This website uses cookies to ensure you have the best experience. Learn more

Efficient And Secure Star Topology Based Multicast Key Management Algorithm

1470 words - 6 pages

For example , Assume that there are three members U1, U2, U3 in the group .
U1 selects p1=11, q1=17 computes X1=11*17= 187
U2 selects p2=31, q2=47 computes X2=31*47= 1457
U3 selects p3=17, q3=47 computes X3=17*47= 799
X1≠X2 ≠X3, so all the three members are registered in multicast group. Let us say, U3 leaves the group. Therefore, the modulus operation in cipher text computation is performed with respect to X1 and X2. Although member U3 has left the group, but both his factors p3 and q3 of X3 are already present in X1 and X2 respectively. Therefore, he can decrypt the future cipher text to obtain the original confidential message M using secret information X3 and private key d3. Hence, ...view middle of the document...

2. The individual member Ui chooses two prime number pi and qi randomly and also compute the product Xi and Ф(Xi)
Where, Xi = pi × qi and Ф(Xi)=(pi-1) × (qi-1)
3. The member calculates the private key by applying the extended Euclidean algorithm, computing a unique integer di, such that
e×di ≡ 1 mod (Ф(Xi))
4. The authenticated members deliver their Xi value to the key server.
5. The server registers the member if and only if
gcd (Z, Xi) = 1 and keeps Xi as secret. Then, the server stores product of Xi values in Z.

3.1.2 Message encryption phase

The steps to be performed by server for message encryption are described as follows:-

1. After determining the set of registered users, the server uses e as well as secret values of message xi to encrypt a message M by using the following formulae [5]:-
C = (M)e mod Π Xi; i=1 to n
where, n is the no. of selected members to whom secret message is to be sent.
2. After computing the cipher text C by the key server , the server sends a broadcast message to all the registered member of the group..

3.1.3Message decryption phase
The steps to be performed by the member for message decryption are described as follows:-

1.After the cipher text C is received, the individual member Ui can decrypt C, using his private key di and secret information Xi, to obtain the confidential message M as follows [5]:-
Ui → M = (C mod Xi)di mod Xi
The proposed scheme ensures that only the members whose Xi values are used to encrypt the message are able to decrypt it.

3.2 Member joining and leaving the group

3.2.1 Member joining the group

Whenever a new member Ui+1 wants to join the group , the server repeats the same procedure as that of key assignment. The rekeying process for existing members is eliminated because their secret information Xi and private key di remains unaffected.

3.2.2 Member leaving the group
Whenever a member Ui wants to leave the group, the remaining members do not need to modify the secret information X and private key d. The key server deletes the secret value Xi from the active list.
In the cipher text computation, the modulus operation is performed with the subset of Xk values of the remaining members Uk. For example, if the key server sends a message to the remaining group members, the encryption is performed as:
C=Me mod(X1 × X2 × …× Xi-1 × Xi+1 ×… ×Xn )
Thus, Ui cannot decrypt the message.


In this section, a simple example is discussed to illustrate our scheme for group communication.

Key assignment phase
Suppose that there are six members U1, U2, U3, U4, U5 and U6 who want to join the group. Then the following steps are performed for key assignment:-
1. The server declares the parameter e=101 to the members and also authenticates the member who wants to join the group.
2. The individual member Ui chooses two prime number pi and qi randomly and also compute the product Xi and Ф(Xi)
Where, Xi = pi × qi and Ф(Xi) = (pi-1) × (qi-1)
U1 chooses p1 = 283 and q1...

Find Another Essay On Efficient and secure star topology based multicast key management algorithm

key management for multicast groups using broadcast encryptionand groupkey agreement

848 words - 4 pages a way that group dynamic information is not revealed to the outside world. Secure transmission of data among multicast group is carried out with the proposed key management scheme which achieves both forward and backward secrecy. Using RSA algorithm, the keys are generated. And encryption, decryption cryptographic process is carried out for the secure transmission of data, as well as secure group communication such as online group chat. The

Activity Based Costing, Activity Based Budgeting and Activity Based Management Analysis

1472 words - 6 pages In this section of the report, we shall discuss the interlinked processes of Activity Based Costing, Activity Based Budgeting and Activity Based Management by using the help of certain diagrams and also touch upon the evolution of the Activity Based approach over time. The diagram shown above explains how costs are assigned to a product under the ABC approach. ABC first assigns costs to the activities that are the real cause of the overhead

Project management should based on knowledge and people

934 words - 4 pages Project management is a art of balance. The progress of the project implementation is just like a tough journey. Project management is the key to ensure success, while a mature system of project management is a powerful tool of project manager. The successful of the project, instead of the project management process, is the final target of all related parties. Project management, project target and specific task are all based on knowledge, but

The Coca-Cola Company: Market Based Management and Value Driven Management Strategies

1568 words - 6 pages Introduction The Coca-Cola Company was founded in 1892. Since its inception, the organization has seen a steady increase in its market share over the years, and to this day has operations in over 200 countries worldwide. To achieve such success in its competitive market, Coca-Cola has employed sound strategies that have helped it become among the leaders in its industry. The Coca-Cola Company utilizes Market Based Management (MBM) techniques

Financial Statement and Ratio Analysis: Key Tools to Successful Financial Management

2633 words - 11 pages . Key financial decisions are based on management's ability to utilize financial analysis as a tool to measure the firm's financial performance, the effectiveness of its management, and as a means of comparison to companies within the same industry (Mautz & Angell, 2006).A firm uses financial analysis as a tool to make sound financial decisions, which contribute to general corporate objectives. It is imperative for a firm's management to view

Management Process and how this is a key element in running a successfull business is a well-developed management department

1138 words - 5 pages Management ProcessesOne of the key elements in running a successful business is a well-developed management department. Organizations cannot simply run by themselves, nor achieve their main goals by themselves either. That is why many successful organizations, such as McDonalds, Rockwell Automation, and General Motors hire managers that use what is called the management processes, which consists of four basic functions- planning, organizing

Team based management is essential for better organizational control. However introducing team based management is not possible without affecting the structure and culture of an organization

1651 words - 7 pages Team-Based management is a new and powerful management operating system that can apply to any business-both service and industry. The system is generic and can apply to most any kind and size of organization. Now in competitive business environment team based management is essential to achieve the organizational goal. To introduce team based management system, organization should also create such environment, culture and structure to which this

Describe an event that an organization has successfully turned around due to good management. List the key attributes of effective Leadership and Strategic Thinking

596 words - 2 pages The ability to quickly interpret a previously undefined scenario and act appropriately is a key driver of successful management in this era of hyper-competition and turbulent market conditions. To gain a nuanced understanding of the importance of interpretative framework for effective leadership, we selected a small high-pace startup organization that has experienced significant leadership turnover. It is a small organization with a flat

Human Resources Management in the Asia Pacific: Provide arguments for shifting certain functions, retaining other function and developing new function within companies based in the region

1868 words - 7 pages of his/her contribution. Developing new function is essential in order to develop staff potential to meet their personal aspirations for career development and job satisfaction where these can reasonably be accommodated in terms of cost and time.What are the implications for the Human Resources Management personnel in Singapore, Korea and Taiwan based companies.Ten years ago, Human Resource Management was nearly an unknown term in Asia. Training

Evaluate the role of operations management in achieving international and global success, for a service (not product) based organisation of your choic

1384 words - 6 pages regard to communication strategies, customer service, and management styles. Effective communication is a primary aspect to the global success of Enterprise Rent A Car. Enterprise Rent A Car have a number of key messages that include: ‘communicating the brand values and culture, informing customers or potential customers about the company and its services, for example, its unique pickup service, communicating company news, procedures and

Training and Development, linked with performance management, are key area within an HRM strategy and are fundamental for the success or failure of an organization. Discuss

1585 words - 6 pages Introduction" Human Resource management is defined as a strategic and coherent approach to the management of an organizations most valued assets - the people working there who individually and collectively contribute to the achievement of its objectives."HRM is very important in today's world and it has to be adapted and embedded in every organizations strategy. It is important as much as any department in an organization and it has to play an

Similar Essays

An Efficient And Secure Multicast Key Management Scheme Based On Star Topology"

979 words - 4 pages star topology based multicast key management algorithm was proposed by Saravanan, K. and T. Purusothaman [1] which is based on RSA algorithm [10] in which secret keys are calculated by the group members. This eliminates the need to unicast the secret keys to every member separately, henceforth, reducing the load on the server to great extent. In that scheme when a member A leaves the group, the forward secrecy is thwarted if pA equals pB or qB

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

585 words - 3 pages itself. Hence, in core based multicast tree, shortest path from the source node to the destination node cannot be guaranteed, but only one tree would be needed to connect the set of the source nodes to a set of the receiver nodes. And many MANET has limited energy resources (battery), and each node operates in unattended manner. So energy efficient is an import design consideration for these networks. So we proposed energy efficient paper using

An Approach Of Energy Efficient And Secure Data Transfer Using Multicast Routing Protocol In Ad Hoc Networks

946 words - 4 pages place to another place and it forms the own topology themself. And each nodes are powered by batteries with a limited energy, wherein each node stops functioning when batteries get sanitations. For energy efficient and maximize lifetime of nodes we introduce techniques aimed to minimize power consumption of all nodes by using multicast routing protocol. Multicast routing protocol is independent of unicast routing protocol. Multicast source node

Key Management For Multicast Groups Using Broadcast Encryption And Group Key Agreement

583 words - 3 pages key management method to extend demerit point-to-point quantum channel, adopting VPN technique to construct or join a private network across an existing public network by creating an encrypted tunnel between both of them, and one- time pad algorithm to provide perfectly secure communication as well. This paper is organized as follows. Section II security requirement and related issues for key management system will be discussed in greater detail