SlideShare a Scribd company logo
1 of 17
Provably Secure Group Key
Management
Approach Based upon Hyper-Sphere
By,
D.Darling Jemima
Problem statement
• The rapid development of Internet technology are
playing important roles.
• Protection of communication security is becoming
more and more significant.
• A secure group communication system
accommodates perfect scalability.
Contd..,
• A secure, efficient, and robust group key
management approach is essential to a secure group
communication system.
• The security could be provided to group
communication system using mathematical concept
called hyper-sphere.
Abstract
• A hyper-sphere is a generalization of the surface of
an ordinary sphere to arbitrary dimension.
• The distance from any point on the hyper sphere to
the central point of the hyper-sphere is identical.
• A secure group key management scheme could be
designed using mathematical model hyper sphere.
Contd..,
• The group key is updated periodically to protect its
secrecy.
• Each key is completely independent from any
previously used and future keys.
• A formal security proof could be generated under the
assumption of pseudorandom functions (PRF).
Hyper-Sphere in Euclidean Space
• An N-sphere of radius r ϵ R with a central
point C =( ) ϵ is defined as the set
of points in (N+1) dimensional Euclidean
space which are at distance r from the central
point C.
• Representation:
ncccc ,...,, 210 1N
R
Euclidean space for N+2 points
For any given N+2 points in the hyper-space
Hyper-Sphere over Finite Field
Modules for building security using
hyper-sphere
Initialization
Adding members
Removing
members
Massively
Adding and
Removing
Members
Periodically
Update
Module 1:Initialization
• Step 1: Group controller selects two private point say
s0 and s1.
• Step 2: GC chooses a two dimensional private point
A1=(a10,a11) random for the user U1.
• Step 3: GC selects a random number u ϵ GF(p) and
compute
Contd…
• Step 4: The GC establishes a hyper-sphere, here in a
circle, in two-dimensional space using the points B0
and B1.
• Step 5: The GC delivers the public rekeying
information C and u to the member U1
• Step 6: The member U1 can calculate the group key
by using its private point A1=(a10,a11) along with
the public information C and u.
Module 2:Adding members
• Step 1:After the new user is authenticated the GC
selects two dimensional private point.
• Step 2: The GC sends the point to the user via a
secure channel.
• Step 3:The GC selects a different random number u ϵ
GF(p) and computes
Contd…
• Step 4:The GC multicasts the public re-keying
information C and u to all group members.
• Step 5:Each group member U can calculate the group
key by using its private point A along with the
information C.
Module 3:Removing member
• Step 1:The GC deletes the leaving members’ private
two dimensional points.
• Step 2:The GC’s private two-dimensional points S0
and S1, and the remaining members’ private points
A1;A2 ; . . .;AN should be stored securely by the GC.
• Step 3-6: Similar to adding member in a group.
Module 4:Massively adding and
removing members
• Step 1. The GC deletes the leaving members’ private
two dimensional points, and let new users join in at
the same time.
• Step 2:The GC sends the private point A to the user U
via a secure channel.
• Step 3:constructs a new hypersphere, and publishes
the new random number u and the new central point
C of the hyper-sphere.
Module 4:Periodically update
• Update procedure is to renew the group key to
safeguard the secrecy of group communication.
• The GC needs to select a new random number u ϵ
GF(p), then construct a new hyper sphere.
• The steps are the same as Steps 3-6 in “Adding
Members” phase.
Secure group key management based on hyper-sphere

More Related Content

Viewers also liked

Import powerpoint.7.13
Import powerpoint.7.13Import powerpoint.7.13
Import powerpoint.7.13
Dawn Tedesco
 
Wk3 proj.cruzy
Wk3 proj.cruzyWk3 proj.cruzy
Wk3 proj.cruzy
Yoly Cruz
 
amit saha health department
amit saha health departmentamit saha health department
amit saha health department
Rajeev Ray
 
Shravyashree Selenium Automation 3+yrs exp
Shravyashree Selenium Automation 3+yrs expShravyashree Selenium Automation 3+yrs exp
Shravyashree Selenium Automation 3+yrs exp
Shravyashree Achar M
 

Viewers also liked (20)

Presentation
PresentationPresentation
Presentation
 
SocialMedia_Jones
SocialMedia_JonesSocialMedia_Jones
SocialMedia_Jones
 
Import powerpoint.7.13
Import powerpoint.7.13Import powerpoint.7.13
Import powerpoint.7.13
 
Wk3 proj.cruzy
Wk3 proj.cruzyWk3 proj.cruzy
Wk3 proj.cruzy
 
amit saha health department
amit saha health departmentamit saha health department
amit saha health department
 
Business Model Canvas بوم مدل کسب و کار
Business Model Canvas بوم مدل کسب و کارBusiness Model Canvas بوم مدل کسب و کار
Business Model Canvas بوم مدل کسب و کار
 
Johns-CV2
Johns-CV2Johns-CV2
Johns-CV2
 
Pgp31148 deepika corp innovation at 3_m
Pgp31148 deepika corp innovation at 3_mPgp31148 deepika corp innovation at 3_m
Pgp31148 deepika corp innovation at 3_m
 
การติดตั้ง Geoext
การติดตั้ง Geoextการติดตั้ง Geoext
การติดตั้ง Geoext
 
до уроку 3
до уроку 3до уроку 3
до уроку 3
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Gentrit Kastrati
Gentrit KastratiGentrit Kastrati
Gentrit Kastrati
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Untitled
UntitledUntitled
Untitled
 
Campos de actuación LCP
Campos de actuación LCPCampos de actuación LCP
Campos de actuación LCP
 
мікроклімат виробничих приміщень
мікроклімат виробничих приміщеньмікроклімат виробничих приміщень
мікроклімат виробничих приміщень
 
นำเข้าข้อมูล Postgres.postgis
นำเข้าข้อมูล Postgres.postgisนำเข้าข้อมูล Postgres.postgis
นำเข้าข้อมูล Postgres.postgis
 
Forum Business in golfe
Forum Business in golfe Forum Business in golfe
Forum Business in golfe
 
Openlayers เพิ่มชั้นข้อมูล buu ลงในเว็บ localhost
Openlayers เพิ่มชั้นข้อมูล buu ลงในเว็บ localhostOpenlayers เพิ่มชั้นข้อมูล buu ลงในเว็บ localhost
Openlayers เพิ่มชั้นข้อมูล buu ลงในเว็บ localhost
 
Shravyashree Selenium Automation 3+yrs exp
Shravyashree Selenium Automation 3+yrs expShravyashree Selenium Automation 3+yrs exp
Shravyashree Selenium Automation 3+yrs exp
 

Similar to Secure group key management based on hyper-sphere

Hybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colonyHybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colony
قصي نسور
 
Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
aya_hatem
 

Similar to Secure group key management based on hyper-sphere (20)

Hybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colonyHybrid elliptic curve cryptography using ant colony
Hybrid elliptic curve cryptography using ant colony
 
Hillcipher and eliptic curve
Hillcipher and eliptic curve Hillcipher and eliptic curve
Hillcipher and eliptic curve
 
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
 
Improving AI surveillance using Edge Computing
Improving AI surveillance using Edge ComputingImproving AI surveillance using Edge Computing
Improving AI surveillance using Edge Computing
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
An intelligent framework using hybrid social media and market data, for stock...
An intelligent framework using hybrid social media and market data, for stock...An intelligent framework using hybrid social media and market data, for stock...
An intelligent framework using hybrid social media and market data, for stock...
 
Lec 6-bp
Lec 6-bpLec 6-bp
Lec 6-bp
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
Analysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queriesAnalysis the Privacy preserving and content protecting location based on queries
Analysis the Privacy preserving and content protecting location based on queries
 
smarthome
smarthomesmarthome
smarthome
 
Fake currency detection using knn algorithm.pptx
Fake currency detection using knn algorithm.pptxFake currency detection using knn algorithm.pptx
Fake currency detection using knn algorithm.pptx
 
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve CryptographyImplementation and Secured Authentication Key using Elliptic Curve Cryptography
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
 
Human Head Counting and Detection using Convnets
Human Head Counting and Detection using ConvnetsHuman Head Counting and Detection using Convnets
Human Head Counting and Detection using Convnets
 
Scene understanding
Scene understandingScene understanding
Scene understanding
 
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARDDATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD
 

More from Darling Jemima (6)

Introduction to Processor Design and ARM Processor
Introduction to Processor Design and ARM ProcessorIntroduction to Processor Design and ARM Processor
Introduction to Processor Design and ARM Processor
 
Never GIve up
Never GIve upNever GIve up
Never GIve up
 
Input Output Interfaces
Input Output InterfacesInput Output Interfaces
Input Output Interfaces
 
Rope
RopeRope
Rope
 
Application of Dijkstra Algorithm in Robot path planning
Application of Dijkstra Algorithm in Robot path planningApplication of Dijkstra Algorithm in Robot path planning
Application of Dijkstra Algorithm in Robot path planning
 
Golden bells
Golden bellsGolden bells
Golden bells
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Secure group key management based on hyper-sphere

  • 1. Provably Secure Group Key Management Approach Based upon Hyper-Sphere By, D.Darling Jemima
  • 2. Problem statement • The rapid development of Internet technology are playing important roles. • Protection of communication security is becoming more and more significant. • A secure group communication system accommodates perfect scalability.
  • 3. Contd.., • A secure, efficient, and robust group key management approach is essential to a secure group communication system. • The security could be provided to group communication system using mathematical concept called hyper-sphere.
  • 4. Abstract • A hyper-sphere is a generalization of the surface of an ordinary sphere to arbitrary dimension. • The distance from any point on the hyper sphere to the central point of the hyper-sphere is identical. • A secure group key management scheme could be designed using mathematical model hyper sphere.
  • 5. Contd.., • The group key is updated periodically to protect its secrecy. • Each key is completely independent from any previously used and future keys. • A formal security proof could be generated under the assumption of pseudorandom functions (PRF).
  • 6. Hyper-Sphere in Euclidean Space • An N-sphere of radius r ϵ R with a central point C =( ) ϵ is defined as the set of points in (N+1) dimensional Euclidean space which are at distance r from the central point C. • Representation: ncccc ,...,, 210 1N R
  • 7. Euclidean space for N+2 points For any given N+2 points in the hyper-space
  • 9. Modules for building security using hyper-sphere Initialization Adding members Removing members Massively Adding and Removing Members Periodically Update
  • 10. Module 1:Initialization • Step 1: Group controller selects two private point say s0 and s1. • Step 2: GC chooses a two dimensional private point A1=(a10,a11) random for the user U1. • Step 3: GC selects a random number u ϵ GF(p) and compute
  • 11. Contd… • Step 4: The GC establishes a hyper-sphere, here in a circle, in two-dimensional space using the points B0 and B1. • Step 5: The GC delivers the public rekeying information C and u to the member U1 • Step 6: The member U1 can calculate the group key by using its private point A1=(a10,a11) along with the public information C and u.
  • 12. Module 2:Adding members • Step 1:After the new user is authenticated the GC selects two dimensional private point. • Step 2: The GC sends the point to the user via a secure channel. • Step 3:The GC selects a different random number u ϵ GF(p) and computes
  • 13. Contd… • Step 4:The GC multicasts the public re-keying information C and u to all group members. • Step 5:Each group member U can calculate the group key by using its private point A along with the information C.
  • 14. Module 3:Removing member • Step 1:The GC deletes the leaving members’ private two dimensional points. • Step 2:The GC’s private two-dimensional points S0 and S1, and the remaining members’ private points A1;A2 ; . . .;AN should be stored securely by the GC. • Step 3-6: Similar to adding member in a group.
  • 15. Module 4:Massively adding and removing members • Step 1. The GC deletes the leaving members’ private two dimensional points, and let new users join in at the same time. • Step 2:The GC sends the private point A to the user U via a secure channel. • Step 3:constructs a new hypersphere, and publishes the new random number u and the new central point C of the hyper-sphere.
  • 16. Module 4:Periodically update • Update procedure is to renew the group key to safeguard the secrecy of group communication. • The GC needs to select a new random number u ϵ GF(p), then construct a new hyper sphere. • The steps are the same as Steps 3-6 in “Adding Members” phase.