bits and the value of S (prime) has been taken has 64, 128, 512 and 1024 bits. When a non-group member Mk attempts to compute the group key with a unknown value pair it will not be able to retrieve the correct key. 5. PERFORMANCE ANALYSIS The performance analysis for the password based authenticated module is analyzed with respect to the number of valid and invalid users. The analysis of the work has been done under the following heads 5.1 Md5 Analysis The probability of two messages having the same message digest is on the order of 2^64 operations. The probability of coming up with any message having a given message digest is on the order of 2^128 operations. This ensures uniqueness of the message digest. 5.2 Replay Attack Usually replay attack is called as β€˜man in the middle’ attack. Adversary stays in between the user and the file and hacks the user credentials when the user contacts file. As key matching between
  • 6. 180 Computer Science & Information Technology (CS & IT) the users is checked before file transfer and the information is encrypted before transfer, the probability of this attack is minimized. Table 1. Authentication files with unique hash value passwords 5.3 Guessing Attack Guessing attack is nothing but the adversaries just contacts the files byrandomly guessed credentials. The effective possibility to overcome this attack is to choose the password by maximum possible characters, so that the probability of guessing the correct password can be reduced. As the proposed approach uses random generation of key, it is more difficult to guess the password. 5.4 Stolen Verifier Attacks Instead of storing the original password, the verifier of the password is stored. As the encrypted hash value of the password is stored, the proposed protocol is also more robust against the attack. 6. SECURITY ANALYSIS Given K , P and S, it is easy to compute X= K / (P1 βŠ• S1) and Y= K mod (P1 βŠ• S1). But given X and Y it is very difficult to compute K, in polynomial time, without knowing P and S such that K = X * (P1 βŠ• S1) + Y, and it is NP hard for large size of K. Even if several pairs (Xi, Yi) are known, it is very difficult to compute K, unless the corresponding Pi’s and Si’s are known. Suppose, K = X1 * (P1 βŠ• S1) + Y1 (P1 and S1 not known) (1) K = X2 * (P2 βŠ• S2) + Y2 (P2 and S2 not known) (2) K = X3 * (P3 βŠ• S3) + Y3 (P3 and S3 not known) (3) K = X4 * (P4 βŠ• S4) + Y4 (P4 and S4 not known) (4) From the first of two equations, we get X1 * (P1 βŠ• S1) + Y1 = X2 * (P2 βŠ• S2) + Y2 X1 * (P1 βŠ• S1) - X2 * (P2 βŠ• S2) = Y2 – Y1 (say Y2> Y1) X1 * (P1 βŠ• S1) – X2 * ((P1 βŠ• S1) + R1) = C1 Where (Y2 – Y1 = C1, (P2 βŠ• S2) = (P1 βŠ• S1) + R1) (X1 – X2) (P1 βŠ• S1) - X2R1 = C1 (5) S.no Username Password Hash Value 1 user1 admin 4c56ff4ce4aaf9573aa5dff913df913d 2 user2 Test2 Dfg45f4ce4aaf9573aa5dff913df913e 3 user3 test5 dddd6ffsdfdfdffffff913df997art567fg 4 user4 test8 4c56ff4ce4aaf9573aa5dff913df913d 5 user5 test10 sfggce4aaf9573aa5dff913df913fget
  • 7. Computer Science & Information Technology (CS & IT) 181 Similarly from 1 and 3, we get (X1 – X3) (P1 βŠ• S1) – X3R2 = C2 (6) From 2 and 3, we get (X2 - X3) (P2 βŠ• S2) – X3R3 = C3 (X2 - X3) ((P1 βŠ• S1) + R1) – X3R3 = C3 (X2 – X3) (P1 βŠ• S1) + (X2 – X3) R1-X3R3 = C3 (7) Thus, there only 3 equations (5 – 7) to determine 5 unknowns (R1, R2, R3, P1 and S1), Therefore one of the values R1, or R2 or R3 or P1 or S1will be left arbitrary, hence the value of K cannot be determined easily and correctly. The strength of the RSA algorithm relies on the fact that the given M (product of two large prime numbers), it is not possible to find the two factors in polynomial time (It is NP-hard). In our algorithm, we have more complex message M, than what is used in RSA algorithm. Therefore, it is very difficult to find any of the prime numbers P1, P2,.., Pn is NP-hard. Thus the Key K is more secure and safe preventing it from man-in-the-middle attack and brute-force attack. To maintain secrecy, KGC generates a new pair message and broadcast it everytime when a member leaves the system. 7. CONCLUSION AND FUTURE ENHANCEMENT Key transfer protocol relies on a trusted Key Generation Center (KGC) to select group key and to distribute group keys to all group members in a secret manner. KGC assign a large prime number to each member in the group. Our proposed algorithm is efficient both in terms of message generation and key extraction. In future, we wish to implement our design for communication in dynamic and hierarchical groups. Also we wish to compare our algorithm with the dual-level key management for secure group communication. REFERENCES [1] Lein Harn and Changlu Lin. Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans.Computers; Vol.59, no.6, 2010, pp.842-846. [2] W. Diffie and M.E. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory; Vol. IT-22, No. 6, 1976, pp.644-654. [3] Mike Burmester and Yvo Desmedt. A Secure and Scalable Group Key Exchange System,” Information Processing Letters; 94(3), 2005, pp. 137β€”143. [4] Bohli. A Framework for Robust Group Key Agreement. In Computational Science and Its applications - ICCSA 2006 (3), Lecture Notes in Computer Science; vol. 3982, Springer 2006, pp. 355-364. [5] J. Katz and M. Yung. Scalable Protocols for Authenticated Group Key Exchange. J Cryptology; Vol. 20, 2007, pp. 85-113. [6] M. Eltoweissy, M.H. Heydari, L. Morales, and I.H. Sudborough, β€œCombinatorial Optimization of Group Key Management,” J. Network and Systems Management, Vol. 12, No. 1, pp. 33-50, 2004. [7] Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang. Secure Key Transfer Protocol Based on Secret Sharing for Group Communications. IEICE Transactions; 94-D(11), 2011,pp. 2069-2076. [8] E. Bresson, O. Chevassut, and D. Pointcheval. Provably-Secure Authenticated Group Diffie-Hellman Key Exchange. ACM Trans. Information and System Security; Vol. 10, No. 3, Aug 2007, pp. 255- 264. [9] Tzeng. A Secure Fault-Tolerant Conference-Key Agreement Protocol. IEEE Trans. Computers; 51(4), 2002, pp 373-379. [10] H. Harney, C. Muckenhirn, and T. Rivers. Group Key Management Protocol (GKMP) Architecture; RFC 2094, July 1997. [11 .M. Burmester and Y.G. Desmedt. A Secure and Efficient Conference Key Distribution System. Proc. Eurocrypt ’94 Workshop Advances in Cryptology;1995, pp. 275-286.
  • 8. 182 Computer Science & Information Technology (CS & IT) [12. M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman Key Distribution Extended to Group Communication. Proc. Third ACM Conf. Computer and Comm. Security (CCS ’96), 1996, pp. 31-37. [13. E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably Authenticated Group Diffie- Hellman Key Exchange. Proc. ACM Conf. Computer and Comm. Security (CCS ’01), 2000, pp. 255- 264.