Abstract
Many emerging network applications are based upon group communication models and are implemented as either one-to-many or many-to-many multicast. As a result, providing multicast confidentiality is a critical networking issue and multicast security has become an active research area. To secure the sessions, a common group key is maintained to encrypt the traffic, and the key is updated whenever a new member joins the group or an existing member leaves. In this paper we analyze the security of a centralized key distribution protocol for one-to-many multicast and a decentralized key agreement protocol for many-to-many multicast. We show that they both fail to provide forward and backward security. The first protocol is revealed to be vulnerable to a single adversary due to an algorithmic issue. The second protocol, however, is subject to sophisticated collusion. Remedial approaches are proposed for both key management schemes to effectively resist relevant attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings of IEEE INFOCOM 1999, March 1999, vol. 2, pp. 708–716 (1999)
Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 47, 2824–2834 (2001)
Bhattacharyya, S.: An Overview of Source-Specific Multicast (SSM). RFC 3569 (July 2003)
Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specification. RFC 2093 (July 1997)
Chiou, G.-H., Chen, W.-T.: Secure broadcasting using the secure lock. IEEE Transactions on Software Engineering 15, 929–934 (1989)
Trappe, W., Song, J., Poovendran, R., Liu, K.J.R.: Key distribution for secure multimedia multicasts via data embedding. In: Proceedings of IEEE ICASSP 2001, May 2001, vol. 3, pp. 1449–1452 (2001)
Wu, K.-P., Ruan, S.-J., Lai, F., Tseng, C.-K.: On key distribution in secure multicasting. In: Proceedings of the 25th Annual IEEE Conference on Local Computer Networks, November 2000, pp. 208–212 (2000)
Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)
Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. RFC 2627 (June 1999)
Balenson, D., McGrew, D., Sherman, A.: Key management for large dynamic groups: One-way function trees and amortized initialization. IRTF Internet Draft (September 2000), available at http://www.securemulticast.org/smug-drafts.htm
Zhu, W.T.: Optimizing the tree structure in secure multicast key management. IEEE Communications Letters 9, 477–479 (2005)
Lu, H.: A novel high-order tree for secure multicast key management. IEEE Transactions on Computers 54, 214–224 (2005)
Dondeti, L.R., Mukherjee, S., Samal, A.: DISEC: A distributed framework for scalable secure many-to-many communication. In: Proceedings of 5th IEEE Symposium on Computers and Communications, July 2000, pp. 693–698 (2000)
Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18, 628–639 (2000)
Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11, 769–780 (2000)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, November 2000, pp. 235–244 (2000)
Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J.L., Stanton, J., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems 15, 468–480 (2004)
Bach, E., Shoup, V.: Factoring polynomials using fewer random bits. Journal of Symbolic Computation 9, 229–239 (1990)
Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications E85-B, 1050–1051 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, W.T. (2005). Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_4
Download citation
DOI: https://doi.org/10.1007/11599371_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30849-2
Online ISBN: 978-3-540-32298-6
eBook Packages: Computer ScienceComputer Science (R0)