Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/NPC.2008.29guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem

Published: 18 October 2008 Publication History

Abstract

Many emerging network applications are based upon group communication models and are implemented with multicast communications. We address the problem of distributing a secret session key to a secure multicast group. In a pair of such key management schemes, the session key is distributed mathematically based upon the Euler-Fermat Theorem, such that upon receiving the broadcast keying material known as the rekey message, each member in the privileged multicast group can derive with a modular operation this group oriented common shared secret. In this work, however, following the Chinese Remainder Theorem, we present some unusual analysis results concerning the two novel rekey schemes. We show that the first scheme is highly vulnerable to certain attacks, while the second one actually collapses on itself. Therefore, both schemes are revealed to have failed to effectively protect the multicast session key.

Cited By

View all
  • (2018)Towards secure and communication-efficient broadcast encryption systemsJournal of Network and Computer Applications10.1016/j.jnca.2012.09.00736:1(178-186)Online publication date: 28-Dec-2018
  1. Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      NPC '08: Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing
      October 2008
      580 pages
      ISBN:9780769533544

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 18 October 2008

      Author Tags

      1. Secure multicast
      2. broadcast encryption
      3. cryptanalysis.
      4. key management
      5. number theory

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 04 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Towards secure and communication-efficient broadcast encryption systemsJournal of Network and Computer Applications10.1016/j.jnca.2012.09.00736:1(178-186)Online publication date: 28-Dec-2018

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media