Dissertation > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Secure communication : structural principle points

Design and Implement of a New Group-Key Exchange Protocol

Author JinFeng
Tutor TianYuan
School Dalian University of Technology
Course Software Engineering
Keywords Group key exchange with authentication Secure channel group Anonymous Elliptic Curve Cryptography
CLC TN918.6
Type Master's thesis
Year 2008
Downloads 37
Quotes 0
Download Dissertation

The group key exchange protocol is a new generation of network environment , one of the most basic security mechanisms in the the contemporary wireless mobile / ad hoc network environment , and involves a series of new features and a new problem , more than the traditional two-party security protocols complex. Therefore, the present study was relatively small. Design a group key exchange protocol for the LAN dynamic group environment , safety analysis , and software implementation based on elliptic curve cryptography system . Firstly application Canetti 's UC theory to establish a group key exchange group ideal secure channel UC model , the model accurately portray the group secure communications should have a series of important properties . The intractability assumptions then , based on the so-called group Diffie-Hellman decisional problem , the specific construct a standard model (standard model) , the key exchange protocol suitable for dynamic group environment , the agreement is in addition to authentication and key addition to to confidentiality these basic nature , also has the / ad hoc network of wireless mobile environment often requires post - authentication and anonymous nature ( including Anonymous illegal members of Anonymous and legitimate members ) . And clearly defined the attackers the ability to emulate the aggressive behavior . The agreement also has the good characteristics of the structure according to the security nature , it is easy to cut and compromise design . This paper further functional modules based on elliptic curve public key cryptography software implementation , group key exchange protocol suitable for LAN and developed on the basis of this module . The main module comprises encryption / decryption module , a digital signature module , the resource management module and the I / O operation module . The detailed analysis of all aspects of the agreement in the various sub- protocol security , and combined with the security of elliptic curve , we can see that the agreement has a higher security . Through the analysis of experimental data shows that the protocol has a higher efficiency . And easy to expand the program design , portability , stability , etc. .

Related Dissertations
More Dissertations