Author : Shishira M.C 1
Date of Publication :7th May 2015
Abstract: Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the key generation, exchange, storage, use, and replacement of keys. Several schemes have been proposed to make key management efficient and usable. This paper proposes a centralized group key management with minimal computation complexity to support dynamic secure multicast communication. In this scheme, a Chinese remainder theorem-based group key management scheme that drastically reduces computation complexity of the key server. The computation complexity of key server is reduced to O (1) in this proposed algorithm. Moreover, the computation complexity of group member is also minimized by performing one modulo division operation when a user join or leave operation is performed in a multicast group. The keys generated in the network are securely exchanged with the help of ElGamal algorithm. This paper solves the most security problem by user registration and verification phases in the multicast network. The security of ElGamal is based on the discrete logarithm problem. To encrypt and respectively decrypt a message, a discrete power is executed. An attacker that seeks to decrypt an intercepted message may try to recover the private key. To this end a logarithm needs to be computed. No actual method exists for this, given certain requirements on the initial group are met. Under these circumstances, the encryption is secure.
Reference :
-
- VijayaKumar, P., Bose, S., Kannan, A.: ‘Chinese Remainder Theorem based centralized group key management for secure multicast communication’, doi: 10.1049/iet-ifs.2012.0352,ISSN 1751-8709
- VijayaKumar, P., Bose, S., Kannan, A.: ‘Centralized key distribution protocol using the greatest common divisor method’, Comput. Math. Appl., 65, (9), pp. 1360–1368
- Zheng, X.L., Huang, C.T., Matthews, M.: ‘Chinese remainder theorem based group key management’. Association for Computing Machinery Proc. 45th Annual Southeast regional Conf. (ACMSE-07), Winston-Salem, North Carolina, USA, 2007, pp. 266–271
- VijayaKumar, P., Bose, S., Kannan, A.: ‘Rotation based secure multicast key management for batch rekeying operations’, Netw. Sci., 2012, 1, (1–4), pp. 39–47
- Wallner, D.M., Harder, E.J., Agee, R.C.: ‘Key management for multicast: issues and architectures’, Internet Draft Report, Filename: draft-wallner-key-arch01.txt, 1998
- Zhou, J., Ou, Y.-H.: ‘Key tree and chinese remainder theorem based group key distribution scheme’, J. Chin. Inst. Eng., 2009, 32, (7), pp. 967–974.