期刊文献+

基于广义猫映射的组播密钥管理方案研究 被引量:2

Study of a Multicast Key Management Scheme Based on the Generalized Cat Map
下载PDF
导出
摘要 为处理组密钥管理中的"1影响n问题",曹国梁等人提出了组密钥与个体密钥之间存在广义猫映射关系的组播加密算法及其密钥管理方案。我们进一步分析其密码强度、前向/后向保密性和可扩展性问题。解析结果表明:对已知明文攻击的脆弱性使该密码不适合提供组播数据保密性安全服务;通信开销以组规模为渐近下界,使该方案不满足大型组播组中密钥管理低带宽开销的QoS要求。分析方法对其他密码算法转化为组密钥更新协议的研究亦有积极作用。 Aiming to deal with "the 1-affects-n problem" in group key management, a multicast encryption algorithm and ;ts corresponding key management scheme where there is a relat;on of the generalized cat map between the group key and individual keys were proposed by Cao et al.. We further analyze the cipher strength, forward/backward secre- cy and scalabil;ty problems. The analytical results demonstrate that the cipher is not suitable to provide the security service of multicast data confidentiality due to its vulnerability to the known-plaintext attack, and the scheme does not meet the QoS requirement of low bandwidth overhead for key management in a large multicast group because the group size is an asymptotic lower bound for the communication overhead. The analytical methods will also have positive effect on the research into converting other encryption algorithms into group rekeying protocols.
出处 《计算机科学》 CSCD 北大核心 2008年第1期80-82,107,共4页 Computer Science
基金 国家自然科学基金资助(编号:60573050)
关键词 组播安全 组密钥管理 广义猫映射 对称密钥分组密码 穷举密码分析 Multicast security, Group key management, Generalized cat map, Symmetric-key block cipher, Exhaustivecryptanalysis
  • 相关文献

参考文献11

  • 1Hardjono T, Dondeti L R. Multicast and Group Security. Norwood [M]. MA: Artech House, INC, 2003.
  • 2Challal Y, Bouabdallah A, Seba H. A Taxonomy of Group Key Management Protocols: Issues and Solutions [J]. Transactions on Engineering, Computing and Technology, 2005, 6 (2): 5-17.
  • 3Chiu Y P, Lei C L, Huang C Y. Secure Multicast Using Proxy Encryption [C]. In: Proceedings of the 7th International Conference on Information and Communications Security (ICICS ' 05, Beijing), Springer LNCS 3783,2005. 280-290.
  • 4Wong C K, Gouda M, Lam S S. Secure Group Communications Using Key Graphs [J]. IEEE/ ACM Trans on Networking, 2000, 8(1): 16-31.
  • 5Canetti R, Malkin T, Nissim K. Efficient communication storage tradeoffs for multicast encryption [C]. In: Advances in Cryptology-EUROCRYPT' 99, LNCS 1592. Berlin: Springer-Verlag, 1999. 459-474.
  • 6Snoeink J, Suri S, Varghese G. A lower bound for multicast key distribution [J]. Computer Networks, 2005, 47(3): 429-441.
  • 7马在光,丘水生.基于广义猫映射的一种图像加密系统[J].通信学报,2003,24(2):51-57. 被引量:73
  • 8曹国梁,周杰.一种适用于安全多播的加密算法及密钥管理方案[J].通信学报,2005,26(B01):100-105. 被引量:3
  • 9Stinson D R著.密码学原理与实践(第二版)[M].冯登国译.北京:电子工业出版社,2003.
  • 10Jacbson N. Basic Algebra I. 2nd edition [M]. New York, W H Freeman and Company, 1989.

二级参考文献15

  • 1StallingsW 杨明 译.密码编码学与网络安全:原理与实践[M].北京:电子工业出版社,2001..
  • 2JUDGE P, AMMAR M. Security issues and solutions in multicast content distribution: a survey [J]. IEEE network, 2003, 17(1):30-36.
  • 3KEI W C. Secure group communication using key graph[A].Proceedings of SIGCOMM 98[C]. New York: ACM Press,1998.68-79.
  • 4WALLNER D, HARDER E, AGEE R. Key Management for Multicast: Issues and Architectures, RFC 2627[S]. 1999.
  • 5HARNEY H, MUCKENHIRN C. Group Key Management Protocol (GKMP) Specification, RFC2093[S]. 1997.
  • 6HARNEY H, MUCKENHIRN C. Group Key Management Protocol (GKMP) Architecture, RFC2094[S]. 1997.
  • 7SETINER M, TAUDIK G, CLIQUES W M. A New Approach to Group Key Agreement[R]. Technical Report, RZ 2984, IBM Research, 1997.
  • 8MITTRA S. lolus: A framework for scalable secure multicasting[A]. ACM SIGCOMM Computer Communication Review[C]. New York: ACM Press, 1997. 277-288.
  • 9MICHAEL S, TSUDIK G, WAIDNER M, et al. Key distribution extended to group communication[A]. Proceedings of the 3rd ACM Conference on Computer and Communications Security[C]. 1996.14-16.
  • 10Amold's cat Map[EB/OL]. http://mathworld.wolfram.com/Arnolds Cat Map. html.

共引文献73

同被引文献13

  • 1曹国梁,周杰.一种适用于安全多播的加密算法及密钥管理方案[J].通信学报,2005,26(B01):100-105. 被引量:3
  • 2王泽辉.二维随机矩阵置乱变换的周期及在图像信息隐藏中的应用[J].计算机学报,2006,29(12):2218-2225. 被引量:20
  • 3SUN Y L, RAY LIU K J. Analysis and protection of dynamic mem- bership information for group key distribution schemes [ J ]. IEEE Transactions on Information Forensics and Security, 2007, 2(2): 213-226.
  • 4CtIALLAL Y, SEBA H. Group key management protocols: A novel taxonomy [ J ]. International Journal of Information Technology, 2005, 2(1) : 105 - 118.
  • 5PHAM T, WATTERS P. The efficiency of periodic rekeying in dy- namic group key management [ C ]//ECUMN'07: Proceedings of the Fourth European Confference on Universal Muhiservice Networks. Washington, DC: IEEE Computer Society, 2007:425-432.
  • 6RAFAELI S, HUTCHISON D. A survey of key management for secure group communication[ J ]. ACM Computing Surveys, 2003, 35 (3) : 309 - 329.
  • 7HAJYVAHABZADEH M, EIDKHANI E, MORTAZAVI S A, et al. A new group key management protocol using code for key calculation: CKC [ C ]// ICISA: International Conference on Information Science and Applications. Seouh [ s. n. ], 2010:1 -6.
  • 8CHANG C-C, SU Y-W, LIN I-C. A broadcast encryption based key management scheme for dynamic multieast comnmnications work in progress [ C ]//The Second International Conference on Scalable In- formation Systems. Suzhou: [s.n.], 2007: 69-70.
  • 9邵利平,覃征,刘波,高洪江,覃珺.二维双尺度矩形映射及其在图像置乱上的应用[J].计算机辅助设计与图形学学报,2009,21(7):1025-1034. 被引量:6
  • 10李用江,李昌利,李司东,葛建华.Fibonacci数列模p^r的周期性研究[J].数学的实践与认识,2009,39(17):138-143. 被引量:3

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部