Font Size: a A A

Design And Implement Of A New Group-Key Exchange Protocol

Posted on:2009-07-26Degree:MasterType:Thesis
Country:ChinaCandidate:F JinFull Text:PDF
GTID:2178360272470843Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The authenticated group key exchange protocol is one of the most foundational security components in network environment, particularly in contemporary wireless mobile/ad hoc networks. However, the group-key exchange protocol (or more generally, any group secure protocol) has a series of brand new requirements and problems, making it much more complicated than its traditional 2-party counterparts. Therefore, there are very little researches in the field. In this paper, ECC, the group key exchange protocol is designed for dynamic group environment on LAN, and the security is analysed, then an application programme is developed based on elliptic curve cryptography system.Firstly, the paper applies UC-theorem to propose UC models for authenticated group key exchange and group secure communication channels, which specify almost all-known important requirements for group secure communications. Secondly a concrete group key exchange protocol is constructed based-upon decisional group Diffie-Hellman problem's hardness. This construction is not only adapt to dynamic group environment, identity-authenticated and key-secret but also post-specified identified and anonymous (w.r.t. illegal group members or even among legal members). The paper definitely confines the attacker abilities to emulate attack-action. In addition, this construction is well-structured to adaptive to different design objectives and balances.The paper furtherly implements function modules, which is used to implement the algorithms based on elliptic curve. And a group-key exchange protocol system for LAN based on the modules is developed. The primary modules consist of encrypt/decrypt, digital signature, resource management and I/O operator. The paper analyzes various aspects of the sub-protocol security in detail, and combines with security based on elliptic curve cryptography. Therefore the protocol has high security in the paper. Through the analysis of experimental data, the protocol has upper efficiency. The program designed in the paper has a several of strongpoints, such as expandability, independence, portability stability.
Keywords/Search Tags:Authenticated Group Key Exchange, Group Secure Channel, Anonymity, Elliptic Curve Cryptography
PDF Full Text Request
Related items