Download - CSC 774 Advanced Network Security
![Page 1: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/1.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security 1
Computer Science
CSC 774 Advanced Network Security
Topic 5.3 Group Key Distribution
Acknowledgment: Slides on LKH were originally provided by Dr. Wensheng Zhang at Iowa State.
![Page 2: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/2.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
2Computer Science
Outline
• Overview of group key distribution
• A naïve solution
• Iolus: A Framework for Scalable Secure Multicasting
• Logical key hierarchy (LKH)
![Page 3: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/3.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
3Computer Science
Group Key Distribution
• Group session keys are determined by the group manager– Usually used for large groups.
Group keymanager
Group members
![Page 4: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/4.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
4Computer Science
A Naïve Solution
• Use a separate secure unicast connection from the group manager to EACH group member.
• Requirement– Each client shares a unique key with the controller.
• Poor scalability: – n-1 secure unicast connections– n secret keys
![Page 5: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/5.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
5Computer Science
Problems Specific to Group Communication• “1 affects n” problem
– The actions of one member affects the entire group
Group keymanager
Old members
New member joins
![Page 6: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/6.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
6Computer Science
Problems Specific to Group Communication (Cont’d)• “1 does not equal n” problem
– Cannot deal with the group as a whole – Must consider the conflicting demands of members on an
individual basis
Group keymanager
Group members
Member leavesExample: Cannot use the old group key todistribute the new group key.
![Page 7: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/7.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
7Computer Science
Iolus
• Divide a large group into smaller groups• Introduce entities that manage and connect the
subgroups– Group security controllers (GSC)
• Control the entire group
– Group security intermediaries (GSI)• Control the subgroups on behalf of GSC
– GSC and GSI are both referred to as group security agent (GSA)
– With GSC as the root, GSAs form a hierarchy of subgroups• A lower-level GSA is a member of the group headed by the higher-
level GSA
![Page 8: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/8.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
8Computer Science
Iolus (Cont’d)
![Page 9: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/9.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
9Computer Science
Iolus (Cont’d)
• Joins– GSA generates KGSA-MBR
– Store this key along with other information
– Send KGSA-MBR to the new member in a secure channel
– Generate a new group key K’G
– Send {K’G}KG to the group
– Send K’G to the new member in a secure channel
![Page 10: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/10.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
10Computer Science
Iolus (Cont’d)
• Leaves– Generate a new group key K’G
– Send K’G to each member MBR individually in the secure channel encrypted with KGSA-MBR
![Page 11: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/11.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
11Computer Science
Iolus (Cont’d)
• Data transmission– Data retransmitted within each subgroup
![Page 12: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/12.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
12Computer Science
Iolus (Cont’d)
• Iolus for group key management– Replace the data with the group key in data
transmission
![Page 13: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/13.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
13Computer Science
Logical entities
Group key
members
Group Controller
N: number of members
D: tree degree
depth1( )ln N
( )ln d
Key Tree Approaches
• Two types of keys – SEKs (Session Encryption Key)– KEKs (Key Encryption Key)
• A Group Controller constructs a tree based hierarchy of KEKs
![Page 14: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/14.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
14Computer Science
Logical Key Hierarchy (LKH)
• Keys are organized in a (logical) hierarchical tree– Group key is located at the root– Key encryption keys are the non-root, non-leave
nodes– Members are located at the leaves
• Updates the group key and the key encryption key by means of the encryption of key-nodes
• Rekey with only O(logN) messages
![Page 15: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/15.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
15Computer Science
KK3232KK3131 KK3333 KK3434 KK3535 KK3636 KK3737 KK3838
KK2222KK2121 KK2323 KK2424
KK1111 KK1212
KK00 GKCsGKCs
MM11 MM22 MM44 MM66MM55MM33 MM77 MM88
N secure channels
LKH (Cont’d)
• Initialization
![Page 16: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/16.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
16Computer Science
GKCsGKCs
KK3232KK3131 KK3434 KK3535 KK3636 KK3737 KK3838
KK2222KK2121 KK2323 KK2424
KK1111 KK1212
KK00
MM11 MM22 MM44 MM66MM55MM33 MM77 MM88
( )ln N
( )ln dRekeying Messages
K’K’1111
K’K’2222
K’K’00 KK34 34 { K{ K1111’}’}KK34 34 { K{ K00’}’} KK34 34 { K{ K2222’}’}
KK21 21 { K{ K1111’}’}KK21 21 { K{ K00’}’}
KK12 12 { K{ K00’}’}
LKH (Cont’d)
• Member leave
![Page 17: CSC 774 Advanced Network Security](https://reader035.vdocument.in/reader035/viewer/2022072013/56812b73550346895d8f9551/html5/thumbnails/17.jpg)
Dr. Peng Ning CSC 774 Adv. Net. Security
17Computer Science
GKCsGKCs
KK3232KK3131 KK3333 KK3434 KK3535 KK3636 KK3737 KK3838
KK2222KK2121 KK2323 KK2424
KK1111 KK1212
KK00
MM11 MM22 MM44 MM66MM55MM33 MM77 MM88
( )ln N
( )ln dRekeying messages
K’K’2121
K’K’1111
K’K’00
KK21 21 { K{ K2121’}’} KK11 11 { K{ K1111’}’} KK00 { K{ K00’}’}
KK31 31 { K{ K2121’}’} KK31 31 { K{ K1111’}’} KK31 31 { K{ K00’}’}
LKH (Cont’d)
• Member join