Skip to main content

Cryptanalysis of Two Group Key Management Protocols for Secure Multicast

  • Conference paper
Cryptology and Network Security (CANS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3810))

Included in the following conference series:

Abstract

Many emerging network applications are based upon group communication models and are implemented as either one-to-many or many-to-many multicast. As a result, providing multicast confidentiality is a critical networking issue and multicast security has become an active research area. To secure the sessions, a common group key is maintained to encrypt the traffic, and the key is updated whenever a new member joins the group or an existing member leaves. In this paper we analyze the security of a centralized key distribution protocol for one-to-many multicast and a decentralized key agreement protocol for many-to-many multicast. We show that they both fail to provide forward and backward security. The first protocol is revealed to be vulnerable to a single adversary due to an algorithmic issue. The second protocol, however, is subject to sophisticated collusion. Remedial approaches are proposed for both key management schemes to effectively resist relevant attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings of IEEE INFOCOM 1999, March 1999, vol. 2, pp. 708–716 (1999)

    Google Scholar 

  2. Poovendran, R., Baras, J.S.: An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory 47, 2824–2834 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  3. Bhattacharyya, S.: An Overview of Source-Specific Multicast (SSM). RFC 3569 (July 2003)

    Google Scholar 

  4. Harney, H., Muckenhirn, C.: Group key management protocol (GKMP) specification. RFC 2093 (July 1997)

    Google Scholar 

  5. Chiou, G.-H., Chen, W.-T.: Secure broadcasting using the secure lock. IEEE Transactions on Software Engineering 15, 929–934 (1989)

    Article  Google Scholar 

  6. Trappe, W., Song, J., Poovendran, R., Liu, K.J.R.: Key distribution for secure multimedia multicasts via data embedding. In: Proceedings of IEEE ICASSP 2001, May 2001, vol. 3, pp. 1449–1452 (2001)

    Google Scholar 

  7. Wu, K.-P., Ruan, S.-J., Lai, F., Tseng, C.-K.: On key distribution in secure multicasting. In: Proceedings of the 25th Annual IEEE Conference on Local Computer Networks, November 2000, pp. 208–212 (2000)

    Google Scholar 

  8. Wong, C.K., Gouda, M., Lam, S.S.: Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8, 16–30 (2000)

    Article  Google Scholar 

  9. Wallner, D.M., Harder, E.J., Agee, R.C.: Key management for multicast: Issues and architectures. RFC 2627 (June 1999)

    Google Scholar 

  10. Balenson, D., McGrew, D., Sherman, A.: Key management for large dynamic groups: One-way function trees and amortized initialization. IRTF Internet Draft (September 2000), available at http://www.securemulticast.org/smug-drafts.htm

  11. Zhu, W.T.: Optimizing the tree structure in secure multicast key management. IEEE Communications Letters 9, 477–479 (2005)

    Article  Google Scholar 

  12. Lu, H.: A novel high-order tree for secure multicast key management. IEEE Transactions on Computers 54, 214–224 (2005)

    Article  Google Scholar 

  13. Dondeti, L.R., Mukherjee, S., Samal, A.: DISEC: A distributed framework for scalable secure many-to-many communication. In: Proceedings of 5th IEEE Symposium on Computers and Communications, July 2000, pp. 693–698 (2000)

    Google Scholar 

  14. Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18, 628–639 (2000)

    Article  Google Scholar 

  15. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems 11, 769–780 (2000)

    Article  Google Scholar 

  16. Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, November 2000, pp. 235–244 (2000)

    Google Scholar 

  17. Amir, Y., Kim, Y., Nita-Rotaru, C., Schultz, J.L., Stanton, J., Tsudik, G.: Secure group communication using robust contributory key agreement. IEEE Transactions on Parallel and Distributed Systems 15, 468–480 (2004)

    Article  Google Scholar 

  18. Bach, E., Shoup, V.: Factoring polynomials using fewer random bits. Journal of Symbolic Computation 9, 229–239 (1990)

    Article  MATH  MathSciNet  Google Scholar 

  19. Horng, G.: Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications E85-B, 1050–1051 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, W.T. (2005). Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds) Cryptology and Network Security. CANS 2005. Lecture Notes in Computer Science, vol 3810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599371_4

Download citation

  • DOI: https://doi.org/10.1007/11599371_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30849-2

  • Online ISBN: 978-3-540-32298-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics