Font Size: a A A

Design And Analyse Of SMC Protocol For Multi-Party Communication Scenario

Posted on:2010-01-24Degree:MasterType:Thesis
Country:ChinaCandidate:C GaoFull Text:PDF
GTID:2178360278966382Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of computer network, the security of network communications data has become a problem which cannot be ignored. Several security protocols have been designed and implemented to support confidentiality, integrity protection and authentication . And these protocols, have been proved to be security in practice, such as TLS, IPSec etc. But these protocols are not suitable for Multi-Party Communication Scenario, because they are designed for end to end scenario and have to use sessions to support Multi-Party Communication. It is not a good solution to use these protocol because of their poor performance in Multi-Party Communication Scenario. IETF MSEC group have been introduced several new protocols to manage group keys, such as GDOI, GSAKMP etc. But these protocols are still limiting in practice. So, a new Multi-Party Communication security protocol is needed to manage multicast data effectively. Furthermore, the new protocol should be achievable and has better deploy performance.Advantages and disadvantages of performance of several popular security protocols are analyzed when these protocols are deployed in multi-party communication scenario. Based on the advantages of these protocols, a new multi-party communication security protocol named SMC protocol which works on transport layer and could be deployed more widely is introduced. SMC protocol is a two-layer protocol, similar as TLS protocol, include SMC GKM sub-protocol on the upperlayer and SMC Record sub-protocol on the underlayer . SMC GKM sub-protocol is used to manage group keys, include initial protocol, rekeying protocol and notification protocol. SMC record sub-protocol is used to ensure data security, include initial session, rekeying session and data-sec session.Security issues and attacks in practice are discussed and analyzed, and contrasting with MSEC protocol suite, SMC protocol is as secure as MSEC protocol suite, but it has better deploy performance than MSEC protocol suite. SMC protocol is implemented in Linux C environment, and shows that SMC protocol can be implemented and deployed conveniently.
Keywords/Search Tags:network security, multi-party communication, TLS, DTLS, MSEC protocol suite, SMC protocol
PDF Full Text Request
Related items