SlideShare a Scribd company logo
A
seminar on

An Efficient Improved Group Key Agreement Protocol Based on
Diffie-Hellman Key Exchange

Presented By:
Jayant Rajurkar
M-Tech (CSE)

1

1
Introduction
• Traditional group key generating methods
using binary-tree performs efficiently when
adding or deleting nodes dynamically.
• when dealing with group key among multinodes in the Internet, their time complexity
grows to O(Nlog2N).
• an improved group key agreement protocol
based on Diffie-Hellman key exchange, which
can reduce the time complexity of this
situation to O(N).
ALGORITHM DESCRIPTIONS
• This method of rapidly generating group key
has a differences in both generating and
maintaining procedures.
• first there is a managing node which is
responsible for gathering and dispatching
information of generating group key.
• second the algorithm is different between
managing node and nonmanaging node to
maintain its binary-tree.
Select Managing Node
we should select one node as managing node
preferred to select the computer with the
strongest capability a s the managing node
If the m nodes are equal in their computing
capability, selection will be carried on
according to IP addresses
IP address is an unsigned 32 bits integer, so we
can select the one with the smallest or the
largest as the managing node.
Generate Complete Binary-tree by Managing Node


each non-managing node sends its Diffie-Hellman
key exchanging “ingredient” to the managing node

After receiving m-1 pieces of ingredients from others and
adding its own ingredient, the managing node can generate
and maintain a complete binary-tree inside its memory, also
calculate the group key using the binary tree.
DYNAMICALLY ADDING AND DELETING
Nodes’ Dynamically Adding

 No matter whether it is the managing node or
nonmanaging node, the updating operation for
adding new node will be completed within
log2N layers in itself binary-tree for each node.

 After updating itself, the managing node takes
its responsibility to send necessary updating
information packages to other non-managing
nodes.
• Nodes’ Dynamically Deleting
Deletion of Non-Managing Nodes:

 The deletion of non-managing nodes is similar to
the adding, beginning with updating the
information stored in the managing node,
followed by sending the necessary information
selected by managing node to every nonmanaging node.
Deletion of Managing Node:
 Before deleting the managing node, a new managing node
should be selected first based on the selection regulation.
 The previous managing node transfers its binary-tree
structure to the new managing node using the old group
key.
PERFORMANCE ANALYSES
• This method starts computing after gathering all the
needed information, which means that each inner
node is calculated only once.
• As a consequence, the time complexity is log2N
rather than the traditional Nlog2N.
• The average time complexity for non-managing
• Nodes may be much smaller than log2N, because the
information stored in each non-managing node is
limited to the minimum received from the managing
node after its selection, which largely reduces the
time cost in the nonmanaging nodes.
SECURITY ANALYSES

• In terms of traditional Diffie-Hellman key-exchange
protocol, there is a well-known attack -- MITM (Man-InThe-Middle Attack)
• The traditional MITM attack can hardly validate to this
method of group key generation.
• One improved MITM can hijack all the communicating
paths between the managing node and other nonmanaging nodes, which works by hijacking the managing
node.
• we can use digital signature technology to defeat this
attack.
• Adding digital signature based authentication technology
to the DH based key exchange protocol also has been
quite common and sophisticated.
Conclusion
• It can effectively reduce overlapping
computing, decrease the packages sending
times, and cut the time complexity from
O(Nlog2N) of traditional binary-tree method
down to O(N).
• The non-managing nodes still maintain basic
binary-tree structure, which enhances the
speed of dynamically adding and deleting
nodes.
• Deals with MITM attack, and come up with an
effective solution to this attack.
THANK YOU……

More Related Content

PPTX
PPTX
Network Management System and Protocol
PPT
(Snmp) simple network management protocol
PPT
Network Management
DOCX
Basic Concepts and Types of Network Management
PPTX
PDF
Clock Synchronization in Distributed Systems
Network Management System and Protocol
(Snmp) simple network management protocol
Network Management
Basic Concepts and Types of Network Management
Clock Synchronization in Distributed Systems

What's hot (20)

PPTX
SNMP(Simple Network Management Protocol)
PPTX
Simple Network Management Protocol
PPT
resource management
PPTX
Network Management Fundamentals - Back to the Basics
PPT
dos mutual exclusion algos
PPTX
Security in distributed systems
PPT
Network management
PDF
The Power Of Event Chapter 3
PPTX
Distributed System Security Aspects
PPT
Remote Network Monitoring System
PDF
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
PPTX
CISSP - Chapter 4 - Intranet and extranets
PDF
group presentation
PDF
The Power Of Event Chapter 1
PPTX
Simple Network Management Protocol
PPTX
Processor allocation in Distributed Systems
PPT
Chapter00000000
PDF
The Power Of Event Chapter 7
PDF
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
SNMP(Simple Network Management Protocol)
Simple Network Management Protocol
resource management
Network Management Fundamentals - Back to the Basics
dos mutual exclusion algos
Security in distributed systems
Network management
The Power Of Event Chapter 3
Distributed System Security Aspects
Remote Network Monitoring System
Nagios Conference 2013 - William Leibzon - SNMP Protocol and Nagios Plugins
CISSP - Chapter 4 - Intranet and extranets
group presentation
The Power Of Event Chapter 1
Simple Network Management Protocol
Processor allocation in Distributed Systems
Chapter00000000
The Power Of Event Chapter 7
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Ad

Viewers also liked (19)

PPTX
Network based virtual drawing & secured data sharing using vnc protocol
PDF
Information ownership in the cloud
DOCX
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
PDF
Programming Hybrid Services in the Cloud
PDF
Search on encrypted data
PDF
Searchable Encryption Systems
PDF
Crypto workshop part 3 - Don't do this yourself
PPTX
Multi-Party Computation for the Masses
PPTX
Secure deduplicaton with efficient and reliable convergent
PDF
CompTIA: Trends in Cloud Computing
PPTX
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
PPT
Public key cryptography and RSA
PPTX
Seminar cloud computing
DOC
A hybrid cloud approach for secure authorized deduplication
DOCX
A hybrid cloud approach for secure authorized deduplication
PPTX
Cloud Computing Security
PPTX
Cloud security ppt
PPTX
Data security in cloud computing
PPT
Introduction To PKI Technology
Network based virtual drawing & secured data sharing using vnc protocol
Information ownership in the cloud
PROOF OF OWNERSHIP IN DEDUPLICATED CLOUD STORAGE WITH MOBILE DEVICE EFFICIENCY
Programming Hybrid Services in the Cloud
Search on encrypted data
Searchable Encryption Systems
Crypto workshop part 3 - Don't do this yourself
Multi-Party Computation for the Masses
Secure deduplicaton with efficient and reliable convergent
CompTIA: Trends in Cloud Computing
Tips For a Successful Cloud Proof-of-Concept - RightScale Compute 2013
Public key cryptography and RSA
Seminar cloud computing
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Cloud Computing Security
Cloud security ppt
Data security in cloud computing
Introduction To PKI Technology
Ad

Similar to poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange " (20)

PDF
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
PDF
Elliptic Curve for Secure Group Key Management in Distributed Network
PDF
15 s archana reddy final paper--160-170
PDF
Ternary Tree Based Approach For Accessing the Resources by Overlapping Member...
PDF
An efficient distributed group key management using hierarchical approach wit...
PPT
Secuirty based hellman protocols
PDF
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
PDF
call for papers, research paper publishing, where to publish research paper, ...
PDF
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
PDF
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
PPTX
Secure group key management based on hyper-sphere
DOCX
Effective key management in dynamic wireless sensor networks
PDF
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
PPTX
Diffie-Hellman Key Exchange algorithm.pptx
PDF
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
PDF
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
PPT
16974 ch 15 key management
PPT
Indexing.ppt mmmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPT
Indexing.ppt
PPT
Indexing_DATA STRUCTURE FOR ENGINEERING STUDENTS ppt
Distributive Collaborative Key Agreement Protocol for Dynamic Peer Groups
Elliptic Curve for Secure Group Key Management in Distributed Network
15 s archana reddy final paper--160-170
Ternary Tree Based Approach For Accessing the Resources by Overlapping Member...
An efficient distributed group key management using hierarchical approach wit...
Secuirty based hellman protocols
REDUCING FREQUENCY OF GROUP REKEYING OPERATION
call for papers, research paper publishing, where to publish research paper, ...
A SECURE KEY TRANSFER PROTOCOL FOR GROUP COMMUNICATION
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Secure group key management based on hyper-sphere
Effective key management in dynamic wireless sensor networks
SURVEY AND TAXONOMY OF KEY MANAGEMENT PROTOCOLS FOR WIRED AND WIRELESS NETWORKS
Diffie-Hellman Key Exchange algorithm.pptx
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
IRJET-A Survey On Group Key Agreement for Securely Sharing a Secret Key
16974 ch 15 key management
Indexing.ppt mmmmmmmmmmmmmmmmmmmmmmmmmmmmm
Indexing.ppt
Indexing_DATA STRUCTURE FOR ENGINEERING STUDENTS ppt

Recently uploaded (20)

PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Classroom Observation Tools for Teachers
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
GDM (1) (1).pptx small presentation for students
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
A systematic review of self-coping strategies used by university students to ...
PPTX
master seminar digital applications in india
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
VCE English Exam - Section C Student Revision Booklet
Classroom Observation Tools for Teachers
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
Microbial disease of the cardiovascular and lymphatic systems
Pharmacology of Heart Failure /Pharmacotherapy of CHF
GDM (1) (1).pptx small presentation for students
O5-L3 Freight Transport Ops (International) V1.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
A systematic review of self-coping strategies used by university students to ...
master seminar digital applications in india
Anesthesia in Laparoscopic Surgery in India
Microbial diseases, their pathogenesis and prophylaxis
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

poster on "An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange "

  • 1. A seminar on An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange Presented By: Jayant Rajurkar M-Tech (CSE) 1 1
  • 2. Introduction • Traditional group key generating methods using binary-tree performs efficiently when adding or deleting nodes dynamically. • when dealing with group key among multinodes in the Internet, their time complexity grows to O(Nlog2N). • an improved group key agreement protocol based on Diffie-Hellman key exchange, which can reduce the time complexity of this situation to O(N).
  • 3. ALGORITHM DESCRIPTIONS • This method of rapidly generating group key has a differences in both generating and maintaining procedures. • first there is a managing node which is responsible for gathering and dispatching information of generating group key. • second the algorithm is different between managing node and nonmanaging node to maintain its binary-tree.
  • 4. Select Managing Node we should select one node as managing node preferred to select the computer with the strongest capability a s the managing node If the m nodes are equal in their computing capability, selection will be carried on according to IP addresses IP address is an unsigned 32 bits integer, so we can select the one with the smallest or the largest as the managing node.
  • 5. Generate Complete Binary-tree by Managing Node  each non-managing node sends its Diffie-Hellman key exchanging “ingredient” to the managing node After receiving m-1 pieces of ingredients from others and adding its own ingredient, the managing node can generate and maintain a complete binary-tree inside its memory, also calculate the group key using the binary tree.
  • 6. DYNAMICALLY ADDING AND DELETING Nodes’ Dynamically Adding  No matter whether it is the managing node or nonmanaging node, the updating operation for adding new node will be completed within log2N layers in itself binary-tree for each node.  After updating itself, the managing node takes its responsibility to send necessary updating information packages to other non-managing nodes.
  • 7. • Nodes’ Dynamically Deleting Deletion of Non-Managing Nodes:  The deletion of non-managing nodes is similar to the adding, beginning with updating the information stored in the managing node, followed by sending the necessary information selected by managing node to every nonmanaging node. Deletion of Managing Node:  Before deleting the managing node, a new managing node should be selected first based on the selection regulation.  The previous managing node transfers its binary-tree structure to the new managing node using the old group key.
  • 8. PERFORMANCE ANALYSES • This method starts computing after gathering all the needed information, which means that each inner node is calculated only once. • As a consequence, the time complexity is log2N rather than the traditional Nlog2N. • The average time complexity for non-managing • Nodes may be much smaller than log2N, because the information stored in each non-managing node is limited to the minimum received from the managing node after its selection, which largely reduces the time cost in the nonmanaging nodes.
  • 9. SECURITY ANALYSES • In terms of traditional Diffie-Hellman key-exchange protocol, there is a well-known attack -- MITM (Man-InThe-Middle Attack) • The traditional MITM attack can hardly validate to this method of group key generation. • One improved MITM can hijack all the communicating paths between the managing node and other nonmanaging nodes, which works by hijacking the managing node. • we can use digital signature technology to defeat this attack. • Adding digital signature based authentication technology to the DH based key exchange protocol also has been quite common and sophisticated.
  • 10. Conclusion • It can effectively reduce overlapping computing, decrease the packages sending times, and cut the time complexity from O(Nlog2N) of traditional binary-tree method down to O(N). • The non-managing nodes still maintain basic binary-tree structure, which enhances the speed of dynamically adding and deleting nodes. • Deals with MITM attack, and come up with an effective solution to this attack.