• Title/Summary/Keyword: 멀티캐스트 키

Search Result 117, Processing Time 0.024 seconds

Group Key Management with Low Cost Rekey (저비용 rekey를 갖는 그룹키 관리)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • The Internet today provides group communication model, multicast service. It is important to keep security for multicast communication. Member leaving is associated with scalability problem for group key management. If one member of the group is removed, new group key has to be changed and communicated to all remaining members of group. Modification and distribution of new group keys for rekeying is an expensive operation. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme. Periodic rekey helps reducing these important parameters rather than removing members sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm, our model has advantages of reducing the number of message and operation cost for generation of the composite keys for rekeying.

  • PDF

ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR (일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH)

  • 권정옥;황정연;김현정;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.93-112
    • /
    • 2002
  • Since the multicast group which is composed of various members is dynamic, members of the group frequently join or leave. So, for a new session, group keys are efficiently updated and distributed. In this paper, we describe very simple and new efficient logical key hierarchy(ELKH) protocol which is based on an one-way function. In the previous schemes, when the group controller distributes new created keys or updated keys to the members the information is usally encryted and then transmited over a multicast channel. But ELKH secretes the multicast message by using the one-way function and XOR operator instead of encrypting it. Hence our main construction improves the computational efficiency required from the group controller and group memebers while doesn't increase size of re-keying message when compared to $EHBT^{[12]}$. Assuming the security of an underlying one-way function, we prove that our scheme satisfies forward secrecy and backward secrecy.

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

Efficient Offered Contents Using Broadcast Encryption (브로드캐스트 암호화를 이용한 효율적인 컨텐츠 제공)

  • 이덕규;이임영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.65-70
    • /
    • 2004
  • The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriber. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

  • PDF

Performance Analysis of Broadcasting Protocol Sending Information only to Authenticated Clients in Mobile Environment (이동 환경에서 인증된 사용자에게 선별적으로 데이터를 전송하는 브로드캐스팅 기법의 성능분석)

  • Lim, Sung-Hwa;Jung, Seung-Sik;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1575-1578
    • /
    • 2002
  • 단말기의 컴퓨팅 능력과 이동 통신 기술이 발달함에 따라, 무선 이동망에서도 현재의 데스크탑에 버금가는 인터넷 컴퓨팅이 가능해 지고 있다. 브로드캐스팅(broadcasting)은 비대칭 통신 환경에서 정보를 효과적으로 전달하는 방법이다. 다수의 사용자가 요구하는 동일한 종류의 실시간 데이타를 전송할 경우, 무선 환경에서는 브로드캐스트 기법이 효과적이다. 그러나 유료 정보를 무선망에 브로드캐스트 할 경우 허가되지 않은 사용자들도 해당 정보를 이용할 수 있는 문제가 발생한다. 그러므로 이 경우 기존의 브로드캐스트 기법을 사용하는 대신, 1:1 전송 방식 또는 멀티캐스트 방식을 사용해야 한다. 그러나 사용자의 수가 많을 경우와 전송할 데이터의 크기가 커질 경우 기존의 방식들은 통신 오버헤드를 증가시킬 수 있다. 그러므로 사용자가 많고 전송할 데이터가 큰 경우 효율적인 통신을 위해서는 특정 사용자들에게 선별적 전송이 가능한 브로드캐스트 기법이 필요하다. 본 논문에서는 공개키 암호화 기술을 사용하여 정보를 허가된 사용자에게만 전송하는 브로드캐스트 기법을 제안하고 그 성능을 분석한다.

  • PDF

A Multi-receiver Certificateless Encryption Scheme and Its Application (무인증서 공개키 암호에 기반한 다중수신자 암호 기법 및 응용)

  • Sur, Chul;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.775-784
    • /
    • 2011
  • In this paper we introduce the notion of multi-receiver certificateless encryption that avoids the inherent key escrow problem of multi-receiver identity-based encryption, and also present a highly efficient multi-receiver certificateless encryption scheme which eliminates pairing computation to encrypt a message for multiple receivers, Moreover, the proposed scheme only needs one pairing computation to decrypt the ciphertext. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme for stateless receivers based on the subset-cover framework, which enjoys the advantages of certificateless cryptography.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Traitor Tracing using an Efficient Key Renewal (효율적인 키 갱신 주기를 적용한 Traitor Tracing)

  • Lee, Deok-Gyu;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.799-802
    • /
    • 2007
  • Broadcast encryption has been applied to transmit digital information such as multimedia, software and paid TV programs on the open networks. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

Improved Mobility Management and Multicast Protocols for Mobile Hosts (이동 호스트를 위한 개선된 이동성 관리 및 멀티캐스트 프로토콜)

  • Cha, Yeong-Hwan;Seong, Hyeon-Gyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.1
    • /
    • pp.81-94
    • /
    • 1995
  • By intergrating technologies for protable computers, radio communications, and computer networking, the Land Mobile Computer Network(LMCN) is supposed to overcome the time and space limitation of present computer communication network. However, because the MHs(mobile hosts) do move any time, the network connectivity is often changed causing temporarily duplicated lost, or out-of-sequenced message delivery as well as frequent communications for maintainning the network connectivity. Previous works solved the problems through message flooding, used also in multicasting, resulting in high communication cost(i.e., number of communication messages). In this paper, new protocols for efficient mobility management and multicasting are proposed. The protocols define location update, handover, and multicasting procedure of a MH over a hierarchical LMCN architecture. The protocol specification is presented, and it is shown that the communication cost of the new protocols is superior to the existing ones in terms of the communication cost.

  • PDF

Effcient Multicast Authentication Scheme for Smart Grid (스마트그리드에서의 효율적인 멀티캐스트 인증 기법)

  • Yu, Ji-Min;Kim, Ji-Hyun;Kim, Ho-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1293-1296
    • /
    • 2010
  • 오늘날 기존의 전력망에 IT가 융합되어 전력 공급자와 송배전 컨트롤러 사이에 정보 교환이 가능한 스마트그리드가 부각되고 있다. 스마트그리드 환경은 전력 공급자와 송배전 컨트롤러 사이의 정보 교환의 빈도가 높고, 정보 교환이 실시간으로 이루어 져야하는 특성을 가진다. 이러한 정보 교환이 주어진 시간 내에 정확하게 이루어지지 않거나 정보 교환 중에 공격자로 인해 악의적 변경이 일어나는 경우 대규모 정전이나 전력의 공급에 막대한 영향을 미치게 된다. 따라서 송신자 인증과 정보 교환 중에 정보의 악의적 변경이 이루어지지 않았다는 정보의 무결성 인증이 이루어 져야 하며, 이를 임계시간 이내에 처리할 수 있는 인증 프로토콜이 요구된다. 본 논문에서는 이러한 요구조건을 만족시키기 위해 타임-크리티컬(time-critical)한 특성을 가지면서 메세지 인증 기능을 제공하는 TV-HORS 멀티캐스트 인증 기법을 스마트그리드 시나리오에 적용하고, 이에 따른 문제점을 제시한 후, 이에 대한 해결책을 제시한다. 제안하는 방법은 키입력(keyed) 해쉬함수를 이용해 기존 TV-HORS 기법이 가지는 키 저장 문제를 효율적으로 해결한다.