25
01/29/22 1 l Optimization of Multicast Key Management M. Eltoweissy, Virginia Tech.,

Combinatorial Optimization of Multicast Key Management

  • Upload
    neila

  • View
    34

  • Download
    0

Embed Size (px)

DESCRIPTION

Combinatorial Optimization of Multicast Key Management. M. Eltoweissy, Virginia Tech., . Outline. Preliminaries Key Maintenance Structures Trees Exclusion Basis Systems Scalability Collusion Attacks Conclusions and Future Work. What is Multicasting?. - PowerPoint PPT Presentation

Citation preview

Page 1: Combinatorial Optimization of Multicast Key Management

04/22/23 1

Combinatorial Optimization of Multicast Key Management

M. Eltoweissy, Virginia Tech.,

Page 2: Combinatorial Optimization of Multicast Key Management

04/22/23 2

Outline Preliminaries Key Maintenance Structures

Trees Exclusion Basis Systems

Scalability Collusion Attacks Conclusions and Future Work

Page 3: Combinatorial Optimization of Multicast Key Management

04/22/23 3

What is Multicasting?Multicasting allows a source node to

communicate common information to a group of recipients by means of a single message.

Multicasting is implemented by designating special multicast addresses, which accommodate groups of hosts, which may be on more than one network.

Page 4: Combinatorial Optimization of Multicast Key Management

04/22/23 4

Why is key maintenance needed?

Forward security is required when a user leaves the multicast group. All keys known to the evicted user

must be changed New keys must be communicated

to appropriate members Backward security

Keys changed when a user joins the group.

Page 5: Combinatorial Optimization of Multicast Key Management

04/22/23 5

Basic System Problem Ensure message security for a

dynamic multicast group by encrypting messages

When users join or depart encryption keys must be changed.

Minimize: (a) the number of keys users must know, and (b) the number of re-key messages

Page 6: Combinatorial Optimization of Multicast Key Management

04/22/23 6

Binary Tree

log2n keys per user log2n messages to re-key

User 1 User 2 User n

Root Key ServerKey A

Key B1

Key C2 Key C3 Key C4Key C1

Key B2

Key D8Key D7Key D6Key D5Key D4Key D3Key D2Key D1

User 3 User 4 User 5 User 7User 6 . . .

Page 7: Combinatorial Optimization of Multicast Key Management

04/22/23 7

Binary Tree – Deleting a user

Delete User j from key management tree Update key information log2n keys per user log2n re-key messages

Root Key ServerKey A’

Key C’

Key B’

User i

Key E’

Key Y

Key X

Key Z

Root Key ServerKey A

Key C

Key B

User i

Key E

Key Y

Key X

Key Z

User j

User jX

Page 8: Combinatorial Optimization of Multicast Key Management

04/22/23 8

Binary Tree – Adding a user

Insert new user into key management tree Update key information log2n keys per user log2n re-key messages

Root Key ServerKey A’

Key C’

Key B’

User i

Key E

Key Y

Key X

Key Z

Root Key ServerKey A

Key C

Key B

User i

Key Y

Key X

Key Z

User j

Page 9: Combinatorial Optimization of Multicast Key Management

04/22/23 9

Can one do better?

Page 10: Combinatorial Optimization of Multicast Key Management

04/22/23 10

Exclusion ProblemLet U = {1, …, n}. Given n,k,m, find a collection C

of subsets of U, if possible, such that:1. For every iU, there are m subsets in C

such that the union of the m subsets equals U – {i}.

2. No element iU is in more than k subsets of C.

Exclusion Basis System (EBS(n,k,m)) Problem:

For given n,k,m, is there an EBS(n,k,m)?

Page 11: Combinatorial Optimization of Multicast Key Management

04/22/23 11

Each subset represents a key

The elements of a subset represent users who know that key

m is the number of re-key messages needed to distribute new keys to all but one user

k is the number of keys each user knows.

EBS(n,k,m) systems

Page 12: Combinatorial Optimization of Multicast Key Management

04/22/23 12

Consider the collection C = { = {5,6,7,8}, = {2,3,4,8}, ={1,3,4,6,7}, ={1,2,4,5,7}, ={1,2,3,5,6,8} }

The following unions are sufficient to isolate any element:

Note: no element is in more than 3 subsets

Example (EBS(8,3,2))

Page 13: Combinatorial Optimization of Multicast Key Management

04/22/23 13

This can be described by a table:

#1 #2 #3 #4 #5 #6 #7 #8

0 0 0 0 1 1 1 1

0 1 1 1 0 0 0 1

1 0 1 1 0 1 1 0

1 1 0 1 1 0 1 0

1 1 1 0 1 1 0 1

Page 14: Combinatorial Optimization of Multicast Key Management

04/22/23 14

EBS(8,3,2) vs. A binary treeA complete binary tree of

height 3, with 8 leaves, requires each user to know 3 keys and requires 3 messages to re-key.

An EBS(8,3,2) requires each user to know 3 keys and requires only 2 messages to re-key.

Page 15: Combinatorial Optimization of Multicast Key Management

04/22/23 15

Theorem. There is an EBS(n,k,m) whenever C(k+m,m) n.

Page 16: Combinatorial Optimization of Multicast Key Management

04/22/23 16

1 2 3 4 5 6 7 8 9 10

A1 0 0 0 0 1 1 1 1 1 1

A2 0 1 1 1 0 0 0 1 1 1

A3 1 0 1 1 0 1 1 0 0 1

A4 1 1 0 1 1 0 1 0 1 0

A5 1 1 1 0 1 1 0 1 0 0

Page 17: Combinatorial Optimization of Multicast Key Management

04/22/23 17

Binary trees vs. EBS(n,k,m):Note: C(2n,n) = (4n/n3/2).Thus, C(log2n, (log2n)/2) = (n/log3/2n).

So, EBS(cn/log3/2n, (log2n)/2, (log2n)/2) is possible, for some constant c>0.

The parameters k and m (above) in the best EBS are half as large as in a standard binary tree system.

Page 18: Combinatorial Optimization of Multicast Key Management

04/22/23 18

Example: For 106 users

A binary tree system requires each user to know 20 keys and needs 20 multicast re-key messages.

As C(23,11) = 1,352,078, the exclusion basis system EBS(106,12,11) exists and requires 12 keys/user and 11 multicast re-key messages.

Page 19: Combinatorial Optimization of Multicast Key Management

04/22/23 19

Scalability

We need to consider how easy it is for a system to maintain an EBS(n,k,m) when a user is added or a user is deleted. For example, consider EBS(10,3,2). What does the system do when user 11 arrives?

Page 20: Combinatorial Optimization of Multicast Key Management

04/22/23 20

Adding an 11th user to EBS(10,3,2)

1 2 3 4 5 6 7 8 9 10 11

A1 0 0 0 0 1 1 1 1 1 1

A2 0 1 1 1 0 0 0 1 1 1

A3 1 0 1 1 0 1 1 0 0 1

A4 1 1 0 1 1 0 1 0 1 0

A5 1 1 1 0 1 1 0 1 0 0

A6

Page 21: Combinatorial Optimization of Multicast Key Management

04/22/23 21

Add 11th user & create EBS(20,3,3)

1 2 3 4 5 6 7 8 9 10 11

A1 0 0 0 0 1 1 1 1 1 1 0

A2 0 1 1 1 0 0 0 1 1 1 0

A3 1 0 1 1 0 1 1 0 0 1 0

A4 1 1 0 1 1 0 1 0 1 0 1

A5 1 1 1 0 1 1 0 1 0 0 1

A6 0 0 0 0 0 0 0 0 0 0 1

Page 22: Combinatorial Optimization of Multicast Key Management

04/22/23 22

1 2 3 4 5 6 7 8 9 10 11

A1 0 0 0 0 1 1 1 1 1 1 0

A2 0 1 1 1 0 0 0 1 1 1 1

A3 1 0 1 1 0 1 1 0 0 1 1

A4 1 1 0 1 1 0 1 0 1 0 1

A5 1 1 1 0 1 1 0 1 0 0 1

A6 1 1 1 1 1 1 1 1 1 1 0

Add 11th user & create EBS(20,4,2)

Page 23: Combinatorial Optimization of Multicast Key Management

04/22/23 23

Without added features an EBS(n,k,m) is not secure from collusion

If users share information, they could know all of the keys. (This is not the case with traditional binary tree logical structures.)

One can design techniques to make collusion attacks difficult. For example, - one can hide the keys from the users, i.e. give the users

encrypted programs containing the keys, rather than the keys themselves or - combine the advantages of an EBS with the collusion

avoidance of tree based systems.

Page 24: Combinatorial Optimization of Multicast Key Management

04/22/23 24

A future research topicAn exclusion basis system or a binary tree system is an

efficient system for evicting (or adding) a single user. It is not so efficient for simultaneous evictions (or additions) of large numbers of users.

For example, to evict half of the n users, current systems evict one user at a time, taking cnlog n messages, for some constant c>0. However, unicasting requires only n/2 messages.

Can one design a better system?

Page 25: Combinatorial Optimization of Multicast Key Management

04/22/23 25

Conclusions

We have introduced the concept of an Exclusion Basis System EBS(n,k,m) and proved, for which values of n,k,m, it exists.

We have given a constructive lower bound for any exclusion system and hence given optimum solutions.

We have shown that an optimum EBS is scalable.