Open Access Open Access  Restricted Access Subscription Access

A New Group Key Transfer Protocol Using CBU Hash Function


Affiliations
1 Department of Computer Science and Engineering, Cambridge Institute of Technology, Tatisilwai, Ranchi (Jharkhand), India
2 Department of Computer Science and Information Technology, Jaypee University of Information Technology, Waknaghat, Distt. Solan, (H.P), India
 

In this paper we have proposed and successfully implemented a new group key transfer protocol based on CBU hash function. The proposed scheme relies on mutually trusted Key Distribution Center (KDC) to generate and distribute session keys to all communicating entities secretly. In this scheme the key information is broadcasted at once to all the participating entities, but with the available information only the authorized user will be able to recover the actual session key. The advantage of this protocol lies in the fact that even if the pre-shared master key gets compromised, the attacker will still will not be able to recover the actual session key. Furthermore, our protocol makes use of CBU hash function along with Advanced Encryption Standards (AES) to provide confidentiality.

Keywords

Group Key Transfer Protocol, CBU Hash Function, Key Distribution Centre (KDC), Advance Encryption Standards (AES), Confidentiality
User

  • Blakely GR. Safeguarding cryptographic keys. Proc Am Federation of Information Processing Soc (AFIPS '79). Nat'l Computer Conf. 1979; 48:313–317.
  • Berkovits S. How to broadcast a secret. Advances in Cryptology–CRYPTO '91. Lecture Notes in Computer Science. 1991; 547:536–541.
  • Stalling W. Cryptography and network security. 4th ed.; 2005.
  • Adusumilli P, Zou X, Ramamurthy B. DGKD: Distributed Group Key Distribution with authentication capability. Workshop on Information assurance and Security. IEEE; 2005 Jun.
  • Zhang Q, Wang Y. A centralized key management scheme for hierarchical access control. IEEE Communication Society. 2004; 4.
  • Harn L, Lin C. Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers. 2010 Jun; 59(6).
  • Sherman AT, McGrew DA. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering. 2003 May; 29(5) : 444–458.
  • Song R, Korba L, Yee GOM. A scalable group key manage- ment protocol. IEEE Communication Letters. 2008 July; 12(7).
  • Chang C-C , Lin C-H, Chen C-Y. A conference key distribution scheme using interpolating polynomials. IEEE International Conference on Multi-media and Ubiquitous Engineering; 2007; 1(2):963–967.
  • Metal M. A new secure multi-cast key distribution protocol using combinatorial boolean approach. Int J Netw Secur. 2009 Jan; 8(1).

Abstract Views: 518

PDF Views: 0




  • A New Group Key Transfer Protocol Using CBU Hash Function

Abstract Views: 518  |  PDF Views: 0

Authors

Mohit Kumar
Department of Computer Science and Engineering, Cambridge Institute of Technology, Tatisilwai, Ranchi (Jharkhand), India
S. P. Ghrera
Department of Computer Science and Information Technology, Jaypee University of Information Technology, Waknaghat, Distt. Solan, (H.P), India

Abstract


In this paper we have proposed and successfully implemented a new group key transfer protocol based on CBU hash function. The proposed scheme relies on mutually trusted Key Distribution Center (KDC) to generate and distribute session keys to all communicating entities secretly. In this scheme the key information is broadcasted at once to all the participating entities, but with the available information only the authorized user will be able to recover the actual session key. The advantage of this protocol lies in the fact that even if the pre-shared master key gets compromised, the attacker will still will not be able to recover the actual session key. Furthermore, our protocol makes use of CBU hash function along with Advanced Encryption Standards (AES) to provide confidentiality.

Keywords


Group Key Transfer Protocol, CBU Hash Function, Key Distribution Centre (KDC), Advance Encryption Standards (AES), Confidentiality

References





DOI: https://doi.org/10.17485/ijst%2F2014%2Fv7i1%2F46675