Download Secure Key Agreement for Group Communication Team A

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

AppleTalk wikipedia , lookup

Extensible Authentication Protocol wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Computer network wikipedia , lookup

Zigbee wikipedia , lookup

Airborne Networking wikipedia , lookup

Internet protocol suite wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
Secure Key Agreement for Group
Communication
A Team
Eric Olson
Will Asche
Dan Kaplan
Anthony Spring
Girish Sarma
Outline










Current Framework
Key agreement protocol
Goals accomplished
Goals not accomplished
Assumptions
Limitations
Problems
What we learned
Future works
Conclusion
Current Framework
Application
KAP
PROXY
M2MI
M2MP
Secure Key Agreement Protocol


Communication among group members
privately and securely, since all the
messages reach every one present in the
network
Each device contribute to the generation of a
common group key for communication
Goals accomplished





Secure communication
Dynamic join & leave of devices
Join multiple groups simultaneously
An attacker cannot gain any information from
the underlying broadcast network
Working example applications
–
–
Simple command line chat interface
An IRC like application
Goals not accomplished




Devices disappearing without notice*
Authenticate nodes and IC
Make the implementation more scalable
Reliable communication
–
JRMS, TCP/IP
Assumptions
Trusted members
 Trusted third party, Information Center (IC)
 All devices can see every one present in the current
network
 The new member has extra computational burden
when joining

Limitations



Scalability limitations
Cannot send large objects
Propagation delays
Problems



Slow start up of IC when using large prime
numbers.
Inability to add Java crypto library’s
implementation of asymmetric key encryption
Dependency on the implementation layer to
discover other devices in the network
Analysis



lg n messages for every member join/leave
n + lg n memory consumption
Use of stream cipher requires less
computational power, but less secure than
block ciphers
\/\/|_|7 vv3 13@4l\l3|)?




M2MI – M2MP
The protocol
Basics of cryptography
If we had 10 more weeks…





Handle devices disappearing
Error checking & handling
Reliable multicast
More applications
More optimizations
Conclusions


M2MP & M2MI were sufficient for obtaining
the minimal requirements specified by the
protocol
This protocol is not practical for ad-hoc
networks
–
–
Authentication is dependent upon unique ids,
such as MAC / IP addresses
Remote event synchronization is dependent on
reliable multicast
Conclusions






E-moo
tabs are evil
GROUPED == GROUPSTARTUP !!!
if( left ) return left
else return left
System.err.println (“what the F***2 ?!?!!!!!”);
Don’t double lock files