Abstract

In this paper we have proposed and successfully implemented a new group key transfer protocol based on CBU hash function. The proposed scheme relies on mutually trusted Key Distribution Center (KDC) to generate and distribute session keys to all communicating entities secretly. In this scheme the key information is broadcasted at once to all the participating entities, but with the available information only the authorized user will be able to recover the actual session key. The advantage of this protocol lies in the fact that even if the pre-shared master key gets compromised, the attacker will still will not be able to recover the actual session key. Furthermore, our protocol makes use of CBU hash function along with Advanced Encryption Standards (AES) to provide confidentiality.

Highlights

  • Cryptography can be used as a security mechanism to provide confidentiality, integrity, and authentication, but not if the keys are compromised in any way

  • The session key sends to A, B and C in encrypted form, and these group members can recover the actual session key by making use of the information provided by the Key Distribution Cen­ter (KDC)

  • In this paper we proposed an efficient group key transfer protocol based on CBU hash function

Read more

Summary

Introduction

Cryptography can be used as a security mechanism to provide confidentiality, integrity, and authentication, but not if the keys are compromised in any way. Most often KGC encrypts session keys under another secret key (master’s key) shared with each entity during registration[2, 5] The problem with this kind of approach is that a unique master key is required to be preshared between KGC and each group members and if the master’s key is captured during initial distribution whole communication will become unsecured. The strength of this protocol lies in the fact that even if the master key gets compromised the attacker will still not be able to recover the session key In this protocol the encrypted session key is transferred to all the group members at once, but only those members (authorized) who have the group key information will be able to recover the session key correctly. Any eavesdropper, who is continuously monitoring the channel, will not get suspicious about the message being passed

Proposed Work
Request for Session Keys
Response
Process of Encryption of the Session Key
Encryption
Decryption Process of Session Key
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.