Design and Implement of a New Group-Key Exchange Protocol
|School||Dalian University of Technology|
|Keywords||Group key exchange with authentication Secure channel group Anonymous Elliptic Curve Cryptography|
The group key exchange protocol is a new generation of network environment , one of the most basic security mechanisms in the the contemporary wireless mobile / ad hoc network environment , and involves a series of new features and a new problem , more than the traditional two-party security protocols complex. Therefore, the present study was relatively small. Design a group key exchange protocol for the LAN dynamic group environment , safety analysis , and software implementation based on elliptic curve cryptography system . Firstly application Canetti 's UC theory to establish a group key exchange group ideal secure channel UC model , the model accurately portray the group secure communications should have a series of important properties . The intractability assumptions then , based on the so-called group Diffie-Hellman decisional problem , the specific construct a standard model (standard model) , the key exchange protocol suitable for dynamic group environment , the agreement is in addition to authentication and key addition to to confidentiality these basic nature , also has the / ad hoc network of wireless mobile environment often requires post - authentication and anonymous nature ( including Anonymous illegal members of Anonymous and legitimate members ) . And clearly defined the attackers the ability to emulate the aggressive behavior . The agreement also has the good characteristics of the structure according to the security nature , it is easy to cut and compromise design . This paper further functional modules based on elliptic curve public key cryptography software implementation , group key exchange protocol suitable for LAN and developed on the basis of this module . The main module comprises encryption / decryption module , a digital signature module , the resource management module and the I / O operation module . The detailed analysis of all aspects of the agreement in the various sub- protocol security , and combined with the security of elliptic curve , we can see that the agreement has a higher security . Through the analysis of experimental data shows that the protocol has a higher efficiency . And easy to expand the program design , portability , stability , etc. .