Group Key Agreement for Mobile Devices in Different Cells

서로 다른 셀의 모바일 장치간의 그룹키 동의 프로토콜

  • 김지연 (성균관대학교 전기전자및컴퓨터공학과) ;
  • 최연이 (신성대학 컴퓨터정보계열) ;
  • 김승주 (성균관대학교 정보통신공학부 정보보호연구소) ;
  • 원동호 (성균관대학교 정보통신공학부 정보보호연구소)
  • Published : 2005.12.01

Abstract

Mobile communication has become more pervasive and it is considered as one of main concerns oi conferencing, multi-user games and etc. in mobile environment. These applications need to secure communication in group. Most of the published protocols are based on model which consists of a stationary base station and a cluster of mobile devices. In this paper, we have focused on the extended model of which participants are several base stations and mobile devices in different cells. We present a new group key protocol among mobile devices in different cells and analyze its security And we also look at how password authentication can be used to our group key agreement protocol. The mobile device's computing load may be reduced by using password authentication.

모바일 장치의 사용이 대중화되면서 무선 통신을 이용한 화상회의, 다중 사용자 게임, 인터랙티브 채팅 등의 그룹 기반의 어플리케이션에 대한 관심이 증가되고 있다. 이러한 그룹 기반의 어플리케이션이 안전하게 수행되기 위해서는 그룹 구성원간 안전한 통신을 위한 키 동의가 선행되어야 한다. 기존에 제안된 모바일 환경에서의 그룹키 동의 프로토콜에서는 하나의 셀 내의 모바일 장치들이 그룹키를 공유하는 것을 고려하였다. 본 논문에서는 기존 모델을 확장하여 최초로 서로 다른 셀에 속한 모바일 장치들 간의 그룹키 동의 프로토콜을 제안하고 안전성을 분석하도록 한다. 또한 모바일 장치의 계산 부담을 줄이기 위해 패스워드 인증 방식을 제안한 프로토콜에 적용해 보도록 한다.

Keywords

References

  1. I. Ingemarsson, D. T. Tang, C.K. Wong, 'A conference key distribution system,' IEEE Transactions on Information Theory, IT-28(5), pp. 714-720, September 1982
  2. M. Burmester, Y. Desmedt, 'A secure and efficient conference key distribution system,' In Advances in Cryptology-Eurocrypt'94, Springer-Verlag, pp. 275-286, 1995
  3. M. Steiner, G. Tsudik, M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication,' Proc. of the 3rd A CM Conference on Computer and Communication Security(CCS'96), pp. 31-37, March 1996 https://doi.org/10.1145/238168.238182
  4. E. Bresson, O. Chevassut, A. Essiari, D. Pointcheval, 'Mutual Authentication and Group Key Agreement for Low-Power Mobile Devices,' International Conference on Mobile and Wireless Communications Networks, Springer-Verlag,, Lecture Notes in Computer Science, LNCS 1514, pp. 59-62, 2003
  5. J. Nam, S. Kim, D. Won, 'A Weakness in the Bresson-Chevassut-Essiari-Pointcheval' s Group Key Agreement Scheme for Low-Power Mobile Devices,' In Cryptology ePrint Archive, Report 2004/251, to appear, IEEE Communications Letters, 2005
  6. J. Nam, J. Lee, S. Kim, D. Won, 'DDH-based Group Key Agreement in a Mobile Environment,' In Cryptology ePrint Archive, Report 2004/127, to appear, Journal of Systems and Software(JSS), 2005
  7. C. Carroll, Y. Frankel, Y. Tsiounis, 'Efficient key distribution for slow computing devices Achieving fast over-the-air activation for wireless systems,' In IEEE Symposium on Security and Privacy (S&P '98), May 1998 https://doi.org/10.1109/SECPRI.1998.674824
  8. S. Bellovin, M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' In Proc. of the Symposium on Security and Privacy, pp. 72-84, 1992 https://doi.org/10.1109/RISP.1992.213269
  9. M. Bellare, D. Pointcheval, P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' In Advances in Cryptology Eurocrypt 2000, Springer-Verlag, pp. 139-155, 2000
  10. J. Katz, R. Ostrovsky, M. Yung, 'Efficient Password-Authenticated key exchange Using human-Memorable Passwords,' In Advances in Cryptology-Eurocrypt 2001, Springer-Verlag, pp. 475-494, 2001
  11. M. Steiner, G. Tsudik, M. Waidner, 'Refinement and extension of Encrypted Key Exchange,' ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995 https://doi.org/10.1145/206826.206834
  12. J. W. Byun, I. R. Jeong, D. H. Lee, C. S. Park, 'Password-Authenticated Key Exchange between Clients with Different Passwords,' 4th International Conference on Information and Communication Security(ICICS), pp. 134-146, 2002 https://doi.org/10.1007/3-540-36159-6_12
  13. J. Kim, S. Kim, J. Kwak, D. Won, 'Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords,' 2nd Computational Science and Its Applications(ICCSA), pp. 895-902, May 2004
  14. N. Asokan, P. Ginzboorg, 'Key Agreement in Ad-hoc Networks,' Expanded version of a talk given at the Nordsec'99 workshop, Februry 2000
  15. E. Bresson, O. Chevassut, D. Pointcheval, 'Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks,' Advances in Cryptology Asiacrypt'02, LNCS vol. 2501, Springer-Verlag. pp. 497-514, 2002
  16. S. Keung, K. Siu, 'Efficient Protocols Secure Against Guessing and Replay Attacks,' Proceedings of the Fourth International Conference on Computer Communications and Networks, pp. 105-112, 1995 https://doi.org/10.1109/ICCCN.1995.540108