Jump to content

User:Trerjrdr/Sandbox

From Wikipedia, the free encyclopedia
LSU WikiProject United States Public PolicyThis user is a participant in the U.S. Public Policy WikiProject at Louisiana State University.



Multicast Encryption[edit]

Introduction[edit]

Multicast is what enables a node on a network to send one unit of data to a special set of receivers.[1] One copy of the data is sent, and multiple copies are created and then sent to the desired recipient.[2] A multicast group is identified by a class D IP address.[3] A user enters or exits a group using IGMP (Internet Group Management Protocol).[4] A message sent via multicast is sent to all nodes on the network, but only the intended nodes accept the multicast frames.[5] Multicasting is useful in situations such as video conferencing and online gaming.[6] Multicast was used originally in LANs, with Ethernet being the best example.[7] A problem with multicast communication is that it is difficult to guarantee that only designated receivers receive the data being sent.[8] This is largely due to the fact that multicast groups are always changing; users come and go at any time.[9] The problem of ensuring that only the chosen recipient obtains the data is known as multicast encryption.[10]

ISO Standards[edit]

The ISO (International Organization for Standardization) states that confidentiality, integrity, authentication, access control, and non-repudiation should all be considered when creating any secure system.[11]

  • Confidentiality: No untrusted party can access appropriate messages.
  • Integrity: Messages cannot be changed during transit without being discovered.
  • Authentication: The message needs to be sent by the person/machine who claims to have sent it.
  • Access control: Only those users enabled can access the data.
  • Non-repudiation: The receiver can prove that the sender actually sent the message.[12]

To be secure, members who are just being added to the group must be restricted from viewing past data.[13] Also, members removed from a group may not access future data.[14]

Theories[edit]

One theory for the creation of an encryption protocol explains that ideally, each member of a group should have a key which changes upon the entrance or exit of a member of the group.[15] Another theory suggests a primary key subsidized by additional keys belonging to legitimate group members.[16] One protocol found on The College of New Jersey website called UFTP (encrypted UDP based FTP over multicast) was created in an attempt to solve this problem.[17] The protocol is designed in three phases: announce/register, file transfer, and completion/confirmation.[18] The latest version was released on 3/29/2011 and the source code is available in the website. To access the site for more info, see The College of New Jersey article.[19]

Current Alternatives[edit]

Today, one alternative in multicast encryption involves the use of symmetric key encryption where data is decoded by intended receivers using a traffic encryption key (TEK). The TEK is changed any time a member joins or leaves the group. This is not feasible for large groups. Users must be continuously connected to obtain the new keys. Another more common method involves asymmetric keys. Here, a private key is shared and those shares are given out asymmetrically. The initial member is given a number of shares, one of which is passed to each group member. If a member has a valid share of the key, he can view the message.[20]

References[edit]

  1. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  2. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  3. ^ Duan, Yitao and John Canny. Computer Science Division, UC Berkeley. “How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack”. http://www.cs.berkeley.edu/~jfc/papers/06/CT-RSA06.pdf
  4. ^ Duan, Yitao and John Canny. Computer Science Division, UC Berkeley. “How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack”. http://www.cs.berkeley.edu/~jfc/papers/06/CT-RSA06.pdf
  5. ^ Pessi, Pekka. Department of Computer Science, Helsinki University Of Technology. “Secure Multicast”. http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/multicast.html
  6. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  7. ^ Pessi, Pekka. Department of Computer Science, Helsinki University Of Technology. “Secure Multicast”. http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/multicast.html
  8. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  9. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  10. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  11. ^ Pessi, Pekka. Department of Computer Science, Helsinki University Of Technology. “Secure Multicast”. http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/multicast.html
  12. ^ Pessi, Pekka. Department of Computer Science, Helsinki University Of Technology. “Secure Multicast”. http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/multicast.html
  13. ^ Pannetrat, Alain and Refik Molva. “Multiple Layer Encryption for Multicast Groups”. http://www.eurecom.fr/util/publidownload.fr.htm?id=1069
  14. ^ Pannetrat, Alain and Refik Molva. “Multiple Layer Encryption for Multicast Groups”. http://www.eurecom.fr/util/publidownload.fr.htm?id=1069
  15. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  16. ^ Micciancio, Daniele and Saurabh Panjwani. “Multicast Encryption: How to maintain secrecy in large, dynamic groups?” http://cseweb.ucsd.edu/~spanjwan/multicast.html
  17. ^ “UFTP - Encrypted UDP based FTP with multicast”. http://www.tcnj.edu/~bush/uftp.html
  18. ^ “UFTP - Encrypted UDP based FTP with multicast”. http://www.tcnj.edu/~bush/uftp.html
  19. ^ “UFTP - Encrypted UDP based FTP with multicast”. http://www.tcnj.edu/~bush/uftp.html
  20. ^ Duan, Yitao and John Canny. Computer Science Division, UC Berkeley. “How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack”. http://www.cs.berkeley.edu/~jfc/papers/06/CT-RSA06.pdf