GarrettLund-KeyManagement - Key Management For Secure...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Click to edit Master subtitle style 8/1/11 Key Management For Secure Communication Presentation By: Garrett Lund Paper By: Sandro Rafaeli and David Hutchison
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8/1/11 Overview Background Information IP Multicast Assumptions Requirements Rekeying Methods Centralized Group Key Management Protocols Decentralized Architectures Distributed
Image of page 2
8/1/11 IP Multicast Between Unicast and Broadcast Network Switches and Routers are responsible for replication and distribution
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8/1/11 IP Multicast Applications
Image of page 4
8/1/11 IP Multicast Applications
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8/1/11 Encryption Review Obviously some of these applications require limited access. No public key, but a “group key”
Image of page 6
8/1/11 Assumptions When a user joins, we have a way to get them their first key When a user leaves there is a possibility of them continuing to acquire messages Every user eventually gets the intended messages
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
8/1/11 Membership Changes Groups need to be dynamic, allowing (authorized) members to join the group and allowing administrators to expel members from the group Backwards Secrecy Forward Secrecy
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern