iyu_Multicast_Security

iyu_Multicast_Security - Multicast Security Cryptographic...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
    Multicast Security Cryptographic Protocols InKwan Yu
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Multicast Security Issues Multicast  What is it? An efficient way to communicate between 1-to-n or m-to- n hosts  Applications Audio/video streaming, conferencing, multi-player  gaming, stock quotes distribution, command and control  communication, and much more. Features Open access to receive data Open membership  Open access to send data in a multicast group 
Background image of page 2
Multicast Security Issues Multicast Security Issues Receiver Access Control Group policy specification functions Authentication & authorization /w public key  cryptography Source Authentication Digital signature, MAC
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Multicast Security Issues Multicast Security Issues (Cont) Multicast Fingerprint Watermarking is embedding copyright  information in the contents  Fingerprint is a watermarking for a specific user Desirable features of fingerprint non-removable, collusion resistance, asymmetric  fingerprinting, protection granularity, efficiency 
Background image of page 4
Multicast Security Issues Multicast Security Issues (Cont) Multicast Fingerprint (Cont) Methods Intermediate routers can cooperate with the sender  to create a unique stream to each member  Sender may multicast the most of data and unicast  some of unique data to each member  Two different streams can uniquely arbitrate for a  different user
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Multicast Security Issues Multicast Security Issues (Cont) Group Key Management  Shared group key to encrypt the multicast data  Rekey  Core functionality for the multicast security Group Key Management Issues Member identification and authentication between GCKS  (Group Controller/Key Server) and members Access control to validate the join operation  Generation, distribution and installation of key materials.  Keys should be regularly changed and key generation  should be independent of past and future keys 
Background image of page 6
Multicast Security Issues Group Key Management Issues(Cont) Forward secrecy to prevent a leaving group member to  access the group communication.  Backward secrecy to prevent a joining group member to  decipher previous messages before its join.  Storage requirements. The number of keys necessary to  operate the system Size of messages. The message size needed to rekey. Collusion. Members of the group can cooperate to  compromise the system security Key independence, decentralized controller, local rekey,  number of rounds, number of messages 
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Multicast Security Issues Issues & Solutions multicast multicast Open group Membership Open group Membership All receive data All receive data Outside member
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 47

iyu_Multicast_Security - Multicast Security Cryptographic...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online