34
A SECURE AND EFFICIENT KEY DISTRIBUTION SYSTEM

Secuirty based hellman protocols

Embed Size (px)

Citation preview

Page 1: Secuirty based hellman protocols

A SECURE AND EFFICIENT KEY DISTRIBUTION SYSTEM

Page 2: Secuirty based hellman protocols

AIM To provide security through key authentication

process To provide communication privacy in a dynamic

peer group. Communication-without centralized server

Page 3: Secuirty based hellman protocols

ABSTRACT Tree Based Group Diffie-Helman Protocol Establishment of group key. Interval Based Re-keying algorithms Maintains distributive and collaborative feature. Concentrates on authentication – security.

Page 4: Secuirty based hellman protocols

INTRODUCTION Emergence of group oriented applications. Need for security. Cryptography -Authentication. Key agreement- peer network.

Page 5: Secuirty based hellman protocols

EXISTING SYSTEM

Individual RekeyingLimitation

• Server Overload.• A Single point of failure.• Cost is more.

Page 6: Secuirty based hellman protocols

COMMUNICATION

A1 A2 B3B2B1A3 SERVER A SERVER B

LAN A LAN B

COMMUNICATES

Page 7: Secuirty based hellman protocols

PROBLEM DEFINITION Secured communication. Communication in a peer to peer network. Secure Collaborative distributed group key agreement.

Page 8: Secuirty based hellman protocols

LITERATURE SURVEY Michel Steiner - Authenticated Group Key

Agreement.• Two party key authentication.

Yang Richard Yang, “ Rekeying for Secure Group Communications”.

• Key Graph Approach

S.Seita and S.Jajodia, “Kronos”: A Re-keying approach for secure multicast.

• Intra Domain Key Management Protocol

Page 9: Secuirty based hellman protocols

PROPOSED SYSTEM

Secured communication- Peer Groups.Binary Tree. Interval Based Rekeying Approach-Join, Leave.

Rebuild Algorithm

Batch AlgorithmQueue Batch Algorithm.

Page 10: Secuirty based hellman protocols

COMMUNICATION

PEERGROUP

A

PEERGROUP

B

A3 B2

S

B3

B1

S

A1

A2

A3

B1A3SERVER

ROOT

SPONSOR

Page 11: Secuirty based hellman protocols

QUEUE BATCH ALGORITHM

Rekeying at regular intervals. Reduces the latency and workload. Improved Efficiency. Two stages:

• Queue - Sub tree.• Queue Merge.

Page 12: Secuirty based hellman protocols

QUEUE BATCH ALGORITHMEXAMPLE

0

21

0

M1 M2

2

4 6

7

1

53

8 11 12M3

M4 M5

M6

23 24

M7

M8, M9, M10 joinM2, M7 leave

3 6

8M1(S)

3 6

13 14

M8 M9

T’

27 28M10(S)

Page 13: Secuirty based hellman protocols

ANALYSIS Tree based Group Diffie-Hellman Protocol. Group key authentication. SOFTWARE REQUIREMENTS:

• Operating System : Windows XP Professional.ss• Environment : Visual Studio .Net 2003.• .Net Framework : Version 1.0.• Language : Visual Basic. Net.• Backend : SQL Server 2000.

Features:• Common Language Runtime (CLR)• Supports Pop up of individual dialog box.• Multithreading, Garbage collection, Structured Exception Handling.

Page 14: Secuirty based hellman protocols

DESIGNARCHITECTURE DIAGRAM

New MemberKey

Generation

Rekeying

Member Leaves

Queue BatchAlgorithm

ExistingMembers

DataExchange

loginPrime

number

Resources

Released

join leave

communication

Page 15: Secuirty based hellman protocols

DATA FLOW DIAGRAM

Page 16: Secuirty based hellman protocols

LEVEL 0

Members

Login

Group keyShared Key

Sign In

Username & password

Private key

Public key

Page 17: Secuirty based hellman protocols

LEVEL1 (JOIN)

User Join Request

Find Join Position

GenerateKeys

UpdateTree

Tree Structure

Tree Structure

Distribute Keys

Page 18: Secuirty based hellman protocols

LEVEL1(LEAVE)

Leave Request

Process Request

RemoveThe

Member

GenerateKeys

UpdateTree

Tree Structure

Tree StructureDistributeKeys

Page 19: Secuirty based hellman protocols

LEVEL 2Members

Sign In

Home Page

OtherGroup

Members

Upload Files

Group Members

Group, PrivatePublic Keys

Page 20: Secuirty based hellman protocols

IMPLEMENTAION Modules:

• Key Generation-Diffie Hellman Protocol.• Rekeying- Join, Leave• Sharing The Resources-

Page 21: Secuirty based hellman protocols

IMPLEMENTATION (CONTD…)

A B

M1 C M2 M3

M4 M5

ROOT

Page 22: Secuirty based hellman protocols

TESTING Unit Testing Integration Testing. Validation Testing. Security Testing.

Page 23: Secuirty based hellman protocols

CONCLUSION Key agreement -Without centralized server. Tree Based Group Diffie-Hellman Protocol achieves

Distributive and Collaborative key agreement. Queue-Batch Algorithm reduces computation and

communication cost.

Page 24: Secuirty based hellman protocols

FUTURE ENHANCEMENT Communication using Secret Keys. Use alternate for TGDH.

Page 25: Secuirty based hellman protocols

REFERENCES Y.Amir, Y.Kim, C.Nita-Rotaru, “ Secure group Communication using

robust contributory key agreement”, May 2009. S.Blake-Wilson and A.Menezees, “ Authenticated Diffie-Hellman Key

Agreement protocols”,2007. M.Burmester and Y.Desmedt, “ A secure efficient conference key

distribution system”,2007. S.Setia, S.Koussiti, “Kronos: A scalable group rekeying approach for

secure multicast”, May 2000.

Page 26: Secuirty based hellman protocols

SCREEN SHOTSSERVER

Page 27: Secuirty based hellman protocols

CLIENT-SERVER CONNECTION

Page 28: Secuirty based hellman protocols

FIRST MEMBER JOINS

Page 29: Secuirty based hellman protocols

SECOND MEMBER JOINS

Page 30: Secuirty based hellman protocols

BINARY TREE

Page 31: Secuirty based hellman protocols

FILE UPLOADED

Page 32: Secuirty based hellman protocols

FILE DOWNLOADED

Page 33: Secuirty based hellman protocols

MEMBER LEAVES

Page 34: Secuirty based hellman protocols

THANK YOU