Font Size: a A A

Ip Security Multicast

Posted on:2007-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:K QinFull Text:PDF
GTID:2208360185955656Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Security of IP Multicast is a hard problem, which is the reason why multicast has not been adopted widely. In this dissertation, I made an in-depth research of IP Multicast security. My research focuses on group key management and group key agreement.Besides group key management, Multicast security connotation also includes others such as Source Authentication (SrA), Multicast Digital Right Management (MDRM). In addition, study of multicast communication protocol is also a hotspot, including routing protocol, QoS and so on.The contribution of this dissertation is the proposal of three more efficient group key management schemes. One is based on Chinese Remainder Theorem (CRT) and the others are founded on Jacobian Elliptic Rational Map.My main efforts are listed below:-Systematic architecture/framework and research achievements of MSEC WG (Multicast Security Working Group) are provided.-Introduction of several typical group key management schemes.-CRT based group key management is presented.-Chaos-based cryptography is shown in multicast security investigation.For the sake of making primary and secondary more clearly, multicast communication protocol is not discussed much since my research is independent of multicast routing protocols. That is, my investigation is "End-to-End". Any attack caused by inappropriate routing protocols, for example, DoS attack, is not considered.In the first chapter of this dissertation, I introduce the backgrounds as well as goals, methods, tasks and scope of my research. In addition, basic concepts of multicast are also represented. In chapter II describes the multicast security research issues been talking about within MSEC WG. Interconnection of these issues and framework are also shown. Chapter III introduces several typical group key management schemes. Concentration of this dissertation is on chapter IV and V. My dedication is well illustrated in both the two chapters. At last, chapter VI provides summarization and my future work.
Keywords/Search Tags:multicast, group key management, Chebyshev Polynomial, Jacobian Elliptic Rational Map, Chinese Remainder Theorem
PDF Full Text Request
Related items