ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

A Cost Effective Multicast Key Management Scheme for Secure Group Communication

R Keerthana1, Dr.N.M Saravana Kumar2
  1. PG Scholar, Department of CSE, Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu, India
  2. Associate Professor, Department of CSE, Bannari Amman Institute of Technology, Sathyamangalam, Tamilnadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Problem statement: Key management is the management of cryptographic keys in a cryptosystem. This includes dealing with the key generation, exchange, storage, use, and replacement of keys. Several schemes have been proposed to make key management efficient and usable. This paper proposes a cost effective key management scheme in multicast network for achieving a secure communication between the group members. This scheme gives better results with respect to the key management for multiple members. A secure key management scheme using RSA-CRT coding and Euclidean algorithm for efficient key distribution in multicast network. The keys generated in the network are securely exchanged with the help of RSA-CRT. This paper solves the most security problem by user registration and verification phases in the multicast network. The primary advantages are its large compression rate on the size of the shares and its strong protection of the secrets which avoids many attacks. For a ubiquitous system to be capable of sharing multiple secrets, the scheme can be potentially used for its efficiency, security and reliability. RSA-CRT algorithm is a method to periodically renew n secret shares without modifying the group key values whenever the member leaving in the star topology. The future work towards minimizing the communication cost in various tasks.

Keywords

Group communication, rekeying, secure multicast, key management, RSA-CRT

INTRODUCTION

In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less security for privacy and authentication of multicast packets. The number of applications using multicast increases day by day and so it need secure multicast services. Multicasts is an internetwork service which provides efficient delivery of data from a source to multiple receivers and also improve the bandwidth efficiency of the network. A common group key is necessary for individual members in the group for secure multicast communication. In general the group key management (Sahar et al., 2010; Abdul-Rahman et al., 2011) can be divided into three consortium (a) centralized key management (b) distributed key management (c) decentralized key management.
In all approaches (Harney and Muckenhirm, 1997; Waldvogel et al., 1999) whenever a member joins or leaves the group or the members are static in nature, the group key has to be changed to achieve forward secrecy which assures that the newly joined members cannot decrypt the multicast data sent earlier before joining the group and assures that the former members cannot decrypt the communication after leaving the cluster. In most of the key management protocol tree topology issued. Tree balancing is another issue when a member joins or leaves. The main drawback of tree topology is that number of overhead and cost for rekeying proportionately increase if the number of member increases. A huge database is necessary for storage and complexity also increases. Scalability is an issue in connection with the dynamic multicast members.

LITERATURE REVIEW

RSA Algorithm Using Modified Subset Sum Cryptosystem by Sonal Sharma (2011) proposed the concept of Subset-Sum cryptosystem (Knapsack Cryptosystem) is also an asymmetric cryptographic technique. The Merkle- Hellman system is based on the subset sum problem (a special case of the knapsack problem): given a list of numbers and a third number, which is the sum of a subset of these numbers, determine the subset. In general, this problem is known to be NP-complete. However, if the set of numbers (called the knapsack) is super increasing, that is, each element of the set is greater than the sum of all the numbers before it, the problem is 'easy' and solvable in polynomial time with a simple greedy algorithm. So in this paper a Modified Subset-Sum over RSA Public key cryptosystem is presented which is secure against Mathematical and brute-force attacks on RSA as well as Shamir attacks. RSA-CRT algorithm provides complete forward and backward security: Newly admitted group members cannot read previous messages, and evicted members cannot read future messages, even with collusion by arbitrarily many evicted members.

MATERIALS AND METHODS

The drawback of tree based architecture was overcome in SBMK (Lin et al., 2010) which uses star- based architecture in which the server computes a secret key and unicast to every user separately. But the drawbacks of these kinds of protocols are as follows:
 It increases the load on the server
 Computational and communication complexities are increased
 If private key is computed and sent by a server to all the members then the private component of members may not be used for authentication
Figure 1 shows the key server only one entity can control the whole group. The central controller does not have to rely on any auxiliary entity to perform access control and key distribution. The group privacy is dependent on the successful functioning of the single server. Furthermore, the group may become too large to be managed by a single party, thus raising the issue of scalability.
Our star topology based proposed algorithm has overcome the above problem:
 The total load on the server reduces because the private key is computed and sent by each user to server. So it reduces the load on the server
 The private component of members may be used for authentication
 It also reduces the computation complexity of server
 It gives a better rekeying performance than that of the key tree and there is no need to balance the tree Moreover our proposed scheme takes care of the important security requirements for secure group communication such as group secrecy, forward secrecy and backward secrecy.
In this study, we propose a Cost Effective Multicast Key Management Scheme for internet pay sites, which is relatively simple to implement. The rest of the study describes the proposed scheme, derives the result with suitable illustration of proposed algorithm, discuss and compare the proposed algorithm with the existing algorithms and finally concludes the study and future work.

PROPOSED SCHEME

In the proposed star topology based algorithm, the individual member joining the group is allowed to choose prime numbers and compute their private key and the secret value of N computed is sent to the server by a secure unicast message.
Thus the burden of server is reduced and also rekeying is totally reduced and also scalable for a large multicast group.
A. RSA Cryptosystem
The steps of key assignment are as listed below:
Step 1: First the server authenticates the user who wants to join the multicast group and also announce public value as e. It is common for the server as well as users.
Step 2: The individual user Mi randomly selects two prime numbers m and n and calculates the product Xi = mi x ni and (Xi) = (mi-1) x (ni-1).
Step 3: The private of key of individual member will be calculated (Rivest et al., 1978; Menezes et al., 1997; Sharma et al., 2011) by the user using the extended Euclidean algorithm to calculate a unique integer di such that Eq(1):
e x di ≡1 mod ( (Xi) where, di >
(Xi)
Step 4: The authenticated individual members send their X value to the server.
Step 5: The server verifies and accepts the Xi value only if it is unique value from other members and hold the value of Xi as secret.
B. Chinese Remainder Theorem (CRT)
A common math puzzle is to find a positive integer x.which when divided by 2, 3, 5 gives remainder 1 and is divisible by 7. Such questions are formally studied using the Chinese Reminder Theorem. Given a system of congruence to different modulo:
x == a1 mod m1 ,
x == a2 mod m2 ,
...
x == ar mod mr ,
If each pair of modulo are relatively prime: gcd (mi, m j)= 1 or i = j, has exactly one common solution modulo M = m1 * m2 * m3 ... mr and any two solution are congruent to one another modulo M.
C. Chinese Remainder Theorem In RSA-CRT
In RSA-CRT, it is a common practice to employ the Chinese Remainder Theorem during decryption. It results in a decryption much faster than modular exponentiation. RSA-CRT differs from the standard RSA in key generation and decryption. The value of d, the secret exponent cannot be made short. As soon as d < N0.292, RSA system can be totally broken. Keeping this in mind we make use the following scheme (Rivest et al., 1978; Menezes et al., 1997; Sharma et al., 2011).
D. RSA-CRT Key Generation and Encryption+
1. let p and q be very be two large primes of nearly the same size such that gcd( p − 1, q − 1)= 2.
2. Compute N = p * q.
3. Pick two random integers dp and dq such that gcd (dp, p − 1)= 1, gcd(dq, p −1)= 1 and dp == dq mod2.
4. Find d such that d == dp mod ( p − 1) and d == dq mod (q − 1).
5. Compute e = d−1 (mod (N)).
The public key is < N, e > and the private key is < p, q, dp , dq >. Since gcd(dp , p −1)= 1 and d == dp mod p − 1, we have gcd(d, p − 1)= 1. Similarly, gcd(d, q −1)= 1. Hence gcd(d, (N)) = 1 and by step 5, e can be computed. To apply the Chinese Remainder Theorem in step 4, the respective modulo have to be relatively prime in pairs for a solution to necessarily exist. We observe that (p − 1) and (q − 1) are even and that we cannot directly apply the Chinese Remainder Theorem. However, gcd (( p − 1)/2, (q − 1)/2)= 1. Since gcd(dp , p − 1)= 1 and gcd(dq, q − 1)= 1, essentially dp , dq are odd integers and dp − 1, dq − 1 are even integers. We have gcd(d, p − 1)= 1 which implies that d is odd and (d − 1)is even .To find a solution to d = dp mod p − 1, and d == dq mod q − 1We find a solution to d − 1 == (dp − 1) mod ( p − 1). d − 1 == (dq − 1) mod (q − 1).By applying the cancellation law and taking the common factor 2 out, we have x= d == (d− 1)/2 == (dp − 1)/2 mod ( p − 1)/2, x = d == (d − 1)/2 == (dq − 1)/2 mod (q − 1)/2,Using Chinese Remainder Theorem we find d such that d = (2 * d )+ 1.
E. RSA-CRT Decryption
Let M be the plaintext and C the cipher text. If C is not dividable by p and dp == d mod p − 1, then Cdp == Cd mod p. For decryption we find
1. Mp = Cdp (mod p)= Cd (mod p) and. Mq = Cdq (mod q)= Cd (mod q).
2. Then using Chinese Remainder Theorem, we find a solution. M=Mp (mod p)= Cd (mod p), M=Mq = Cdq (mod q)= Cd (mod q).
F. Member Joining
When a new member Mn+1 want to join the group, the key server repeats the procedures similar to key assignment.
Step 1: First the server authenticates the user who want to join the multicast group and also announce public value as e .It is common for the server as well as users.
Step 2: The individual user Mi+1 select two prime numbers m and n and calculate the product Xi+1 = mi+1 x ni+1 and (Xi+1) = (mi+1-1) x (ni+1-1).
Step 3: The private of key (Rivest et al., 1978; Menezes et al., 1997; Sharma et al., 2011) of individual member will be calculated by the user using the extended Euclidean algorithm to calculate a unique integer d0 such that Eq :(2)
e *di+1 =1 mod ( (Xi+1)
Step 4: The newly joined member send their Xi+1 value to the server
Step 5: The server verify the Xi+1 and accept the Xi+1 only if it is unique value from other members and hold the value of X as secret
G. Members Leaving
When a member Xi leaves the group, the key server just deletes the secret information Xi. Therefore, in the cipher text computation (Rivest et al., 1978; Menezes et al.,1997; Sharma et al., 2011) in Formula (2) removes the modulus operations with respect to Xi (mi ,ni). Member Mi, cannot decrypt the secrete message because Xi is not added in cipher text calculation. Hence both forward and backward secrecy is maintained. The pair of prime numbers of a leaving member cannot be reassigned to new user joining the group. So there is no need for rekeying even if the members of multicast group change.

RESULTS

Illustration of the proposed algorithm with suitable examples and the result obtained is discussed in this section. Key assignment phase: The steps of key assignment are as listed below:
Step 1: First the server authenticate the user who want to join the multicast group and also announce public value as e = 103. It is common for the server as well as users.
Step 2: The individual user Mi selects two prime numbers mi and ni randomly and also compute their
Xi = mi x ni and ɸ(Xi) = (mi-1) * (ni-1):
M1 selects m1=163 and n1=227 computes X1=37001 and ɸ (X1) =36612
M2 selects m2=181 and n2=233 computes X2=42173 and ɸ (X2) =41760
M3 selects m3=163 and n3=199 computes X3=32437 and ɸ (X3) =32076
M4 selects m4=137 and n4=173computes X4=23701 and ɸ (X4) =23392
M5 selects m5=223 and n5=211computes X5=47053 and ɸ (X5) =46620
M6 selects m6=251 and n6=191computes X1=47941 and ɸ (X6) =47500
Step 3: The private of key of individual member is calculated by each user using the extended Euclidean algorithm used in RSA algorithm:
103 d1 ≡ 1 mod ((X1) ≡1 mod 36612 and d1 =16351
103 d2 ≡ 1 mod ((X2) ≡1 mod 41760 and d2 = 6487
103 d3 ≡1 mod ((X3) ≡1 mod 32076 and d3 =28339
103 d4 ≡1 mod ((X4) ≡1 mod 23392 and d4 =6359
103 d5 ≡1 mod ((X5) ≡1 mod 46620 and d5 =16747
103 d6≡1 mod ((X6) ≡1 mod 47500 and d6 =2767
Step 4: The individual members communicate their X value to the server: X1=37001, X2=42173, X3=32437, X4=23701, X5=47053, X6=47941.
Step 5: Server verifies the secret value Xi of individual users and accepts the X only if it is unique value from other members and hold the value of Xi as secret.
Multicast communication: The steps of the Multicast communication are as listed below
Step 1: Assume there are 6 members X1, X2, …X6 in the multicast group. When the server wants to send a secret message P= 5 to all members in the multicast group, then the server uses its public value e0 as well as the secrets of Members X1, X2,… X6 in the encryption formulae The encryption of the secret message is computed using the general formulae:
C = 5103 mod (X1*X2* X3 *X4 *X5 *X6) = 5103 mod (37001 42173 32437 23701 47053 47941)= 1749630034980094709227313040
Step2: The server computes cipher text C and sends a broadcast message to all the members of the group
Step3: All six members in the multicast group can decrypt the secret message P from the cipher text received. The secret message is decoded as follows:
M1→P=(C mod X1)d1 mod X1=(1749630034980094709227313040mod37001)16351mod37001 = 5
M2→P=(C mod X2)d2 mod X2=(1749630034980094709227313040 mod 42173)6487mod42173 = 5
M3→P=(C mod X3)d3 mod X3=(1749630034980094709227313040mod32437)28339mod32437 = 5
M4→P=(C mod X4)d4 mod X4=(1749630034980094709227313040mod37001)16351mod37001 = 5
M5→P=(C mod X5)d5 mod X5=(1749630034980094709227313040 mod 47053)16747mod47053 = 5
M6→P=(C mod X6)d6 mod X6 = (1749630034980094709227313040 mod47941)2767mod47941 = 5
Performance analysis based on complexity comparison of various key management schemes: Table 1-2 provides the comparative analysis of the various protocols. It shows that every protocol achieves unique results when applying different techniques. Some protocols achieve exceptionally better results than others do. By comparing the table, we can clearly understand that the bottleneck of server is avoided by reducing total no of keys managed by server in our proposed algorithm. It is also smaller when compared with LKH, OFT and SBMK algorithm (Lin et al., 2010; Abdul- Rahman et al., 2011).Only one multicast message will be send to the group when a member joins and no message is send when a member leaves the group. So there is no need for rekeying when a member leaves also the rekeying overhead is less compared with LKH and OFT (Abdul-Rahman et al., 2011). The proposed algorithm achieves better results for storage, communication, computation and processing on both server and user. The computation cost of server is greatly reduced by allowing the users to calculate their private key and secret values compared with other techniques. The cost of encryption when a member joins the group is 1 and the cost of encryption when a member leaves the group. From the tables we can easily understand that proposed protocol is more suitable for a dynamic users and storage cost of server is reduced (Lin et al., 2010) and distributed to the users.

OTHER BENEFITS

CEKMS involves E-business security. It is the necessary protection against data theft in IT. This paper proposes a four times faster RSA-CRT algorithm for decryption than RSA using Chinese Remainder Theorem. Also it is found that encryption is more effective by using CRT. This algorithm can be usable for multimedia application. With this we can encrypt and decrypt the media file with high security and it produces the well organized group key management for data communication in multicast network.

CONCLUSION

In this study, A Cost Effective Multicast Key Management Scheme for Secure Group Communication is proposed and implemented which produces better results than the existing protocols in terms of less computational, communication and storage costs. The proposed star based architecture reduces the rekeying overhead. The private key of the users are computed by the individual and so it can be used for authentication also. Theory predicts that the CRT decryption should be four times as faster than RSA .The average decryption time for the normal method is about 0.157 seconds per decryption and for the CRT method is 0.046 second per decryption, giving speedup by a factor of about 3.4The computation complexity of the server is totally reduced in the new protocol. It is also scalable and easy to implement when the number of users are very high and dynamic in nature. As future scope of work, it may be extended for bulk member join and leaves.
 

Tables at a glance

Table icon Table icon
Table 1 Table 2
 

Figures at a glance

Figure 1
Figure 1
 

References