Abstract
This work describes the Group Security Association (GSA) Management model and protocol as developed in the Secure Multicast Group (SMuG) in the IETF. The background reasoning from the Internet Key Exchange (IKE) protocol perspective is explained, together with the notion of Security Associations (SA) in the unicast case. This serves as a basis for a requirements for Group SA for multicast. Finally, the definition and construction of a GSA is described.
Chapter PDF
Similar content being viewed by others
References
B. Briscoe, I. Fairman, Nark: Receiver-based Multicast, Non-repudiation and Key Management, Proceedings of ACM E-Commerce’99.
D. Balenson, D. McGrew, A. Sherman, Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization, http://www.ietf.org/internet-drafts/draft-balenson-groupkeymgmt-oft-00.txt, February 1999, Work in Progress.
M. Bellare, P. Rogaway, Entity Authentication and Key Distribution, Advances in Cryptology-Crypto’ 93, Proceedings, Springer-Verlag, 1993.
B. Briscoe, MARKS: Zero Side Effect Multicast Key Management using Arbitrarily Revealed Key Sequences, Proceedings of NGC’99.
R. Canetti and B. Pinkas, A taxonomy of multicast security issues, http://www.ietf.org/internet-drafts/draft-irtf-smug-taxonomy-01.txt, April 1999, Work in Progress.
Diffie, P. van Oorschot, M. J. Wiener, Authentication and Authenticated Key Exchanges, Designs, Codes and Cryptography, 2, 107–125 (1992), Kluwer Academic Publishers.
N. Ferguson and B. Schneier, A Cryptographic Evaluation of IPsec, CounterPane,http://www.counterpane.com/ipsec.html.
T. Hardjono, R. Canetti, M. Baugher, P. Disnmore, Secure IP Multicast: Problem areas, Farmework, and Building Blocks, http://www.ietf.org/internet-drafts/draft-irtf-smug-framework-01.txt, Work in Progress, 2000.
T. Hardjono, B. Cain, N. Doraswamy, A framework for group key management for multicast security, http://www.ietf.org/internet-drafts/draft-ietf-ipsec-gkmframework-01.txt, July 1999, Work in Progress.
H. Harney, E. Harder, Multicast Security Management Protocol (MSMP) Requirements and Policy, draft-harney-msmp-sec-00.txt, March 1999, Work in Progress.
H. Harney, E. Harder, Group Secure Association Key Management Protocol, http://search.ietf.org/internet-drafts/draft-harney-sparta-gsakmp-sec-00.txt, April 1999, Work in Progress.
H. Krawczyk, SKEME: A Versatile Secure Key Exchange Mechanism for Internet, Proceedings of Network and Distributed Systems Security (NDSS), San Diego, 1996.
H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, January 1996.
Harney, H., and Muckenhirn, C., Group Key Management Protocol (GKMP) Specification, July 1997.
Harney, H., and Muckenhirn, C., Group Key Management Protocol (GKMP) Architecture, July 1997.
S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, November 1998
D. Piper, The Internet IP Domain of Interpretation for ISAKMP, November 1998.
D. Maughan, M. Shertler, M. Schneider, J. Turner, Internet Security Association and Key Management Protocol, November 1998.
D. Harkins, D. Carrel, The Internet Key Exchange (IKE), November, 1998.
H. Orman, The OAKLEY Key Determination Protocol, November 1998.
P. Karn, W. Simpson, Photuris: Session-Key Management Protocol, March 1999.
D. M. Wallner, E. Harder, R. C. Agee, Key Management for Multicast: Issues and Architectures, September 1998.
H. L. Rogers, An Overview of the CANEWARE Program, 10th National Security Conference, National Security Agency, 1988.
C.K. Wong, S.S. Lam, Digital Signatures for Flows and Multicasts, Proceedings of IEEE ICNP’98, October, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hardjono, T., Baugher, M., Harney, H. (2001). Group Security Association (GSA) Management in IP Multicast. In: Dupuy, M., Paradinas, P. (eds) Trusted Information. SEC 2001. IFIP International Federation for Information Processing, vol 65. Springer, Boston, MA. https://doi.org/10.1007/0-306-46998-7_15
Download citation
DOI: https://doi.org/10.1007/0-306-46998-7_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7389-6
Online ISBN: 978-0-306-46998-5
eBook Packages: Springer Book Archive