130 likes | 297 Views
An Efficient Group Key Generation in the Battlefield. Jin Wook Byun byunstar@korea.ac.kr CIST & GSIS, Korea University. Nov. 16. 2005. Contents. Multi-layer ad hoc Network (Battlefield) Password-based key exchange protocols An efficient Group Key Generation in Battlefield Conclusion.
E N D
An Efficient Group Key Generation in the Battlefield Jin Wook Byun byunstar@korea.ac.kr CIST & GSIS, Korea University Nov. 16. 2005
Contents • Multi-layer ad hoc Network (Battlefield) • Password-based key exchange protocols • An efficient Group Key Generation in Battlefield • Conclusion
Multi-layer Ad-hoc Network • Multi-layer Ad-hoc Network • Ground MANET • Includes regular ground mobile nodes (GN) • GN is equipped with limited powers. • Ground mobile backbone network • Includes special fighting nodes such as tanks. • Tanks may carry a lot equipment than soldiers. • Unmanned aerial vehicles (UAV) • UAV maintains a station that at an altitude of 50 thousands feet by flying a circle.
Motivation & Contributions • Motivations • Second and third layers > the first layer • Communicational and computational power !! • The first Ground MANET • Various physical attacks and bombs with dynamic changing network configuration • Lightweight, convenient, and secure cryptographic solutions should be applied to soldiers • N-Party EKE-D Protocol • Constant round - lightweight • Distinct Human-memorable passwords - convenient • Dynamic setting - MANET Battlefield !!
Password-based Key Exchange • Goal • Confidentiality, Integrity • Application • Building secure communications in cryptographic protocols such as IPSec, SSL. • Password-based Key Exchange (PAKE) • Shared Password-Authenticated Model • Provides PAKE between a client and server using shared password • Different Password-based Authenticated Key Exchange (DPWA) • Provides PAKE between a client and a client using different passwords
Password-based Key Exchange • Brief History in this area • Different Password- Authentication Model (DPWA) • Two party • 1995, Steiner et al. : 3-Party EKE • 1998, Lin et al. : LSSH-3PEKE • 2002, Byun et al. : C2C-PAKE • 2005, Byun et al. : efficient and provably secure C2C-PAKE • 2005, Abdalla et al. : Generic construction of a 3-party protocol • N-party • 2005, Byun et al. suggested N-party EKE protocols • 2005, Byun et al. suggested N-party EKE secure against insider attacks.
Model and Definition • NEKE Security • Assumption • Computational Diffie-Hellman Assumption Asks queries Test Query Coin toss b If b=1, real skSK Else, random strSK SK Guess b’
N-party EKE-D • Setup Algorithm
N-party EKE-D • Leave Algorithm
registration registration N-party EKE-D • Join Algorithm
Security Results • N-party EKE-D • # of send, hash, enc/dec queries : • Forward Secrecy • Backward Secrecy
Conclusion • N-Party EKE-D • Different passwords • Constant round • Provable security • Dynamic scenario • On Going works • We are now designing a general key management framework covering all layers of Multi-layer ad-hoc networks
Thank you very much !!Q & AE-mail address : byunstar@korea.ac.kr