Font Size: a A A

Elliptic Curve Cryptography In The Multicast Network

Posted on:2006-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y YangFull Text:PDF
GTID:2208360152981250Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Multicast network grow up quickly by the increscent demand of flow media and other video application. Multicast is a one-to-many transmission technology. It's an efficient way to deliver IP data package from one source to more destination , send the copy of information to a group of address, to all the recipients at the same time. The protocol definition of multicast don't give a scheme on security , it restrict the application of multicast.In the field of multicast security, group key management, is a noteworthy issue. Group key management meet the encryption and authentication demand for the group member by generating sending and updating group key. Key generate in the same time give more pressure on network performance,we need a effective scheme of group key establishment .We pay attention to group key establishment, introduce the research actuality of multicast network secure area, by compare several group key establishment protocols. The Elliptic Curve Cryptosystems (ECC) based on discrete logarithm problem are proper to be applied in environments like multicast netork Because Elliptic Curve Cryptosystems can provide equivalent security as the existing public key schemes, using much shorter keys., So we use ECDH (Elliptic Curve Diffie-Helleman) to modify the GDH. 2 for it' sits proper use in multicast network.To prove our proposal, how to implement the ECC and GDH. 2 are introduced in detail. Then the emulational result in test environment is given . The result proves that the proposal of using ECDH in EGH. 2 is correct,we can see the advantage of using ECC compared to others public cryptography algorithm in multicast network.Finally we give the summarization of this paper, point out the problem to be resolved, then , introduce what the future work should be done.
Keywords/Search Tags:IP multicast, gourp key establishment, Elliptic Curve
PDF Full Text Request
Related items