A simple XOR-based technique for distributing group key in secure multicasting

One approach to multicast group security is to have a group key shared by every group member. In this paper, we are interested in group key distribution and management. A new simple technique is introduced for key distribution to a large group based on the hierarchical key tree. The new technique uses bit XOR operation between keys to reduce the computation effort, and uses random byte patterns (BPs) to distribute the key material in the multicast message. The new technique has symmetric procedures for message construction by a key distribution center (KDC) when a member joins or leaves the group, which allows the generation of one rekey message that incorporates multiple delays of both joins and leaves. In addition to the substantial decrease in the computation effort, our technique decreases the required group member storage. Finally, a novel model for the key tree in a distributed KDC is introduced. The new model allows sending the rekey message by one KDC to the whole group and other peer KDCs without any increase in the delay or the number of sent messages. This is achieved by building and replicating an additional KDC key tree.

[1]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[2]  Randall J. Atkinson,et al.  On Internet Authentication , 1994, RFC.

[3]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[4]  Shimshon Berkovits,et al.  How To Broadcast A Secret , 1991, EUROCRYPT.

[5]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[6]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[7]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[8]  Ran Canetti,et al.  Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.

[9]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[10]  Gene Tsudik,et al.  Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.

[11]  Ran Canetti,et al.  A taxonomy of multicast security issues (temporary version) , 1998 .

[12]  Tony Ballardie,et al.  Scalable Multicast Key Distribution , 1996, RFC.

[13]  Li Gong,et al.  Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.

[14]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[15]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[16]  Dilip D. Kandlur,et al.  Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[17]  Alan T. Sherman,et al.  Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .