Dual encryption protocol for scalable secure group communication

a secure group communication and encryption protocol technology, applied in the field of multicasting, can solve the problems of multiple attacks, multicasting poses several problems, and the protocol cannot be easily extended to protect multicast data

Inactive Publication Date: 2009-05-05
PANASONIC CORP
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]Hierarchical schemes distribute encryption keys via a distribution tree. Two classes of hierarchical protocols have been proposed. The first class uses a hierarchy of keys while the second group uses a hierarchy of nodes to achieve scalability.

Problems solved by technology

Unfortunately, these protocols cannot be easily extended to protect multicast data.
Multicasting poses several problems that do not come up in securing unicast data transfers.
Next, multicast data is transmitted over many channels of the network, which presents multiple opportunities for attacks such as eavesdropping.
Furthermore, any host in the Internet can send irrelevant data to the multicast group, which may cause congestion.
Finally, adversaries can possibly disrupt the multicast protocol itself by posing as legitimate members of the group.
In other words, members of a multicast session must not be able to access the multicast data transmitted before their membership has begun or after their membership has expired.
Thus these schemes suffer from the 1 affects n scalability problem.
Trusting all the members makes this protocol vulnerable to security attacks from inside the group.
Hierarchical key based schemes suffer from the 1 affects n scalability problem.
But they offer no mechanism to hide secure multicast data from the internal nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual encryption protocol for scalable secure group communication
  • Dual encryption protocol for scalable secure group communication
  • Dual encryption protocol for scalable secure group communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Introduction to the Dual Encryption Protocol

[0017]The dual encryption protocol is well suited for scalable secure multicasting. The protocol supports secure one-to-many groups communication, dynamic group membership and is scalable. The protocol uses hierarchical subgrouping of multicast members to address scalability. Each subgroup is managed by a subgroup manager (SGM). SGMs are either routers or hosts in the network that can handle the workload of managing a subgroup of the multicast group. The assumption is that the SGMs conform to the secure multicast protocol and do not actively participate in disrupting it. There is a distinction between participants and members of the group. Members of the group are end-hosts or SGMs that are entitled to the multicast data. On the other hand, participants of the group are SGMs that assist in enforcing the secure multicast protocol without having any access to the multicast data. With this distinction, it is possible to have SGMs assist in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A logical tree structure and method for managing membership in a multicast group provides scalability and security from internal attacks. The structure defines key groups and subgroups, with each subgroup having a subgroup manager. Dual encryption allows the sender of the multicast data to manage distribution of a first set of encryption keys whereas the individual subgroup managers manage the distribution of a second set of encryption keys. The two key sets allow the sender to delegate much of the group management responsibilities without compromising security because a key from each set is required to access the multicast data. Security is further maintained via a method in which subgroup managers can be either member subgroup managers or participant subgroup managers. Access to both keys is provided to member subgroup managers whereas access to only one key is provided to participant subgroup managers. Nodes can be added without the need to generate a new encryption key at the top level which provides improved scalability.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001]This application claims the benefit of U.S. Provisional Application No. 60 / 142,495, filed on Jul. 6, 1999. The disclosure of the above application is incorporated herein by reference.<?insert-end id="INS-S-00001" ?>BACKGROUND AND SUMMARY OF THE INVENTION[0002]The present invention relates generally to multicasting. More particularly, the invention relates to a dual encryption protocol for scalable secure group communication.[0003]With the widespread use of the Internet, securing data transmissions is an important requirement for many applications. Several protocols exist to address security in data networks with respect to unicasting. Unfortunately, these protocols cannot be easily extended to protect multicast data.[0004]Multicasting poses several problems that do not come up in securing unicast data transfers. First, multicast addresses are not private, which enables any interested host to join the multicast session without any h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/00H04L9/14H04L9/08H04L9/16H04L9/28H04L9/30H04L9/32H04L29/06
CPCH04L9/0822H04L9/0836H04L9/0891H04L63/0442H04L63/064H04L63/065H04L63/0823H04L63/104H04L9/14
Inventor DONDETI, LAKSHMINATH R.MUKHERJEE, SARITSAMAL, ASHOK
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products